Tony Finch – link log
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024
- 2024‑04‑09:
The server chose violence: error handling in the Hubris embedded OS.
- 2024‑03‑30:
The "not rocket science" rule of continuous integration (and the story of monotone and bors).
- 2024‑03‑13:
Mu-Ency: the encyclopedia of the Mandelbrot set.
- 2024‑03‑12:
Identifying software: supply chain security with GNU Guix.
- 2024‑03‑10:
Do Be Do Be Do, or, Frank: a strict functional programming language with algebraic effects.
- 2024‑01‑15:
When random isn't.
- 2024‑01‑06:
Vectrex reborn: How a chance encounter gave new life to a dead console.
- 2023‑12‑26:
Lotus 1-2-3 for Linux.
- 2023‑12‑11:
Cutting out continuations.
- 2023‑12‑10:
Lambda to SKI, semantically.
- 2023‑12‑08:
A brief history of keyboard encoding.
- 2023‑11‑24:
FullControl: unconstrained gcode design for 3D printers.
- 2023‑11‑23:
Commercial flights driven off course by GPS spoofing attacks.
- 2023‑11‑21:
Drawing diagrams for TeX with MetaPost.
- 2023‑11‑19:
Checking Rust crate semver stability in the presence of doc(hidden) items.
- 2023‑10‑03:
Arm64 SIMD instruction list: SVE instructions.
- 2023‑09‑24:
Introducing geometric algebra to software developers: a computational thinking approach.
- 2023‑09‑12:
Hacking the Book8088 for better accuracy.
- 2023‑09‑11:
Pure Wasm Life 2: optimizing webassembly and canvas with WebGL.
- 2023‑09‑01:
A deep dive into Single Pair Ethernet.
- 2023‑07‑31:
What John von Neumann really did at Los Alamos.
- 2023‑05‑11:
Building an anycast secondary DNS service.
- 2023‑05‑11:
Building the Micro Mirror free software CDN.
- 2023‑03‑08:
Historical notes on computer word and byte sizes.
- 2023‑01‑27:
Netheads vs. bellheads redux: the strange victory of SIP over the telephone network.
- 2023‑01‑01:
How to get Xfinity Stream to work on Linux: a tale of Widevine, Chrome OS, and a patched glibc.
- 2022‑12‑26:
NBR: neutralization based reclamation.
- 2022‑11‑23:
Takahē: An efficient multi-domain ActivityPub server.
- 2022‑11‑21:
Why the OpenSSL punycode vulnerability was not detected by fuzz testing.
- 2022‑11‑20:
From culinary dud to stud: how Dutch plant breeders built a brussels sprouts boom.
- 2022‑10‑08:
Slides from a lecture series on algebraic geometry for computer graphics.
- 2022‑10‑01:
Adversarial collaboration.
- 2022‑10‑01:
9 puzzles to convince you you don't understand dependence.
- 2022‑09‑30:
Querying PostgreSQL tables from DuckDB.
- 2022‑09‑18:
Geometric algebra: what is the inverse of a vector?
- 2022‑08‑28:
Weird monitor bugs people sent me in the last 5 years.
- 2022‑08‑26:
The Jupyter+git problem is now solved.
- 2022‑08‑23:
VS Code: What's the deal with the telemetry?
- 2022‑08‑07:
Computing Adler32 checksums at 41 GB/s.
- 2022‑08‑03:
How I do (and don’t) prepare a talk for a tech conference.
- 2022‑06‑14:
STxP70 / STHORM / P2012: ST's secret microcontroller.
- 2022‑05‑30:
How read-intensive is Linux's use of RCU? (And what is its latency?)
- 2022‑04‑21:
Coherence and crate-level where-clauses in Rust.
- 2022‑03‑04:
Dennis Meadows on the 50th anniversary of the publication of The Limits to Growth.
- 2022‑02‑17:
PX-1000Cr: Deliberate weakening of a cryptographic algorithm by the NSA.
- 2022‑01‑29:
An update on rust/coreutils.
- 2022‑01‑27:
Magic-trace: Diagnosing tricky performance issues easily with Intel Processor Trace.
- 2022‑01‑27:
Stop brainstorming.
- 2022‑01‑25:
The truth about inflation.
- 2022‑01‑18:
Dun, Dun Duuun! Where did pop culture’s most dramatic sound come from?
- 2022‑01‑09:
How to check you're in the initial pid namespace?
- 2022‑01‑01:
Susie Dent's guide to swearing.
- 2021‑11‑28:
Amethyst: an automatic tiling window manager for macOS.
- 2021‑11‑21:
DwarFS: A fast high compression read-only file system.
- 2021‑11‑11:
Speed of Rust vs C.
- 2021‑11‑01:
C++ coroutines do not spark joy.
- 2021‑10‑23:
A cool Rust optimization story.
- 2021‑10‑21:
Stupid tricks with io_uring: a server that does zero syscalls per request.
- 2021‑10‑18:
The undocumented Microsoft "Rich" PECOFF header.
- 2021‑10‑06:
How ISO C became unusable for operating system development.
- 2021‑09‑30:
Rust for the polyglot programmer.
- 2021‑09‑21:
A giant space rock demolished an ancient Middle Eastern city and everyone in it, possibly inspiring the Biblical story of Sodom.
- 2021‑09‑14:
Type-checked keypaths in Rust.
- 2021‑09‑12:
Okhsv and Okhsl: two new color spaces for color picking.
- 2021‑09‑04:
A nasty bit of implicit timezone behavior in Golang.
- 2021‑08‑30:
Most information about disinformation is misinformation.
- 2021‑08‑28:
jsc: JavaScript on the macOS command line.
- 2021‑08‑26:
PragmatIC Semiconductor made a flexible 6502 in two weeks.
- 2021‑08‑24:
Life before Unicode in Russia.
- 2021‑08‑20:
Encoding of immediate values on AArch64.
- 2021‑08‑18:
Exploring Clang/LLVM optimization on a programming horror.
- 2021‑08‑06:
HTTP/2 desync attacks.
- 2021‑07‑31:
strcpy: a niche function you don't need.
- 2021‑07‑30:
B-tree path hints.
- 2021‑07‑30:
One tenth of a second.
- 2021‑07‑11:
Ribbon filter: Practically smaller than Bloom and Xor.
- 2021‑07‑11:
Inline in Rust.
- 2021‑06‑16:
Introducing cap-std, a capability-based version of the Rust standard library.
- 2021‑06‑04:
Firefox Proton UI userChrome.css fixes.
- 2021‑06‑04:
Firefox 89 tab appearance fixes with userchrome.css.
- 2021‑05‑25:
RefinedC: automating the foundational verification of C code with refined ownership types.
- 2021‑04‑26:
Plan 9 history in git, from 1992-09-21 to 2015-01-10.
- 2021‑04‑19:
Dissecting the Apple M1 GPU, part III.
- 2021‑04‑15:
Rust shenanigans: return type polymorphism.
- 2021‑04‑04:
Why Julia is turning heads in 2021.
- 2021‑03‑16:
It’s time to stop using SMS for anything.
- 2021‑02‑23:
SEN and oj: pretty JSON.
- 2021‑02‑23:
mold: a modern linker, faster than cat.
- 2021‑02‑12:
Uncovering a 24-year-old bug in Linux TCP.
- 2021‑02‑12:
Islands architecture for web pages.
- 2021‑02‑11:
A reverse-engineered description of Adobe Type 1 fonts. (1989)
- 2021‑02‑11:
50 years of text games - 1976: Adventure.
- 2021‑02‑10:
ANSI X3.64-1979: Additional control characters for use with ASCII.
- 2021‑02‑10:
FreeBee: an AT&T 3B1 emulator.
- 2021‑02‑10:
Let's Encrypt prepared to issue 200 million certificates in 24 hours.
- 2021‑02‑10:
Dependency confusion: a novel supply chain attack against Apple, Microsoft, and dozens of other companies.
- 2021‑02‑10:
Configuring PostgreSQL to avoid the Linux OOM killer.
- 2021‑02‑09:
A practical look at 2G GSM security after three decades.
- 2021‑02‑09:
Turning an old Amazon Kindle into a eink development platform.
- 2021‑02‑09:
Configuring Emacs for Rust development.
- 2021‑02‑08:
The real novelty of the ARPANET.
- 2021‑02‑06:
We have known the earth is round for about 2500 years.
- 2021‑02‑05:
How to read and write Scheme code.
- 2021‑02‑05:
8 bits are enough for a version number...?
- 2021‑02‑05:
In the future, even your RAM will have firmware; and the subject of POWER10 blobs.
- 2021‑02‑04:
The Dunning-Kruger effect probably is real.
- 2021‑02‑04:
You don't really need a virtualenv: try PDM instead?
- 2021‑02‑03:
Bluetooth trackball Mark II.
- 2021‑02‑02:
10 bad TypeScript habits to break this year.
- 2021‑02‑02:
Polymorphisation: Improving Rust compilation times through intelligent monomorphisation.
- 2021‑02‑02:
Recovering a bricked SSD with JTAG and a Raspberry Pi.
- 2021‑02‑01:
An HAProxy back-end server port change gotcha.
- 2021‑02‑01:
PostgreSQL partial indexes: the unexpected find that freed 20GB of unused space.
- 2021‑02‑01:
Gadgetbahn: Is Cambridgeshire's new metro all it's cracked up to be?
- 2021‑02‑01:
67 years of Lego sets.
- 2021‑01‑31:
A look at iMessage in iOS 14.
- 2021‑01‑31:
Bringing stack clash protection to Clang / x86 with help from Firefox and Rust.
- 2021‑01‑31:
Manless climbing: Dorothy Pilley Richards 1894-1986.
- 2021‑01‑31:
CrayZee Eighty: a Z80 RC2014 backplane shaped like a Cray 1.
- 2021‑01‑31:
Testing Proebsting's law: How does clang 2.7 hold up in 2021?
- 2021‑01‑31:
Deluge and disaster: the politics of flooding risk.
- 2021‑01‑30:
Log-structured merge for solid-state drives.
- 2021‑01‑30:
Are the Persian Gulf city-states slave societies?
- 2021‑01‑29:
Achieving 11M IOPS and 66 GB/s IO on a single AMD ThreadRipper workstation.
- 2021‑01‑29:
Discussing the future of RPKI.
- 2021‑01‑29:
How we made Typerighter, the Guardian's style guide checker.
- 2021‑01‑29:
Uniwidth typefaces for interface design.
- 2021‑01‑28:
Automatic flamegraphs for benchmarks in Rust.
- 2021‑01‑28:
Performance improvement on front-end generated by rustdoc.
- 2021‑01‑27:
What's the deal with Chromium on Linux? Google at odds with package maintainers.
- 2021‑01‑27:
What color was "Apple Beige"?
- 2021‑01‑27:
12 requests per second in Python.
- 2021‑01‑26:
Badger Seal mask fitter.
- 2021‑01‑26:
Netflix and Spotify on a Raspberry Pi 4 with Chromium and Widevine.
- 2021‑01‑26:
Strengths, weaknesses, opportunities, and threats facing the GNU Autotools.
- 2021‑01‑26:
Postgres scaling advice for 2021.
- 2021‑01‑26:
Window System Design: If James Gosling had it to do over again in 2002.
- 2021‑01‑26:
System separation in the Continental Europe Synchronous Area on 8 January 2021.
- 2021‑01‑26:
Firefox 85 cracks down on supercookies.
- 2021‑01‑26:
LAMBDA: The ultimate Microsoft Excel worksheet function.
- 2021‑01‑25:
The night two atomic bombs fell on North Carolina.
- 2021‑01‑25:
Zig makes Golang (cgo) cross compilation Just Work.
- 2021‑01‑25:
The PGM-index: a learned piecewise geometric model for small lookup indexes.
- 2021‑01‑24:
DrScheme in space.
- 2021‑01‑24:
Racket compiler and runtime status, January 2021.
- 2021‑01‑24:
An incomplete list of mistakes in the design of CSS.
- 2021‑01‑24:
Tim Hayward and COVID: 10 days on life support.
- 2021‑01‑24:
Libvirt: adoption of GLib library to replace GNULIB and home grown code.
- 2021‑01‑24:
Dissecting the Apple M1 GPU, part II.
- 2021‑01‑24:
Use mmap() with care.
- 2021‑01‑22:
Rust in production in 1Password.
- 2021‑01‑22:
On the complexity of JSON serialization.
- 2021‑01‑22:
What engineers can teach (and learn from) programmers.
- 2021‑01‑21:
XTerm does graphics in Tektronix mode.
- 2021‑01‑21:
The new database servers powering Let's Encrypt.
- 2021‑01‑21:
How Corellium ported Linux to the Apple M1.
- 2021‑01‑21:
Container networking is simple.
- 2021‑01‑21:
picodvi: Bitbanged DVI on the RP2040 microcontroller.
- 2021‑01‑21:
Datalegreya: interweave text and data.
- 2021‑01‑21:
Parsing ASN.1: A troublesome problem?
- 2021‑01‑20:
The year a "railway" ran inside Westminster Abbey.
- 2021‑01‑20:
Software engineering is not special.
- 2021‑01‑20:
Porting Firefox to Apple Silicon.
- 2021‑01‑20:
Java on Truffle: going fully metacircular.
- 2021‑01‑20:
An interactive review of the Oklab colour space.
- 2021‑01‑19:
Cache poisoning vulnerabilities affect popular DNSmasq software.
- 2021‑01‑19:
A high-speed computer vision pipeline for the universal LEGO sorting machine.
- 2021‑01‑19:
Unicode superscript numeral rendering bugs.
- 2021‑01‑19:
Down Underground: London Underground depth diagrams.
- 2021‑01‑18:
Are programmers really engineers?
- 2021‑01‑18:
BBC Micro Bot user guide.
- 2021‑01‑16:
The problem with Gradle.
- 2021‑01‑16:
Reverse engineering Prodigy.
- 2021‑01‑15:
Fast commits for ext4.
- 2021‑01‑15:
This was WhatsApp's plan all along.
- 2021‑01‑15:
donut.c without a math library.
- 2021‑01‑15:
Simplifying endian-specific file parsers in Rust with Omnom and type inference.
- 2021‑01‑15:
Maybe you don't need Rust and WASM to speed up your JavaScript.
- 2021‑01‑14:
A week with Plan 9.
- 2021‑01‑14:
The most thoroughly commented linker script (probably).
- 2021‑01‑13:
Use an iPhone as a webcam.
- 2021‑01‑13:
OBS Studio: free and open source software for video recording and live streaming.
- 2021‑01‑13:
Cross-language interfaces between C and C++.
- 2021‑01‑12:
The ABCD family tree.
- 2021‑01‑12:
Who invented the alphabet?
- 2021‑01‑12:
Futhark design decisions I do not regret.
- 2021‑01‑12:
Developing new metrics for tracking DNS root server traffic.
- 2021‑01‑12:
SUNSPOT: an implant in the SolarWinds Orion build process.
- 2021‑01‑11:
XTerm: it's better than you thought.
- 2021‑01‑11:
The Earth has been spinning faster lately.
- 2021‑01‑10:
The design of the Roland Juno synth oscillators.
- 2021‑01‑10:
Surprising ctags behaviour.
- 2021‑01‑10:
The truth about cast iron pans.
- 2021‑01‑09:
Radamsa: a general-purpose black-box fuzzer.
- 2021‑01‑09:
kAFL: hardware-assisted feedback fuzzing for OS kernels.
- 2021‑01‑09:
Redqueen: fuzzing with input-to-state correspondence.
- 2021‑01‑09:
Grimoire: synthesizing structure while fuzzing.
- 2021‑01‑09:
Earth is turning faster than it has in a half-century, which could mean a negative leap second.
- 2021‑01‑09:
Ray tracing in pure CMake.
- 2021‑01‑08:
nonymous + bore: DNS toys for Rust.
- 2021‑01‑08:
Exploring RustFFT's SIMD architecture.
- 2021‑01‑08:
Dark side of POSIX APIs: handling siginfo_t in Rust.
- 2021‑01‑08:
Generic associated types encode higher-order functions on types in Rust.
- 2021‑01‑08:
Rust's SemVer snares: sizedness and size.
- 2021‑01‑08:
An introduction to property-based testing in Rust with quickcheck.
- 2021‑01‑08:
A guide to rendering metaballs (aka blobs).
- 2021‑01‑08:
Smooth voxel terrain: isosurface extraction with marching cubes and surface nets.
- 2021‑01‑08:
Metaballs and marching squares.
- 2021‑01‑08:
Doing symbolic math with SymPy.
- 2021‑01‑08:
Greybox automatic exploit generation for heap overflows in language interpreters.
- 2021‑01‑08:
Quorum availability.
- 2021‑01‑07:
Google Chrome reduces its root DNS traffic.
- 2021‑01‑07:
Dissecting the Apple M1 GPU.
- 2021‑01‑07:
Italian court rules that Deliveroo used a discriminatory algorithm.
- 2021‑01‑07:
Xbox 20 year anniversary: an oral history.
- 2021‑01‑06:
Simulating the PIN cracking scene in Terminator 2.
- 2021‑01‑06:
An uncommon cold.
- 2021‑01‑05:
Cryptographic key length recommendations.
- 2021‑01‑05:
Tutorial on precompilation for Julia.
- 2021‑01‑04:
Ditherpunk: the article I wish I had about monochrome image dithering.
- 2021‑01‑04:
Dream Minecraft speedrun investigation results.
- 2021‑01‑04:
FuzixOS: a Unix-like system for 8-bit micros.
- 2021‑01‑03:
kgames: reviving very old X code.
- 2021‑01‑03:
Rust design patterns.
- 2021‑01‑03:
Zig in 30 minutes.
- 2021‑01‑03:
A new release for GNU Octave.
- 2021‑01‑03:
Medley Interlisp Common Lisp.
- 2021‑01‑03:
On repl-driven programming.
- 2021‑01‑03:
cargo-supply-chain: Gather author, contributor and publisher data on crates in your dependency graph.
- 2021‑01‑02:
Game of Life on Penrose tiles.
- 2021‑01‑01:
The hyperbezier pen tool
- 2021‑01‑01:
Floating Point Leviathan: a game based on floating point precision errors.
- 2021‑01‑01:
Seamless file descriptor transfer between Linux processes with pidfd and pidfd_getfd.
- 2021‑01‑01:
Counting the days: the origin of Julian day numbers.
- 2021‑01‑01:
Multiscale Turing patterns in WebGL.
- 2021‑01‑01:
How I improve my C code quality.
- 2021‑01‑01:
Tectonic: a modernized, complete, self-contained TeX/LaTeX engine, powered by XeTeX and TeXLive.
- 2021‑01‑01:
A look at Rust tokio 1.0 API changes.
- 2020‑12‑31:
Unsafe string interning in Golang for scoped IPv6 addresses.
- 2020‑12‑30:
The quirks of City of London livery company coats of arms.
- 2020‑12‑30:
Getting started in BBC BASIC with Owlet.
- 2020‑12‑30:
In Python 2, node.example.com is an IPv6 address.
- 2020‑12‑29:
Five intersecting tetrahedra in origami.
- 2020‑12‑29:
Why are video games graphics (still) a challenge? Productionizing rendering algorithms.
- 2020‑12‑29:
Flow Browser preview on the Raspberry Pi 400.
- 2020‑12‑28:
Buttplug: a haptics abstraction library in Rust for controlling vibrators and other intimate hardware.
- 2020‑12‑28:
Cosmopolitan C library: build-once run-anywhere.
- 2020‑12‑28:
A review of the Lean theorem prover.
- 2020‑12‑28:
Rust in a KDE project.
- 2020‑12‑27:
Systems design explains the world.
- 2020‑12‑27:
Oklab: A perceptual color space for image processing.
- 2020‑12‑26:
A complete guide to LLVM for programming language creators.
- 2020‑12‑25:
'static trait bounds in Rust.
- 2020‑12‑23:
Interactive C++ for data science with LLVM cling.
- 2020‑12‑23:
How to favicon in 2021: six files that fit most needs.
- 2020‑12‑23:
Flix: a functional / logic programming language for the JVM.
- 2020‑12‑23:
KLEE: finding software bugs using symbolic execution.
- 2020‑12‑23:
Build a tiny certificate authority for your homelab.
- 2020‑12‑23:
An LSP client maintainer's view of the language server protocol.
- 2020‑12‑23:
Don't think, just defunctionalize.
- 2020‑12‑21:
Raft does not guarantee liveness in the face of network faults.
- 2020‑12‑20:
Swirled Series: the result.
- 2020‑12‑19:
The Psion Organiser II: laying the groundwork of our smartphone world.
- 2020‑12‑19:
The algorithmic beauty of plants.
- 2020‑12‑19:
Perceus: garbage free reference counting with reuse.
- 2020‑12‑18:
Understanding systemd-resolved, split DNS, and VPN configuration.
- 2020‑12‑17:
Git commits are snapshots, not diffs.
- 2020‑12‑17:
The git parable.
- 2020‑12‑17:
Moving a large TypeScript codebase to use strict null checks.
- 2020‑12‑17:
Notes on cross-compiling Rust on a Mac for a Raspberry Pi.
- 2020‑12‑17:
Adding BPF target support to the Rust compiler.
- 2020‑12‑17:
Rust on the BBC micro:bit.
- 2020‑12‑17:
rpitx: radio transmission from a Raspberry Pi GPIO pin.
- 2020‑12‑17:
Why CockroachDB chose to be compatible with PostgreSQL.
- 2020‑12‑17:
FFI-safe polymorphism with thin trait objects in Rust.
- 2020‑12‑16:
Niue has launched a major effort to win back control of .nu
- 2020‑12‑16:
What I wish someone had told me about tensor computation libraries.
- 2020‑12‑16:
To the brain, reading computer code is not the same as reading language.
- 2020‑12‑15:
Rockstar: a language for creating programs that are also hair metal power ballads.
- 2020‑12‑14:
The case of the extra 40ms. (Not TCP delayed ACKs!)
- 2020‑12‑14:
The cleverest BBC Micro floppy disc protection ever? Western Security Ltd.
- 2020‑12‑14:
Pointer provenance is complicated: we need better language specs.
- 2020‑12‑14:
XML round-trip vulnerabilities in the Golang standard library affecting SAML.
- 2020‑12‑14:
A Golang-style defer mechanism for C.
- 2020‑12‑14:
K: a rewrite-based executable semantic framework for programming languages.
- 2020‑12‑13:
if-then-else had to be invented.
- 2020‑12‑13:
The HP-35.
- 2020‑12‑12:
More batteries included with emacs.
- 2020‑12‑12:
Amazon owns more than $2B worth of IPV4 addresses.
- 2020‑12‑11:
Monads and generic associated types in nightly Rust.
- 2020‑12‑10:
An explanation of cameras and lenses with interactive 3D graphics.
- 2020‑12‑09:
"A damn stupid thing to do": CPL and the origins of C.
- 2020‑12‑09:
Architecting the future: Arm, CHERI, and Morello.
- 2020‑12‑08:
Where did combinators come from? Hunting the story of Moses Schönfinkel.
- 2020‑12‑08:
Connecting an ASR33 Teletype to an ESP32.
- 2020‑12‑08:
The Galileo eccentric satellite surprise.
- 2020‑12‑06:
Interval tree clocks.
- 2020‑12‑06:
Exotic Programming Ideas: Datalog and Souffle.
- 2020‑12‑06:
std::visit is everything wrong with modern C++
- 2020‑12‑06:
The future of 32-bit Linux.
- 2020‑12‑05:
Auto for types, but not for concepts in C++.
- 2020‑12‑05:
A Microsoft custom floating point type for efficient inference.
- 2020‑12‑04:
A tale of Template Haskell and cross compilation.
- 2020‑12‑04:
Browser cache partitioning means it is time to say goodbye to Google Fonts.
- 2020‑12‑03:
Painful lessons from the Web PKI, and how you can avoid them.
- 2020‑12‑03:
Using Bloom filters to efficiently synchronise git repos and other hash graphs.
- 2020‑12‑03:
Generic traits and associated types in Rust.
- 2020‑12‑03:
Futures explained in 200 lines of Rust.
- 2020‑12‑03:
Obsolete trigonometry functions and why we don't use them anymore.
- 2020‑12‑02:
Hey Alexa what did I just type?
- 2020‑12‑02:
Faster asynchronous WAL archiving with pgBackRest to avoid PostgreSQL WAL backlog.
- 2020‑12‑02:
PostgreSQL PostGIS trajectories through space and time.
- 2020‑12‑02:
TenDRA: an architecture-neutral compiler framework with C and C++ front ends.
- 2020‑12‑02:
libFirm: an optimizing compiler back-end.
- 2020‑12‑02:
Cutting up a capsized cargo ship for salvage.
- 2020‑12‑02:
The rendering equation.
- 2020‑12‑01:
Naming the Net: the Domain Name System, 1983-1990.
- 2020‑12‑01:
Design of the Mozilla Firefox CRLite infrastructure.
- 2020‑12‑01:
Evolution of tree data structures for indexing: more exciting than it sounds.
- 2020‑12‑01:
The road to the Erlang JIT.
- 2020‑12‑01:
Computer graphics from scratch.
- 2020‑12‑01:
I am an 80 column purist.
- 2020‑12‑01:
How many registers does an x86-64 CPU have?
- 2020‑12‑01:
ARM and lock-free programming.
- 2020‑11‑30:
biVector.net: geometric algebra for computer graphics, vision, and engineering.
- 2020‑11‑30:
Geometric algebra for computer graphics.
- 2020‑11‑30:
Imaginary numbers are not real: the geometric algebra of spacetime.
- 2020‑11‑30:
ganja.js: geometric algebra for Javascript.
- 2020‑11‑29:
Summary of the Amazon Kinesis outage in the AWS us-east-1 region.
- 2020‑11‑28:
Raytracing in one weekend.
- 2020‑11‑28:
SCION EPIC: a path-aware clean-slate internet architecture.
- 2020‑11‑28:
L4S: low latency, low loss, scalable throughput Internet service architecture.
- 2020‑11‑28:
Network topology design at 17,000 km/h: LEO satellite Internet.
- 2020‑11‑28:
MP-DCCP multipath tunneling and congestion control in congestion control.
- 2020‑11‑28:
On congestion control (un)fairness and active queue management (AQM).
- 2020‑11‑28:
k6: a web load testing tool, written in Golang and configured in JavaScript.
- 2020‑11‑28:
The great Internet TCP congestion control census.
- 2020‑11‑27:
Existential Haskell.
- 2020‑11‑27:
1.5 is the midpoint between 0 and infinity in Ruby.
- 2020‑11‑27:
Rebuilding the Racket compiler with Chez Scheme.
- 2020‑11‑27:
The most unusual murder weapons in crime fiction.
- 2020‑11‑27:
An introduction to geometric algebra.
- 2020‑11‑27:
Clifford Algebra: A visual introduction.
- 2020‑11‑26:
An introduction to quaternions.
- 2020‑11‑26:
How io_uring and eBPF will revolutionize programming in Linux.
- 2020‑11‑26:
CBOR for embedded C with a Rust server.
- 2020‑11‑26:
Testing a Rust crate's C API.
- 2020‑11‑26:
Strengthening memory safety in Rust: exploring CHERI capabilities for a safe language.
- 2020‑11‑26:
An ex-Googler's guide to dev tools.
- 2020‑11‑26:
WordPress and PHP 8 compatibility report.
- 2020‑11‑26:
Modern storage is plenty fast. It is the APIs that are bad.
- 2020‑11‑26:
Reasoning about colours.
- 2020‑11‑26:
A list of magic numbers encountered while debugging.
- 2020‑11‑26:
Electromagnetism using geometric algebra versus components.
- 2020‑11‑26:
Versor: a generic C++ library for geometric algebras.
- 2020‑11‑26:
Origin of the trefoil radiation warning sign.
- 2020‑11‑25:
An intro to bivectors and rotors: Let's remove quaternions from every 3D engine.
- 2020‑11‑25:
An API is a user interface.
- 2020‑11‑25:
Mlang: a modern compiler for the French tax code.
- 2020‑11‑25:
Protect domains that don't send email.
- 2020‑11‑25:
How do people find bugs?
- 2020‑11‑25:
Preserving Flash: why emulation is better than migration.
- 2020‑11‑25:
Making PostgreSQL stored procedures 9X faster in Citus.
- 2020‑11‑25:
PAM bypass: when nullok is not OK.
- 2020‑11‑24:
TypeScript performance.
- 2020‑11‑24:
More subtle TCP performance problems due to Nagle's algorithm and delayed ACKs.
- 2020‑11‑24:
What went wrong with libdispatch: a cautionary tale for async concurrency.
- 2020‑11‑23:
Building your color palette.
- 2020‑11‑23:
The origin of the MIT License.
- 2020‑11‑22:
What if the world is made of cubes? Uncovering the universal geometry of geology.
- 2020‑11‑22:
Even faster bash startup.
- 2020‑11‑22:
Booting from a vinyl record.
- 2020‑11‑20:
Swirled series.
- 2020‑11‑20:
It is high time we let go of the Mersenne Twister.
- 2020‑11‑20:
How to abuse and fix authenticated encryption without key commitment.
- 2020‑11‑20:
UNIX NEWS and ;login: archives from the 1970s.
- 2020‑11‑19:
Microsoft FrontPage: the good, the bad, the ugly.
- 2020‑11‑19:
Flash animations live forever at the Internet Archive.
- 2020‑11‑19:
The C standard library is not dependency free (but part of Rust's is).
- 2020‑11‑19:
The usability of ownership in Rust.
- 2020‑11‑19:
LambdaDelta: an emulator of the LMI Lambda Lisp Machine.
- 2020‑11‑19:
Archive of LISP Machine, Inc.
- 2020‑11‑19:
Wiby: a search engine for the classic web.
- 2020‑11‑19:
Forensic Architecture investigation of the Beirut port explosion.
- 2020‑11‑19:
On-demand linked libraries for Nix.
- 2020‑11‑19:
Power-cycling a USB port should be simple, right?
- 2020‑11‑19:
I should have loved biology.
- 2020‑11‑18:
Microsoft Pluton: a security chip designed for the future of Windows PCs.
- 2020‑11‑18:
Automatic syntax error recovery in lrpar.
- 2020‑11‑17:
Skija graphics for JVM.
- 2020‑11‑17:
CXX.rs: safe interop between Rust and C++.
- 2020‑11‑17:
The Rust performance book.
- 2020‑11‑17:
2020 Mac Mini: putting Apple Silicon M1 to the test.
- 2020‑11‑17:
Servo moves from Mozilla to the Linux Foundation.
- 2020‑11‑17:
Sponge4: a sponge-like hash function for seeding PRNGs.
- 2020‑11‑17:
From Russia With Love: moving a time series data service from Citus to ClickHouse.
- 2020‑11‑16:
Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA.
- 2020‑11‑16:
PostgreSQL psql command line tutorial and cheat sheet.
- 2020‑11‑16:
pgcli: a command line interface for PostgreSQL with auto-completion and syntax highlighting.
- 2020‑11‑16:
Build systems à la carte: theory and practice (revised and expanded).
- 2020‑11‑16:
How I failed to make LinkedIn fix their broken international domain URL parser.
- 2020‑11‑16:
How do you write simple explanations without sounding condescending?
- 2020‑11‑15:
MLS: message layer security for better encrypted group chat.
- 2020‑11‑15:
Charles proxy for web scraping.
- 2020‑11‑14:
The making of a masterpiece: Bohemian Rhapsody. (YouTube)
- 2020‑11‑14:
Python, the Full Monty: a tested semantics for the Python programming language.
- 2020‑11‑14:
On the expressive power of programming languages.
- 2020‑11‑14:
We need less powerful languages.
- 2020‑11‑14:
Warp: Improved JS performance in Firefox 83.
- 2020‑11‑14:
When 13.3 > 14.
- 2020‑11‑13:
udp2raw-tunnel: UDP over encrypted fake TCP to bypass firewalls.
- 2020‑11‑13:
Why TCP over TCP is a bad idea.
- 2020‑11‑12:
Build your own gpg in Rust.
- 2020‑11‑12:
Replication conflicts in PostgreSQL and how to deal with them.
- 2020‑11‑12:
PostgreSQL observability: a diagram of views and functions for inspecting your database.
- 2020‑11‑12:
Full-text search performance since PostgreSQL 8.3.
- 2020‑11‑12:
40ms bug: a missing writev, Nagle's algorithm, and delayed ACKs.
- 2020‑11‑12:
AndroWish: run Tcl/Tk programs on Android.
- 2020‑11‑12:
Propeller: a framework for post-link optimizations.
- 2020‑11‑12:
BOLT: a post-link binary layout optimizer for speeding up large applications.
- 2020‑11‑12:
Exploring PGO for the Rust compiler.
- 2020‑11‑11:
Miniselect: practical and generic (sorted) selection algorithms.
- 2020‑11‑11:
Undoing, fixing, or removing commits in git: choose your own adventure.
- 2020‑11‑11:
What mother never told you about IBM VM service.
- 2020‑11‑10:
Fast Flexible Paxos.
- 2020‑11‑09:
Hegel: an advanced static type checker for JavaScript.
- 2020‑11‑09:
Turing incomplete languages.
- 2020‑11‑09:
Lox: a word that hasn't changed sound or meaning in 8,000 years.
- 2020‑11‑09:
dnstap-receiver: a dnstap streams receiver in Python.
- 2020‑11‑09:
Structured concurrency in C++.
- 2020‑11‑09:
dog: a command-line DNS client.
- 2020‑11‑09:
Towards Pijul 1.0.
- 2020‑11‑09:
Parsing the infamous Japanese postal CSV.
- 2020‑11‑08:
LLVM clang 12 support for amd64 micro-architecture levels.
- 2020‑11‑08:
New amd64 micro-architecture levels.
- 2020‑11‑07:
Go in production: what I learned 1 month later.
- 2020‑11‑07:
vt52-fpga
- 2020‑11‑07:
Kristian's interactive 3D printed Stargate with wormhole effect.
- 2020‑11‑06:
Standing on our own two feet: Let's Encrypt trust anchor rollover.
- 2020‑11‑06:
Exception safety in Rust: using transient droppers to prevent memory leaks.
- 2020‑11‑06:
AMD Zen 3 Ryzen deep dive review.
- 2020‑11‑06:
The elements of style: Unix as literature.
- 2020‑11‑05:
Draft design for generic type parameters in Golang.
- 2020‑11‑05:
Linear scan register allocation.
- 2020‑11‑05:
A first look at the Erlang JIT.
- 2020‑11‑05:
UK's £55M MAST Upgrade fusion experiment (Mega Amp Spherical Tokamak) has achieved first plasma.
- 2020‑11‑05:
Notes on Paxos.
- 2020‑11‑04:
BPF binaries: BTF, CO-RE, and the future of BPF perf tools.
- 2020‑11‑03:
Eight months of NixOS.
- 2020‑11‑03:
Hardware performance counter support (via rdpmc) in Rust.
- 2020‑11‑03:
How we made our SaaS homepage cookie-free.
- 2020‑11‑03:
Rust design-for-testability: a survey.
- 2020‑11‑02:
Two workers are quadratically better than one: modelling a queue with PRISM.
- 2020‑11‑02:
Extreme bioinformatics debugging.
- 2020‑11‑02:
Hyper-regional chippy traditions of Britain and Ireland.
- 2020‑11‑02:
Mac OS boot volume layout.
- 2020‑11‑01:
Flutter Web: a fractal of bad design.
- 2020‑11‑01:
NAT Slipstreaming: firewall bypass using SIP ALG.
- 2020‑11‑01:
Using TLA+ to understand a real-world glibc bug.
- 2020‑11‑01:
WordTsar: a Wordstar clone.
- 2020‑11‑01:
WordPerfect for DOS on modern computers.
- 2020‑10‑31:
Dijkstra: the man who carried computer science on his shoulders.
- 2020‑10‑30:
3 Gbps ethernet on the Raspberry Pi compute module.
- 2020‑10‑30:
It's called Medium because it's neither rare nor well done.
- 2020‑10‑30:
A12: advancing network transparency on the desktop.
- 2020‑10‑30:
XPath injection issues are severely underrated.
- 2020‑10‑30:
A tale of a build system bug. (ninja/gcc/Windows)
- 2020‑10‑30:
Experience in production with Flask, Bottle, Tornado, and Twisted.
- 2020‑10‑30:
For complex applications (IDEs) Rust is as productive as Kotlin.
- 2020‑10‑30:
Using a 3D printer "defect" to create a new quasi-textile.
- 2020‑10‑30:
I hate GIS coordinate systems!
- 2020‑10‑30:
Errol: binary floating-point to decimal string conversion algorithm.
- 2020‑10‑30:
Errol: an always correct method for printing floating-point numbers.
- 2020‑10‑29:
SRI and Cambridge University release CHERI software stack for Arm Morello.
- 2020‑10‑29:
The remarkable number 1/89 and the Fibonacci series.
- 2020‑10‑29:
Scaling attacks to hide/spoof one image in another.
- 2020‑10‑28:
Optimizing a join using LIKE by using PostgreSQL FTS instead.
- 2020‑10‑28:
EDSAC 1951 (YouTube)
- 2020‑10‑28:
The reverse tabnabbing vulnerability in HTML.
- 2020‑10‑28:
Verona: a research programming language for concurrent ownership.
- 2020‑10‑27:
Better performance with Envoy HTTP connection pooling for PHP applications at Wikipedia.
- 2020‑10‑27:
plocate: a much faster locate.
- 2020‑10‑27:
samurai: a ninja-compatible build tool written in C.
- 2020‑10‑27:
Why was Rachel Whiteread's House demolished?
- 2020‑10‑27:
OpenMPTCProuter uses multipath TCP (MPTCP) to aggregate multiple Internet connections with OpenWrt.
- 2020‑10‑27:
Covenants, easements, and wayleaves: the hidden urban interfaces of the London Underground.
- 2020‑10‑27:
Improving PostgreSQL connection scalability with faster snapshots.
- 2020‑10‑26:
Standard ML in 2020.
- 2020‑10‑25:
PARI/GP: a computer algebra system for fast computations in number theory.
- 2020‑10‑25:
GAP: a system for computational discrete algebra.
- 2020‑10‑24:
Efficient text editing on a PDP-10.
- 2020‑10‑24:
Four dangerous animals of product development.
- 2020‑10‑24:
Static single assignment for functional programmers.
- 2020‑10‑24:
A new map of the standard model of particle physics.
- 2020‑10‑24:
Rejuvenating autoconf.
- 2020‑10‑24:
Ungrammar: a DSL for rust-analyzer's concrete syntax tree.
- 2020‑10‑24:
Understanding static single assignment (SSA) form.
- 2020‑10‑24:
Compiling with continuations, or without? Whatever.
- 2020‑10‑24:
Compiling without continuations.
- 2020‑10‑23:
Deprecating SHA-1 in OpenPGP.
- 2020‑10‑23:
Avoiding overload in AWS distributed systems by putting the smaller service in control.
- 2020‑10‑23:
RPKI secure BGP routing Q&A.
- 2020‑10‑23:
cson: CoffeeScript object notation.
- 2020‑10‑23:
jacl: just another configuration language.
- 2020‑10‑23:
Better than JSON?
- 2020‑10‑23:
StrictYAML.
- 2020‑10‑23:
How Apple is organized for innovation.
- 2020‑10‑23:
Journeying into XDP implementing DNS RRL.
- 2020‑10‑23:
Debugging async generator errors in Rust.
- 2020‑10‑23:
Private methods on a public trait in Rust.
- 2020‑10‑23:
Inside Rust std::io::Error.
- 2020‑10‑22:
Proving that 1 + 1 = 10 in Rust.
- 2020‑10‑22:
A pitfall of Rust's move/copy/drop semantics and zeroing data.
- 2020‑10‑22:
The story behind Markdown.
- 2020‑10‑22:
Non-generic inner functions in Rust.
- 2020‑10‑22:
Nickel: better configuration for less, inspired by Nix.
- 2020‑10‑22:
Let's build a high-performance fuzzer with GPUs!
- 2020‑10‑22:
What's new in OAuth 2.1?
- 2020‑10‑22:
AWS NLBs and mixed up TCP connections.
- 2020‑10‑22:
TPC-H performance since PostgreSQL 8.3.
- 2020‑10‑22:
PEG: ambiguity, precision, and confusion.
- 2020‑10‑21:
The TRIPS project: an explicit data graph execution (EDGE) processor.
- 2020‑10‑21:
Roofline model of computer performance for HPC applications.
- 2020‑10‑21:
The asymptotic cost of address translation on memory access time.
- 2020‑10‑21:
The myth of RAM.
- 2020‑10‑21:
Lezer: a parser system in JavaScript.
- 2020‑10‑21:
A list of attempts to make Python faster.
- 2020‑10‑20:
AWS and their billions of dollars of IPv4 addresses.
- 2020‑10‑20:
Why mmap is faster than system calls.
- 2020‑10‑20:
Validating UTF-8 in less than one instruction per byte.
- 2020‑10‑20:
The surprising impact of medium-size texts on PostgreSQL performance.
- 2020‑10‑20:
Lambda the penultimate / lambda to SKI, semantically.
- 2020‑10‑20:
Binary lambda calculus.
- 2020‑10‑20:
Assorted thoughts on Zig and Rust.
- 2020‑10‑20:
Building a computer in Conway's Game of Life.
- 2020‑10‑19:
Euler's formula: a complex guide.
- 2020‑10‑19:
The Arm64 memory tagging extension in Linux.
- 2020‑10‑19:
BlockQuicksort: avoiding branch mispredictions in Quicksort.
- 2020‑10‑19:
ips4o: in-place parallel superscalar samplesort.
- 2020‑10‑19:
The case for a learned sorting algorithm.
- 2020‑10‑19:
MONOSPACE: a JavaScript demo in 1021 bytes.
- 2020‑10‑18:
Free yourself from the Spotify desktop client with spotifyd.
- 2020‑10‑17:
Keeping secrets: Diffie-Hellman and the NSA.
- 2020‑10‑17:
What they don't tell you about demand paging in school.
- 2020‑10‑17:
Building a 10BASE5 "Thick Ethernet" network.
- 2020‑10‑17:
Cryptographic signing using ssh-keygen(1) with a FIDO authenticator.
- 2020‑10‑17:
MyST: a markdown flavor and parser for Sphinx.
- 2020‑10‑16:
So you want to build an embedded Linux system?
- 2020‑10‑16:
The unreasonable effectiveness of quasirandom sequences.
- 2020‑10‑15:
The fascinating influence of the Cyclone programming language.
- 2020‑10‑15:
Optional parameters in Rust.
- 2020‑10‑15:
Building the fastest RaptorQ (RFC6330) FEC codec in Rust.
- 2020‑10‑15:
Improving security in s2n, Amazon's TLS implementation.
- 2020‑10‑15:
Unifying the technical interview.
- 2020‑10‑14:
Room-temperature superconductivity achieved for the first time (at high pressure between diamond anvils).
- 2020‑10‑14:
libsixel: DEC terminal graphics.
- 2020‑10‑14:
Improving Bluetooth audio quality on Linux.
- 2020‑10‑13:
Applying union-find for real life performance wins.
- 2020‑10‑12:
Building the mathematical library of the future with Lean.
- 2020‑10‑12:
Overloading by return type in C++.
- 2020‑10‑11:
GPU-accelerated ODE solving in R with Julia.
- 2020‑10‑11:
Why we need a C-compatible Rust crate for bitfields.
- 2020‑10‑10:
Asterisk.
- 2020‑10‑10:
Crux: exhaustive symbolic testing for C, C++, and Rust.
- 2020‑10‑10:
Alphora-style database diagramming.
- 2020‑10‑10:
Progress report on Rust Cranelift backend.
- 2020‑10‑10:
xchg rax, rax; x64 Assembly for the advanced.
- 2020‑10‑10:
CSV parser benchmark game.
- 2020‑10‑10:
Loading a CSV file at the speed limit of NVMe storage.
- 2020‑10‑08:
The Eisel-Lemire string to double precision floating point conversion algorithm.
- 2020‑10‑08:
OLTP performance since PostgreSQL 8.3.
- 2020‑10‑08:
Using CTE to do a binary search of a large table with non-indexed correlated data in PostgreSQL.
- 2020‑10‑07:
The origin of the VM/370 time-sharing system.
- 2020‑10‑07:
zheap: reinvented PostgreSQL storage.
- 2020‑10‑07:
Notes on reviving and extending Marvin, a typeface for Visions magazine.
- 2020‑10‑07:
From its name, to its hazy origins, to its drug interactions, there's a lot going on with Grapefruit.
- 2020‑10‑07:
USB3: why it's a bit harder than USB2.
- 2020‑10‑06:
DOMPurify bypass: XSS via HTML namespace confusion.
- 2020‑10‑06:
Telharmonium: the first significant electronic musical instrument.
- 2020‑10‑06:
Q3 Linux touchpad like Macbook update.
- 2020‑10‑06:
TIME for a WTF MySQL moment.
- 2020‑10‑06:
From object algebras to tagless-final interpreters.
- 2020‑10‑06:
Cyclone Scheme: a new R7RS compiler.
- 2020‑10‑06:
FAQs on aerosol transmission of COVID-19.
- 2020‑10‑06:
Incompatible validation criteria for Ed25519.
- 2020‑10‑06:
s7: Scheme as an extension language for other applications.
- 2020‑10‑04:
Type-level programming in Rust.
- 2020‑10‑04:
How we ran a Unix-like OS (Xv6), on our home-built CPU, with our home-built C compiler.
- 2020‑10‑04:
Lambda calculus, Church numerals, and Graham's number.
- 2020‑10‑04:
Drop order in Rust: it's tricky.
- 2020‑10‑04:
A future for debugging Rust.
- 2020‑10‑04:
Revisiting a 'smaller Rust'.
- 2020‑10‑04:
Applying "make invalid states unrepresentable".
- 2020‑10‑04:
Tales from the science fiction bar-room.
- 2020‑10‑04:
Saving space (basically) for free by re-ordering columns in PostgreSQL.
- 2020‑10‑04:
Dissecting Lemire's nearly divisionless random number generator.
- 2020‑10‑04:
Magic Wand Rechargeable teardown.
- 2020‑10‑04:
SaferNode: a Python script to isolate npm inside short-lived Docker containers.
- 2020‑10‑04:
A web of trust for npm.
- 2020‑10‑04:
HOPL: an online historical encyclopaedia of programming languages.
- 2020‑10‑04:
chibicc: a small C compiler.
- 2020‑10‑04:
Lambda calculus diagrams.
- 2020‑10‑03:
Computer science metanotation is a barrier to entry.
- 2020‑10‑03:
System font typography on 8 bit micros.
- 2020‑10‑03:
Falsehoods programmers believe about map coordinates.
- 2020‑10‑03:
Compiler hardening and exploit mitigations for unsafe Rust.
- 2020‑10‑02:
Toward an API for the real numbers: exact arithmetic with decidable equality comparisons.
- 2020‑10‑01:
outflank-mailman: stop Mailman from breaking DKIM signatures.
- 2020‑09‑29:
Rob Pike on colour blindness.
- 2020‑09‑28:
FPspy: Spying on the floating point behavior of existing, unmodified scientific applications.
- 2020‑09‑28:
The weight of buildings and the raising of Chicago.
- 2020‑09‑28:
BBC Micro Elite source code and commentary.
- 2020‑09‑27:
A typed, algebraic approach to parser combinators.
- 2020‑09‑27:
Modular, composable, typed optimizations in the tagless-final style.
- 2020‑09‑26:
Guided tour of Bunnie's Precursor motherboard.
- 2020‑09‑26:
Techade quiz: A near-impossible guessing game of tech through the decades.
- 2020‑09‑25:
A PEG parser for CPython.
- 2020‑09‑25:
Using time travel to remotely debug faulty DRAM with Julia and rr.
- 2020‑09‑25:
Finding a goroutine bug with TLA+.
- 2020‑09‑25:
A pipeline made of airbags: live upgrades vs immutable infrastructure.
- 2020‑09‑24:
Traits as an emergent feature of Julia.
- 2020‑09‑24:
Bean Machine: a declarative probabilistic programming language for efficient programmable inference.
- 2020‑09‑24:
How the CPython compiler works.
- 2020‑09‑24:
Fast incremental compilation of Kotlin.
- 2020‑09‑24:
Void in Haskell is a smell.
- 2020‑09‑24:
Exploiting Tiny Tiny RSS.
- 2020‑09‑23:
Delivering 45x faster percentiles using PostgreSQL, Citus, and t-digest.
- 2020‑09‑23:
JuliaCon2020: Julia is production ready!
- 2020‑09‑23:
Haskell's children: Rust, Idris, Julia.
- 2020‑09‑23:
On YOLOsec and FOMOsec.
- 2020‑09‑22:
Data and Reality, 2nd edition.
- 2020‑09‑21:
Range: My least favorite Rust type.
- 2020‑09‑21:
John Regehr's integers in C quiz.
- 2020‑09‑21:
A new X.509 certificate chain validator for LibreSSL.
- 2020‑09‑21:
Tail call optimization and debugging.
- 2020‑09‑21:
A new backend for Cranelift: instruction selection.
- 2020‑09‑21:
Speeding up C++ compilation.
- 2020‑09‑21:
Dennis Ritchie's reflections on software research.
- 2020‑09‑20:
Why not Rust?
- 2020‑09‑20:
Taking MonetDB/e for a taxi ride.
- 2020‑09‑20:
FreeBSD's Subversion to Git migration: Why?
- 2020‑09‑20:
LLVM's getelementptr, by example.
- 2020‑09‑19:
What's the fastest way to chill your beer?
- 2020‑09‑19:
"Fake COTS" and the one-day rule.
- 2020‑09‑18:
A Cuban numbers station cryptologic mystery.
- 2020‑09‑18:
Supercomputing on Nitro in AWS cloud with Scalable Reliable Datagram (SRD).
- 2020‑09‑18:
Surfaces vs airborne: what we know now about Covid-19 transmission.
- 2020‑09‑18:
Taming nalgebra's Rustdoc.
- 2020‑09‑18:
Let's Encrypt's new ECDSA root and intermediate certificates.
- 2020‑09‑17:
DNS Flag Day 2020: what you need to know.
- 2020‑09‑17:
Maximizing DNS qname minimization.
- 2020‑09‑17:
Search and replace tricks with ripgrep.
- 2020‑09‑16:
The plot against Birmingham.
- 2020‑09‑16:
USB-C was supposed to simplify, but it's a total mess.
- 2020‑09‑16:
How America became obsessed with dips, sauces, dressings, and "food lube".
- 2020‑09‑16:
Efficient parallel and incremental parsing of practical context-free languages.
- 2020‑09‑16:
The missing datacenter OS.
- 2020‑09‑16:
Tips for PostgreSQL bulk data loading.
- 2020‑09‑16:
Reinventing virtualization with the AWS Nitro System.
- 2020‑09‑16:
A formalization and correctness proof of the CGOL language system / Pratt parser. (1975)
- 2020‑09‑16:
Differentiable dithering with gradient descent.
- 2020‑09‑15:
Which parsing approach?
- 2020‑09‑15:
Keeping time at NIST.
- 2020‑09‑15:
Debian-installer, mdadm configuration, and the bad blocks controversy.
- 2020‑09‑14:
Creating high-quality PDF/A documents using LaTeX.
- 2020‑09‑14:
What's so hard about PDF text extraction?
- 2020‑09‑13:
Diversity Explorer: ethnicity across England and Wales.
- 2020‑09‑13:
Design out waste in household electrical goods.
- 2020‑09‑12:
How GitLab.com upgraded PostgreSQL.
- 2020‑09‑11:
Getting MacOS style hotkeys working in GNU/Linux.
- 2020‑09‑10:
Leonardo da Vinci's ingenious design for a self-supporting bridge.
- 2020‑09‑10:
5 most annoying website features I face as a blind person every single day.
- 2020‑09‑09:
Hacking Ethernet out of FibreChannel cards.
- 2020‑09‑09:
Loko Scheme: an optimizing R6RS Scheme compiler.
- 2020‑09‑08:
An explainer on Ed25519 clamping.
- 2020‑09‑08:
What we didn't get: science fiction technologies that remained fictional.
- 2020‑09‑07:
How to speed up the Rust compiler one last time.
- 2020‑09‑07:
Named parameters using designated initializers in C++20.
- 2020‑09‑07:
The Capsule hash trie collections library for Java.
- 2020‑09‑06:
Lessons from the GNOME patent troll incident.
- 2020‑09‑05:
TOTP in 20 lines of Python.
- 2020‑09‑05:
The origins of XXX as a FIXME comment marker.
- 2020‑09‑04:
Some historical reflections on NSFNET.
- 2020‑09‑04:
Don't forget: the plural of anecdote is data.
- 2020‑09‑04:
Property testing and formal verification / symbolic execution in Rust with KLEE.
- 2020‑09‑03:
A demonstrator's guide to helmets.
- 2020‑09‑03:
The femme's guide to riot fashion: this season's hottest looks for the discerning anarchist.
- 2020‑09‑02:
Butler Lampson's updated and expanded hints and principles for computer system design.
- 2020‑09‑02:
On modern hardware the min-max heap beats a binary heap.
- 2020‑09‑02:
Write tracking for Nim.
- 2020‑09‑02:
The problem with C compatibility in C++.
- 2020‑09‑02:
jsonptr: using the wuffs memory-safe, zero-allocation JSON decoder.
- 2020‑09‑02:
The wuffs programming language: wrangling untrusted file formats safely.
- 2020‑09‑01:
Lunar: a Mac OS X utility to adjust the brightness of your external display.
- 2020‑09‑01:
PostgreSQL 13: don't let replication slots kill your primary.
- 2020‑09‑01:
This is not a sonic boom, it's a vapor cone.
- 2020‑09‑01:
Taking a look at Gerät 32620: the machine that powered numerous number stations.
- 2020‑09‑01:
How Arlo got injected into Ruby.
- 2020‑09‑01:
Understanding the X.500 directory.
- 2020‑08‑31:
Cracking Dlang Phobos pseudorandom UUIDs.
- 2020‑08‑31:
WebAssembly reference types in Wasmtime.
- 2020‑08‑31:
Why are there 5280 feet in a mile?
- 2020‑08‑31:
Sum types in Julia and Rust.
- 2020‑08‑30:
Python daemon ate my syslog message.
- 2020‑08‑30:
contained.af CTF.
- 2020‑08‑29:
WebAssembly troubles: WebAssembly is not a stack machine.
- 2020‑08‑29:
Travel demand modeling: the broken algorithm that poisoned American transportation.
- 2020‑08‑28:
Objective Rust.
- 2020‑08‑28:
Finger trees explained anew, and slightly simplified.
- 2020‑08‑28:
100 years to solve an integral: a history of the Mercator projection and the integral of the secant.
- 2020‑08‑28:
Rust-style futures in C with libuv.
- 2020‑08‑28:
Using Microsoft Word with git and pandoc.
- 2020‑08‑27:
PiSight: a Raspberry Pi inside an Apple iSight webcam.
- 2020‑08‑27:
Making QUIC quicker with NIC offload.
- 2020‑08‑27:
The design and implementation of BIND, a "Domain Names" resolver.
- 2020‑08‑27:
The design and implementation of the Berkeley Internet Name Domain (BIND) servers.
- 2020‑08‑27:
BIND: the Berkeley Internet Name Domain server.
- 2020‑08‑26:
UMASH: a fast and universal enough hash.
- 2020‑08‑26:
HTMLified C standard ISO/IEC 9899:2017.
- 2020‑08‑26:
PCI Express retimers vs. redrivers: an eye-popping difference.
- 2020‑08‑25:
Upgrading GitHub to Ruby 2.7.
- 2020‑08‑25:
Functional programming in m4.
- 2020‑08‑25:
Oracle to PostgreSQL: cursors and common table expressions.
- 2020‑08‑25:
Signifier: a brutalist response to the 17th century Oxford Fell typefaces.
- 2020‑08‑25:
Keeping CALM: when is distributed consistency easy?
- 2020‑08‑25:
Updating the PostgreSQL root.crt file for TLS client auth.
- 2020‑08‑24:
Recent advances in IPv6 security: Addressing.
- 2020‑08‑24:
Writing a fuzzer test case generator in Rust for a programming language such as Wasm.
- 2020‑08‑24:
BPF CO-RE: compile once, run everywhere for BPF portability.
- 2020‑08‑24:
Draw your own fourier epicycles.
- 2020‑08‑24:
Challenge to scientists: does your ten-year-old code still run?
- 2020‑08‑24:
Building resilient services at Amazon Prime Video with chaos engineering.
- 2020‑08‑24:
Here I stand, free: noexcept allocators and an inclusive C++ STL.
- 2020‑08‑24:
A clean start for the web?
- 2020‑08‑24:
Javascript generators, meet XPath.
- 2020‑08‑24:
Incident updates, interruptions and the 30 minute window.
- 2020‑08‑24:
The BLISS programming language: a history.
- 2020‑08‑24:
Never run `python` in your downloads folder.
- 2020‑08‑23:
As above, so below: Bare metal Rust generics.
- 2020‑08‑23:
Five stages of accepting constructive mathematics.
- 2020‑08‑22:
Mesh: a compacting memory allocator for C/C++.
- 2020‑08‑22:
Understanding memory fragmentation in GHC Haskell.
- 2020‑08‑21:
How NAT traversal works.
- 2020‑08‑21:
Nyxt: an extensible keyboard-oriented web browser written in Common LISP.
- 2020‑08‑21:
Why did Mozilla remove XUL add-ons from Firefox?
- 2020‑08‑21:
Google Chromium's impact on root DNS traffic.
- 2020‑08‑21:
Adding a microSD slot to a reMarkable tablet.
- 2020‑08‑21:
ARX, Arthur and RISC OS.
- 2020‑08‑20:
Code smell: concrete abstraction.
- 2020‑08‑20:
How the Linux kernel starts on ARM32.
- 2020‑08‑20:
Can't you just right click? Running unsigned code on Mac OS X.
- 2020‑08‑20:
A deep dive into the official Docker image for Python.
- 2020‑08‑20:
A documentation system: tutorials / howtos / reference / explanation.
- 2020‑08‑19:
Leading-trim: a future CSS spec for better vertical spacing in digital typography.
- 2020‑08‑19:
How to contact Google SRE by dropping a shell in Cloud SQL.
- 2020‑08‑19:
Evaluating TCP BBRv2 on the Dropbox edge network.
- 2020‑08‑19:
Contention adapting search tree: Erlang's new scalable ETS ordered set data structure.
- 2020‑08‑19:
Open problems in robotics.
- 2020‑08‑19:
Speeding up json parsing in Golang.
- 2020‑08‑19:
Switching from i3 to Sway on Ubuntu 20.04.
- 2020‑08‑19:
The case of the top secret iPod.
- 2020‑08‑18:
The medieval university duopoly in England.
- 2020‑08‑18:
How to break everything by fuzz testing.
- 2020‑08‑18:
Fuzzing a C/C++ API with DeepState.
- 2020‑08‑18:
Testing GNU coreutils with KLEE.
- 2020‑08‑18:
Measuring the coverage achieved by symbolic execution.
- 2020‑08‑17:
Responsible and effective bugfinding.
- 2020‑08‑17:
Using a Yubikey as a touchless, magic unlock key for Linux.
- 2020‑08‑17:
Proposed register-based Golang calling convention.
- 2020‑08‑17:
A first look at IPv4 transfer market misuse.
- 2020‑08‑17:
A 35-year-old bug in patch found during the 2.11BSD restoration project.
- 2020‑08‑16:
The Gartner hype cycle is ... hype.
- 2020‑08‑16:
Error recovery with parser combinators, using Rust and nom.
- 2020‑08‑16:
daScript: a high performance scripting language.
- 2020‑08‑15:
How the Intel 8086 distributes power and clock signals.
- 2020‑08‑14:
The optical mouse, and an architectural methodology for smart digital sensors. (Xerox PARC, 1981)
- 2020‑08‑14:
Constructive vs predicative data types.
- 2020‑08‑14:
Types as axioms, or: playing god with static types.
- 2020‑08‑14:
Netgpu and the hazards of proprietary Linux kernel modules.
- 2020‑08‑14:
The newspaper of the air: early experiments with radio facsimile.
- 2020‑08‑14:
DNS problems with conntrack and Kubernetes.
- 2020‑08‑14:
Mpemba effect: what conditions make hot water freeze faster than cold water?
- 2020‑08‑13:
Rust does not have a stable ABI.
- 2020‑08‑13:
Interactive HTML trees with no JavaScript and no CSS.
- 2020‑08‑13:
Handles are the better pointers.
- 2020‑08‑13:
A guide to contiguous data in Rust.
- 2020‑08‑12:
Linux eBPF projects and documentation.
- 2020‑08‑12:
Building a better Golang linker.
- 2020‑08‑11:
Dorking: how to find anything on the web.
- 2020‑08‑11:
Take a virtual tour of ORNL's supercomputer center.
- 2020‑08‑11:
Exposing and circumventing China's censorship of TLS/1.3 ESNI.
- 2020‑08‑10:
Surviving Rust async interfaces.
- 2020‑08‑10:
The great American sci-fi utopia or dystopia? (Kim Stanley Robinson)
- 2020‑08‑10:
9 crappy paradoxes that shape nonprofit and philanthropy.
- 2020‑08‑09:
UK radon maps.
- 2020‑08‑09:
Tracking running processes on Linux.
- 2020‑08‑09:
EdgeQL: we can do better than SQL.
- 2020‑08‑09:
The '-ize' have it!
- 2020‑08‑08:
A star went supernova in 1987. Where is it now?
- 2020‑08‑07:
Hello! You've been referred here because you're wrong about section 230 of the Communications Decency Act.
- 2020‑08‑07:
How hard is it to type-check your favorite language?
- 2020‑08‑07:
After nearly a century, elusive CNO neutrinos from the Sun are finally detected.
- 2020‑08‑07:
Why shaving dulls even the sharpest of razors.
- 2020‑08‑07:
crush: a command line shell that is also a powerful modern programming language.
- 2020‑08‑07:
Steve Crocker on the history of RFCs.
- 2020‑08‑06:
lacc: a simple, self-hosting C89 compiler.
- 2020‑08‑06:
The Myrddin programming language.
- 2020‑08‑06:
cproc: a C11 compiler using QBE as a backend.
- 2020‑08‑06:
A project to restore Interlisp-D to usability on modern OSes.
- 2020‑08‑06:
Monads and intensionality: Lucid is not an abberation.
- 2020‑08‑06:
Ten takeaways from ten years at Retraction Watch.
- 2020‑08‑05:
TikTok and the Sorting Hat.
- 2020‑08‑05:
What alternate reality games can teach us about QAnon.
- 2020‑08‑05:
Myth and monolith: the Nine Elms Cold Store.
- 2020‑08‑04:
Syntax changes in lambda expressions between C++11 and C++20.
- 2020‑08‑04:
Swift type checking is undecidable.
- 2020‑08‑03:
The UX of Lego interface panels.
- 2020‑08‑03:
Lecture notes on static program analysis.
- 2020‑08‑03:
Julia 1.5 release highlights.
- 2020‑08‑03:
COVID-19: We need to talk about airborne transmission and ventilation.
- 2020‑08‑02:
Rich: a Python library for rich text and beautiful formatting in the terminal.
- 2020‑08‑02:
How a cheese goes extinct.
- 2020‑08‑02:
Time traveling in Haskell: how it works and how to use it.
- 2020‑08‑02:
Measuring and examining TLS 1.3, IPv4, and IPv6 performance.
- 2020‑08‑02:
Measuring linux performance: how to avoid typical mistakes.
- 2020‑08‑02:
The lost history of PReP: Windows NT 3.5x on PowerPC and the RS/6000 40p.
- 2020‑08‑02:
Why are we using black box models in AI when we don't need to?
- 2020‑08‑02:
Low latency tuning guide for x86 Linux systems.
- 2020‑08‑02:
GPU.js: GPU accelerated JavaScript.
- 2020‑08‑02:
Hacking up a fix for the broken AppleTalk kernel module in Linux 5.1 and newer.
- 2020‑08‑02:
Homemade pasta.
- 2020‑08‑01:
How to harvest credit card numbers and passwords from lots of web sites.
- 2020‑08‑01:
WordSafety: check a name for unwanted meanings in foreign languages.
- 2020‑08‑01:
Compressing authority with cryptographic accumulators.
- 2020‑08‑01:
The politics of optimism.
- 2020‑08‑01:
Defragmenting DNS: determining the optimal maximum UDP response size for DNS.
- 2020‑07‑31:
Can I use CSS and HTML in email?
- 2020‑07‑31:
Apple emails reveal internal debate on right to repair.
- 2020‑07‑31:
Why are plants green? To reduce the noise in photosynthesis.
- 2020‑07‑30:
How Dropbox migrated from Nginx to Envoy.
- 2020‑07‑30:
Refactoring the FreeBSD kernel with Checked C.
- 2020‑07‑30:
Lockless algorithms for mere mortals?
- 2020‑07‑30:
Solving the expiring. X.509 root CA certificate-mageddon, partly at least.
- 2020‑07‑30:
Parallel stream processing with Rayon in Rust.
- 2020‑07‑30:
If language began in the hands, why did it ever leave?
- 2020‑07‑30:
Sizedness in Rust.
- 2020‑07‑30:
An introduction to data oriented design with Rust.
- 2020‑07‑30:
Speculative compilation in WebKit JavaScriptCore.
- 2020‑07‑30:
Pluto's dark side spills its secrets, including hints of a hidden ocean.
- 2020‑07‑30:
PostgreSQL 9.3's powerful new join type: LATERAL.
- 2020‑07‑30:
Some SQL tricks from an Application DBA.
- 2020‑07‑30:
RBS type signature files in Ruby 3.
- 2020‑07‑29:
Unicode normalization in PostgreSQL 13.
- 2020‑07‑29:
In October 1953, Paul Niquette coined the word 'software'.
- 2020‑07‑29:
Historic Usenet archive is disappearing from Google Groups.
- 2020‑07‑28:
The inescapable whiteness of Avatar: The Legend of Korra, and its uncomfortable implications.
- 2020‑07‑28:
DINR2020: DNS and Internet Naming Research Directions workshop.
- 2020‑07‑28:
Why inter-domain multicast now makes sense.
- 2020‑07‑28:
When Unix learned to reboot(2).
- 2020‑07‑28:
Mapping a universe of open source software: the Nixpkgs dependency graph.
- 2020‑07‑27:
Can applications recover from fsync() failures?
- 2020‑07‑27:
Apache Arrow and the 10 things I hate about pandas.
- 2020‑07‑27:
What is Apache Arrow?
- 2020‑07‑27:
Highlights from git 2.28.
- 2020‑07‑27:
Fanout and latency percentiles in distributed systems.
- 2020‑07‑27:
Monads and mom.
- 2020‑07‑27:
remake: GNU make with enhanced tracing, error reporting, debugging, profiling and more.
- 2020‑07‑27:
Compiling with a sea of nodes.
- 2020‑07‑27:
Should I block ICMP?
- 2020‑07‑27:
CVE-2020-13777 GnuTLS passive plaintext recovery vulnerability.
- 2020‑07‑26:
Preliminary benchmarking results for a Haskell I/O manager backend based on io_uring.
- 2020‑07‑26:
Colorize your CLI.
- 2020‑07‑26:
Corecursion and coinduction: what they are and how they relate to recursion and induction.
- 2020‑07‑26:
The history, status, and future of FPGAs.
- 2020‑07‑26:
Why people tend to appreciate men's humor so much more than women's.
- 2020‑07‑25:
Cryptography is not magic.
- 2020‑07‑25:
Bloom filters debunked: dispelling 30 years of bad math with Coq!
- 2020‑07‑24:
Meritocracy is not only false, it's bad for you.
- 2020‑07‑24:
Shadow attacks: hiding and replacing content in signed PDFs.
- 2020‑07‑24:
Cold showers on overhyped topics in computer science.
- 2020‑07‑24:
TechEmpower web framework benchmarks.
- 2020‑07‑24:
Demystifying MLsub: the simple essence of algebraic subtyping.
- 2020‑07‑23:
Why is CSS the way it is?
- 2020‑07‑23:
Buzzy: dependency management for C.
- 2020‑07‑23:
Exploring Algol 68 in the 21st century.
- 2020‑07‑23:
New features in gnuplot 5.4.
- 2020‑07‑22:
MineSweeper implemented in CSS and HTML and no JavaScript.
- 2020‑07‑22:
How to check the status of Rust features.
- 2020‑07‑22:
caniuse.rs: Rust feature search.
- 2020‑07‑22:
Next steps for single ownership and RAII. (C++/Vale/Rust)
- 2020‑07‑21:
The null process.
- 2020‑07‑21:
UTN #39: bidi brackets for dummies.
- 2020‑07‑21:
Essays on programming I think about a lot.
- 2020‑07‑21:
Lisp: the many faces of an undying programming language.
- 2020‑07‑21:
Syntax highlighting is a waste of an information channel.
- 2020‑07‑21:
An explanation of Rust's module system.
- 2020‑07‑20:
Certificate Transparency: a bird's-eye view.
- 2020‑07‑20:
Three architectures for a responsive IDE.
- 2020‑07‑20:
Journeying into XDP (express data path) for in-kernel eBPF DNS acceleration.
- 2020‑07‑20:
Ireland donates its COVID tracker app to Linux Foundation.
- 2020‑07‑20:
The quest for very wide outlines: optimized GPU silhouettes.
- 2020‑07‑19:
The cpio trailer problem.
- 2020‑07‑19:
How Newton's Philosophiæ Naturalis Principia Mathematica came to be published.
- 2020‑07‑17:
Repurposing FPGA-based products as development kits.
- 2020‑07‑17:
Unicode for Mayan hieroglyphs.
- 2020‑07‑17:
Straightened trees.
- 2020‑07‑17:
The impact of Heartbleed on OpenSSL's development practices.
- 2020‑07‑17:
DDR5 memory specification released.
- 2020‑07‑16:
Shipping const generics for Rust in 2020.
- 2020‑07‑16:
Patricia Crowther inspired one of the first hit video games by mapping the world's longest cave.
- 2020‑07‑16:
Hacking Reolink IP cameras for fun and profit.
- 2020‑07‑16:
Python pickle's nine flaws.
- 2020‑07‑16:
IPv6 and the DNS.
- 2020‑07‑16:
Systems Performance: Enterprise and the Cloud, 2nd Edition.
- 2020‑07‑16:
Back into FreeBSD's wireless stack and 802.11ac.
- 2020‑07‑16:
Introducing the GitHub availability report.
- 2020‑07‑16:
Lezer: a JavaScript parser generator for the CodeMirror 6 editor.
- 2020‑07‑16:
What's new in Lua 5.4.
- 2020‑07‑16:
Why even unused data needs to be valid in Rust.
- 2020‑07‑16:
Two beautiful Rust programs.
- 2020‑07‑15:
PgTyped: raw SQL in TypeScript with guaranteed type-safety.
- 2020‑07‑15:
Rewriting FORTRAN software in Rust.
- 2020‑07‑14:
In search of 2.11BSD, as originally released.
- 2020‑07‑14:
MessagePack vs CBOR (RFC7049).
- 2020‑07‑14:
SIGred: exploiting a 17 year-old bug in Windows DNS servers.
- 2020‑07‑14:
Etcd, or, why modern software makes me sad.
- 2020‑07‑14:
How Futhark implements array bounds checking on the GPU.
- 2020‑07‑14:
SSSE3 fast popcount.
- 2020‑07‑14:
The GDPR explained by Americans.
- 2020‑07‑14:
Understanding the F5 Networks BIG-IP remote code execution vulnerability CVE-2020-5902.
- 2020‑07‑14:
Too many objects: Reducing memory overhead from Python instances.
- 2020‑07‑14:
Color e-ink displays are arriving soon in ebook and e-note devices.
- 2020‑07‑14:
Why are LED indicator lights (especially blue ones) so annoying?
- 2020‑07‑14:
Making system(3) and popen(3) use posix_spawn(3) on NetBSD.
- 2020‑07‑13:
A PostgreSQL developer's .psqlrc
- 2020‑07‑13:
pgx: build PostgreSQL extensions with Rust.
- 2020‑07‑13:
Fuzzing rumpkernel syscalls.
- 2020‑07‑13:
Optimizations in C++ compilers: a practical journey.
- 2020‑07‑13:
The rectangle rule for code formatting style.
- 2020‑07‑13:
The computing demands of deep learning are so great that progress is stalling.
- 2020‑07‑13:
ARM64 popcount in Golang and assembler.
- 2020‑07‑13:
ELF statifier: create a static executable from a binary and its libraries.
- 2020‑07‑12:
When master/slave does not make sense.
- 2020‑07‑12:
Xerox 48-bit absolute internet and Ethernet host numbers. (1981)
- 2020‑07‑12:
sed-bin: a sed to C translator written in sed.
- 2020‑07‑12:
Land of monopolists: private equity 'roll-ups' hit virtually everything.
- 2020‑07‑12:
Infrastructure: our cyborg collective body, ourselves.
- 2020‑07‑12:
When SimCity got serious: the story of Maxis Business Simulations and SimRefinery.
- 2020‑07‑11:
mbeddr: integrated and extensible languages for embedded software, plus an IDE.
- 2020‑07‑11:
The Frink is good, the unit is evil.
- 2020‑07‑10:
A history of Usenet and FidoNet.
- 2020‑07‑09:
The Prancing Pony vending machine at SAIL.
- 2020‑07‑09:
The top types any and unknown in TypeScript.
- 2020‑07‑09:
C++ hashmaps benchmarks.
- 2020‑07‑09:
The "smol" Rust async runtime.
- 2020‑07‑09:
Low accuracy solar position equations.
- 2020‑07‑09:
Sunrise / sunset algorithm.
- 2020‑07‑09:
FPGA softcore SoC shootout.
- 2020‑07‑08:
GNU: a heuristic for bad cryptography.
- 2020‑07‑08:
cwrap: testing Samba (or your full software stack) on a single machine.
- 2020‑07‑08:
Symbolic execution with SymCC: don't interpret, compile!
- 2020‑07‑08:
yubikey-agent: a seamless ssh-agent for YubiKeys.
- 2020‑07‑08:
ip2unix: turn IP sockets into Unix domain sockets.
- 2020‑07‑08:
Tech confronts its use of the labels 'master' and 'slave'.
- 2020‑07‑07:
Google Common Lisp style guide.
- 2020‑07‑07:
The Pyret Code: a rationale for the Pyret programming language.
- 2020‑07‑07:
Don't Panic! Better, fewer, syntax errors for LR parsers.
- 2020‑07‑07:
Statically sized higher-kinded polymorphism.
- 2020‑07‑07:
An autoscaling-related outage at Slack.
- 2020‑07‑07:
1:60 scale model of a Boeing 777, made entirely from manila folders.
- 2020‑07‑07:
Division by zero in type theory: a FAQ.
- 2020‑07‑06:
Small strings in Rust.
- 2020‑07‑06:
Licklider's memorandum for members and affiliates of the intergalactic computer network. (1963)
- 2020‑07‑06:
Behind the scenes at the Marmite factory in Burton-on-Trent.
- 2020‑07‑06:
UASP makes Raspberry Pi 4 disk IO 50% faster.
- 2020‑07‑04:
Noisia: a harmful workload generator for PostgreSQL.
- 2020‑07‑04:
Hamilton on film now is a very different experience than the Broadway show was then.
- 2020‑07‑04:
Many newsrooms are now capitalizing the B in Black. Here are some of the people who made that happen.
- 2020‑07‑04:
Websites that look like desktop GUIs.
- 2020‑07‑04:
The unplanned impact of mathematics.
- 2020‑07‑03:
Code only says what it does.
- 2020‑07‑03:
BLOB storage in PostgreSQL.
- 2020‑07‑02:
Encrypted DNS support in iOS 14 and macOS 11.
- 2020‑07‑02:
The alias method for efficiently sampling from a discrete probability distribution.
- 2020‑07‑02:
Weighted round robin / weighted random integers with the golden ratio low discrepancy sequence.
- 2020‑07‑02:
On the closing of Living Computers: Museum+Labs.
- 2020‑07‑02:
Generics for Golang.
- 2020‑07‑02:
Taking over Azure DevOps accounts with 1 click using a subdomain takeover.
- 2020‑07‑01:
Complete spatial safety for C and C++ using CHERI capabilities.
- 2020‑07‑01:
Implementing the exponential function.
- 2020‑07‑01:
Join strategies and performance in PostgreSQL.
- 2020‑07‑01:
Inside Apple Lightning.
- 2020‑07‑01:
Spies, lies, and stonewalling: what it's like to report on Facebook.
- 2020‑07‑01:
The ARM Morello board: porting experimental capability extensions from CHERI-MIPS.
- 2020‑07‑01:
Getting to the bottom of Noether's theorem.
- 2020‑07‑01:
Raspberry Pi 4 PCIe bridge "chip".
- 2020‑07‑01:
Rendering multimedia in pure C.
- 2020‑07‑01:
What is Zig's “colorblind” async/await?
- 2020‑07‑01:
What is the Scudo hardened allocator? (used by LLVM sanitizers and Android)
- 2020‑06‑30:
Argdown: A simple syntax for complex argumentation.
- 2020‑06‑30:
What is prototype pollution in JavaScript?
- 2020‑06‑30:
Why aren't regular expressions a lingua franca? An empirical study of re-use and portability.
- 2020‑06‑30:
To what does the harmonic series converge? (in IEEE754 floating point)
- 2020‑06‑29:
A few more reasons Rust compiles slowly.
- 2020‑06‑29:
Why birds can fly over Mount Everest.
- 2020‑06‑29:
Understand Wi-Fi 4/5/6/6E (802.11 n/ac/ax).
- 2020‑06‑29:
Minkowski asteroids.
- 2020‑06‑28:
Whither chroot?
- 2020‑06‑28:
Roy Fielding's misappropriated REST dissertation.
- 2020‑06‑28:
Implementing a type-safe printf in Rust.
- 2020‑06‑28:
Property-based testing in Rust with Proptest.
- 2020‑06‑28:
String formatting is unreasonably expensive for embedded Rust.
- 2020‑06‑28:
ELF: better symbol lookup via DT_GNU_HASH.
- 2020‑06‑27:
Examining ARM vs x86 memory models with Rust.
- 2020‑06‑25:
World capitals Voronoi map.
- 2020‑06‑25:
Implementations for Gray code encoding and decoding.
- 2020‑06‑25:
Query-based compiler architectures.
- 2020‑06‑25:
Zealandia: Earth's 8th continent.
- 2020‑06‑24:
Exploiting an Envoy http proxy heap vulnerability.
- 2020‑06‑24:
Control theory for fun and profit.
- 2020‑06‑24:
Path building vs path verifying X.509 certificate validation implementation showdown.
- 2020‑06‑24:
Faster integer parsing.
- 2020‑06‑24:
The largest city in each 10x10 degree latitude/longitude box.
- 2020‑06‑24:
Incommensurability: the structure of a programming language revolution.
- 2020‑06‑24:
What I've learnt so far about writing research papers.
- 2020‑06‑24:
Indexing JSONB columns in PostgreSQL.
- 2020‑06‑24:
Iceland's CO2 emissions could be reduced by 30% by replacing carbon electrodes in aluminium smelters.
- 2020‑06‑24:
Announcing Perl 7: it's just Perl 5 with more modern defaults.
- 2020‑06‑24:
GRIN: LLVM-based whole program optimizer for lazy and strict functional languages.
- 2020‑06‑24:
Transport for London's impossible finances during the pandemic.
- 2020‑06‑23:
Is WebP really better than JPEG?
- 2020‑06‑23:
Oilpan: high-performance garbage collection for C++ in V8.
- 2020‑06‑23:
Being glue.
- 2020‑06‑23:
Stretching the Commodore 64 palette.
- 2020‑06‑23:
Cheap tricks for high-performance Rust.
- 2020‑06‑23:
Fujitsu's Fugaku and Arm A64FX in the fastest supercomputer at 415 petaFLOPs.
- 2020‑06‑23:
Ego graphs and the Google 'vs' trick.
- 2020‑06‑23:
Rust's huge compilation units.
- 2020‑06‑22:
The archetype of a message-passing bug in Rust.
- 2020‑06‑22:
Measuring route origin validation.
- 2020‑06‑22:
Maersk, notPetya, and me.
- 2020‑06‑20:
Why you hate contemporary architecture.
- 2020‑06‑20:
Everything I've learned about solar storm risk and EMP attacks.
- 2020‑06‑20:
Discovering Dennis Ritchie's lost dissertation.
- 2020‑06‑19:
Errors in Rust: a deep dive.
- 2020‑06‑19:
Memory consistency models: a tutorial.
- 2020‑06‑19:
A concise guide to the Golang generics draft design.
- 2020‑06‑19:
Linear types for Haskell are merged into GHC.
- 2020‑06‑19:
The Go+ language for data science.
- 2020‑06‑19:
poica: algebraic data types with pattern matching and type introspection for C.
- 2020‑06‑18:
Consistency models for concurrent and distributed systems.
- 2020‑06‑18:
The Apollo 11 lunar ranging experiment at the Lick Observatory.
- 2020‑06‑18:
The magnetic amplifier: a lost technology of the 1950s.
- 2020‑06‑17:
Oracle to PostgreSQL: basic architecture.
- 2020‑06‑17:
TERF wars: why transphobia has no place in feminism.
- 2020‑06‑17:
Composite data type performance issues in PostgreSQL.
- 2020‑06‑16:
The next step for generics in Golang.
- 2020‑06‑16:
How browsers work: behind the scenes of modern web browsers.
- 2020‑06‑16:
Generics and compile time in Rust.
- 2020‑06‑16:
Understanding user management in PgBouncer.
- 2020‑06‑16:
Intel's port 7 AGU blunder.
- 2020‑06‑15:
Dumbindent: because 93% of the time was spent in clang-format.
- 2020‑06‑15:
The Postgres and Illustra codelines.
- 2020‑06‑15:
Unix® certified products.
- 2020‑06‑15:
Looking back at Postgres.
- 2020‑06‑15:
Guix further reduces bootstrap seed to 60MB.
- 2020‑06‑14:
META II: a syntax-oriented compiler writing language. (1964)
- 2020‑06‑14:
ACM HOPL IV proceedings.
- 2020‑06‑14:
Intel vs AWS Graviton ARM performance for MinIO S3-compatible object storage.
- 2020‑06‑14:
The origins of Objective-C at PPI/Stepstone and its evolution at NeXT.
- 2020‑06‑14:
Fast 2D rendering on GPU.
- 2020‑06‑13:
fortraith: evaluate Forth at compile time using Rust traits.
- 2020‑06‑13:
Bugs found in database management systems with SQLancer.
- 2020‑06‑13:
Bicycle geometry terminology.
- 2020‑06‑12:
Event Tracing for Windows: the worst API ever made.
- 2020‑06‑12:
Jepsen: PostgreSQL 12.3.
- 2020‑06‑12:
Memory-safety challenge considered solved? An empirical study of Rust CVEs.
- 2020‑06‑12:
The story of tail call optimization in Rust.
- 2020‑06‑12:
How to implement search-by-colour using Color Thief and PostgreSQL.
- 2020‑06‑12:
Async Python is not faster.
- 2020‑06‑12:
V8's RegExp engine in SpiderMonkey.
- 2020‑06‑12:
Graph and tree traversals in Rust.
- 2020‑06‑12:
Bringing my Emacs from the past.
- 2020‑06‑12:
Essential and relevant: a unit test balancing act.
- 2020‑06‑12:
In search of the original Fortran compiler.
- 2020‑06‑12:
A history of the LISP 2 project.
- 2020‑06‑11:
Unicode security considerations.
- 2020‑06‑11:
Merkle trees and build systems with OSTree and ninja.
- 2020‑06‑11:
Flat UI elements attract less attention and cause uncertainty.
- 2020‑06‑11:
Speeding up a Git monorepo.
- 2020‑06‑11:
Global kernel locks in Mac OS X APFS.
- 2020‑06‑08:
Failover replication slots for PostgreSQL.
- 2020‑06‑08:
Bifrost meets GNOME: Onward and upward to zero graphics blobs.
- 2020‑06‑08:
The pain points of Haskell: a practical summary.
- 2020‑06‑08:
Getting hands-on with io_uring using Golang.
- 2020‑06‑06:
USB-C is still a mess.
- 2020‑06‑06:
Every Jurassic Park dinosaur illustrated with modern science.
- 2020‑06‑06:
How to organize your Rust tests.
- 2020‑06‑05:
printf-tac-toe, and a guide to printf-oriented programming.
- 2020‑06‑05:
Featherweight Golang.
- 2020‑06‑04:
Modern router architecture and IPv6.
- 2020‑06‑04:
Overcoming the challenges of IPv6 support in BIND.
- 2020‑06‑03:
Testing Rust with manual coverage marks.
- 2020‑06‑03:
Autovectorization for AVX and AVX2 in Rust.
- 2020‑06‑03:
Fuzzing Sequoia-PGP.
- 2020‑06‑03:
Programming Servo: integrating streams.
- 2020‑06‑03:
Drawing a Sierpiński triangle with recursive SQL and SVG.
- 2020‑06‑03:
Locks in PostgreSQL.
- 2020‑06‑03:
Removing PostgreSQL bottlenecks caused by high traffic.
- 2020‑06‑03:
Software development as advanced damage control.
- 2020‑06‑03:
The rise and fall of commercial Smalltalk.
- 2020‑06‑03:
A Smalltalk 80 implementation and tools.
- 2020‑06‑03:
A Kea developer's take on IPv6 and DHCP.
- 2020‑06‑02:
Die analysis of the 8087 math coprocessor's fast bit shifter.
- 2020‑06‑02:
IPv6 and Rust.
- 2020‑06‑02:
Book review: the origin of consciousness in the breakdown of the bicameral mind.
- 2020‑05‑31:
List of well-known web sites that port scan their visitors.
- 2020‑05‑31:
Hoare's rebuttal and bubble sort's comeback: a fast quicksort.
- 2020‑05‑29:
The radix 2^51 trick.
- 2020‑05‑29:
Algol 60 implementation. (1964)
- 2020‑05‑29:
Oxidizing the technical interview.
- 2020‑05‑29:
40th anniversary of uuencode.
- 2020‑05‑28:
What science can tell us about C and C++'s security.
- 2020‑05‑27:
ISO 7000 graphical symbols for use on equipment.
- 2020‑05‑27:
What is FETCH FIRST WITH TIES in PostgreSQL 13?
- 2020‑05‑27:
PostgreSQL tips for optimizing Django and Python performance.
- 2020‑05‑27:
PostgreSQL EXPLAIN ANALYZE may be lying to you.
- 2020‑05‑27:
How to kill a dinosaur in 10 minutes.
- 2020‑05‑27:
History of UNIX manpages.
- 2020‑05‑27:
eBay port scans visitors' computers for remote access programs.
- 2020‑05‑27:
Ancient Egyptian coffins and mystery of 'black goo'.
- 2020‑05‑27:
Random worldbuilding: the nation in history.
- 2020‑05‑27:
macOS 10.15 Catalina: slow by design.
- 2020‑05‑27:
C++20: the unspoken features.
- 2020‑05‑27:
By the Bluebook implementation of Smalltalk-80.
- 2020‑05‑26:
Who says C is simple?
- 2020‑05‑26:
Coolest features of non-Java JVM languages.
- 2020‑05‑26:
How Internet communities function.
- 2020‑05‑26:
Science fiction timeline of inventions.
- 2020‑05‑26:
Bloaty McBloatface: a size profiler for binaries.
- 2020‑05‑26:
Using ASDL to describe ASTs in CPython.
- 2020‑05‑26:
Datamash: command-line computation on tabular files.
- 2020‑05‑26:
Adventures of porting MUSL libc to Sony PS4 BSD.
- 2020‑05‑26:
Why is Idris 2 so much faster than Idris 1?
- 2020‑05‑25:
libfirm/cparser: C99 parser and frontend.
- 2020‑05‑25:
7 scandalous weird old things about the C preprocessor.
- 2020‑05‑25:
std::format in C++20.
- 2020‑05‑23:
DuckDB: an embeddable analytical SQL database.
- 2020‑05‑23:
Porting BSD to GCC and ANSI C. (1988)
- 2020‑05‑21:
Why upgrade PostgreSQL?
- 2020‑05‑21:
Three bugs in the Golang MySQL driver.
- 2020‑05‑20:
A guide to global data in Rust.
- 2020‑05‑20:
The next few years for Rust Analyzer.
- 2020‑05‑20:
Taking advantage of auto-vectorization in Rust.
- 2020‑05‑20:
Structuring and handling errors in Rust.
- 2020‑05‑20:
15 years later: remote code execution in qmail.
- 2020‑05‑20:
The death of corporate research labs.
- 2020‑05‑20:
Lisa Piccirillo solved a decades-old Conway knot problem.
- 2020‑05‑20:
A KVM host in a few lines of code.
- 2020‑05‑19:
Computerized flight booking: a technology that changed air travel.
- 2020‑05‑19:
Does the QUIC handshake require compression to be fast?
- 2020‑05‑15:
Writing a Wayland compositor in Rust.
- 2020‑05‑15:
GPU architecture resources.
- 2020‑05‑15:
Notes on io-uring.
- 2020‑05‑15:
time_it! a case study in Rust macros.
- 2020‑05‑15:
Rust verification tools.
- 2020‑05‑15:
What's the difference between a Rust char and a Go rune? Unicode scalar values vs code points.
- 2020‑05‑15:
Yak shaving #ifdef-style conditional compilation in Rust.
- 2020‑05‑15:
Building an ASN1 codec with the Rust FFI.
- 2020‑05‑15:
Rust closures in FFI.
- 2020‑05‑15:
Five years of Rust.
- 2020‑05‑14:
Differential testing for software (such as compilers).
- 2020‑05‑14:
Bosque: a TypeScript-like programming language that compiles to native code.
- 2020‑05‑14:
Typesetting Markdown with Pandoc, Lua, and ConTeXt.
- 2020‑05‑14:
Hardware store elimination.
- 2020‑05‑14:
This word does not exist.
- 2020‑05‑14:
Why do dragons have eyes on the sides of their heads?
- 2020‑05‑14:
Deno 1.0: TypeScript and v8 on the command line, in Rust.
- 2020‑05‑13:
PostgreSQL now() vs. 'NOW'::timestamp vs. clock_timestamp().
- 2020‑05‑13:
The case of the missing DNS packets.
- 2020‑05‑13:
Why AES-GCM sucks.
- 2020‑05‑13:
A no_std Rust binary.
- 2020‑05‑12:
The success and failure of the Ninja build system.
- 2020‑05‑12:
The science of ginger milk curd.
- 2020‑05‑12:
Confessions of Marcus Hutchins, the hacker who killed WannaCry.
- 2020‑05‑11:
John Conway's FRACTRAN, a ridiculous yet surprisingly deep language.
- 2020‑05‑10:
Ensmallening Go binaries by prohibiting comparisons.
- 2020‑05‑09:
Using integer linear programming to solve complex logic.
- 2020‑05‑09:
The original cookie specification from 1997 was GDPR compliant.
- 2020‑05‑06:
Rules for writers.
- 2020‑05‑06:
Cheating higher ranked types with traits in Rust.
- 2020‑05‑06:
Take care editing bash scripts.
- 2020‑05‑05:
A map of trees in London.
- 2020‑05‑04:
Backup manifests and pg_verifybackup in PostgreSQL 13.
- 2020‑05‑04:
Lessons learned improving RPKI.
- 2020‑05‑04:
How to read UTF-8 passwords on the Windows console.
- 2020‑05‑04:
7 things that could be improved in PostgreSQL.
- 2020‑05‑04:
Oracle vs PostgreSQL: a first glance.
- 2020‑05‑04:
Bit twiddling hacks: check for borrows in bitwise operations.
- 2020‑05‑03:
Fairphone and /e/ team up to build open source, Google-free, sustainable smartphone.
- 2020‑05‑03:
Some medium-hard data analyst SQL interview questions.
- 2020‑05‑02:
Psychic paper: an iOS entitlement XML plist parsing bug.
- 2020‑05‑02:
Concurrent hash tables: fast and general?!
- 2020‑05‑02:
An embedded Rust pattern: zero sized references.
- 2020‑05‑01:
Notes on writing parsers in Rust.
- 2020‑05‑01:
Disabling Snaps in Ubuntu 20.04.
- 2020‑04‑30:
Announcing the SourceHut project hub.
- 2020‑04‑30:
Game of Life in 32 bytes.
- 2020‑04‑30:
HashiCorp Vault is overhyped, and Mozilla SOPS with KMS and git is underrated.
- 2020‑04‑30:
Troubleshooting systemd with SystemTap.
- 2020‑04‑29:
Reducing the size of a Rust GStreamer plugin.
- 2020‑04‑29:
Why strace doesn't work in Docker.
- 2020‑04‑29:
A collection of weird debugging stories.
- 2020‑04‑29:
CSS for i18n.
- 2020‑04‑29:
Postgres.app: an easy Mac OS installer for PostgreSQL.
- 2020‑04‑29:
Paxosmon: gotta consensus them all!
- 2020‑04‑28:
The many flavours of the arcane SQL MERGE statement.
- 2020‑04‑28:
A warm welcome to ASN.1 and DER.
- 2020‑04‑28:
Paxos vs Raft: have we reached consensus on distributed consensus?
- 2020‑04‑27:
First release of rust-analyzer.
- 2020‑04‑27:
For better videoconferencing at home on lousy links.
- 2020‑04‑27:
Towards Sequoia PGP v1.0.
- 2020‑04‑27:
TEMPEST@Home: finding radio frequency side channels.
- 2020‑04‑27:
Byrne's Euclid.
- 2020‑04‑26:
Teleforking a process onto a different computer!
- 2020‑04‑25:
Numerous ways to say "thousand years" in a scientific paper.
- 2020‑04‑25:
Myths about USB multi-key rollover and how USB HID works.
- 2020‑04‑23:
Incremental regular expressions.
- 2020‑04‑23:
From Pratt parsing to the Dijkstra shunting yard.
- 2020‑04‑23:
Better debug stack fixing for Firefox using Rust.
- 2020‑04‑22:
Full text search in milliseconds with Rails and PostgreSQL, without triggers.
- 2020‑04‑22:
Unicode technical note 27: known anomalies in Unicode character names.
- 2020‑04‑22:
Outsourcing reduces productivity.
- 2020‑04‑22:
Things I wished more developers knew about databases.
- 2020‑04‑22:
Linux kernel lockdown, integrity, and confidentiality.
- 2020‑04‑21:
The chairs of Blake's 7.
- 2020‑04‑21:
herbstluftwm: a manual tiling window manager for X11.
- 2020‑04‑21:
OAuth2 best practices cheat sheet.
- 2020‑04‑21:
How the "Memories" 256-byte MS DOS intro works.
- 2020‑04‑21:
API design: Understanding gRPC, OpenAPI and REST and when to use them.
- 2020‑04‑21:
RPKI and RIR 0/0 trust anchors.
- 2020‑04‑19:
SHISHUA: the fastest pseudo-random generator.
- 2020‑04‑19:
Boost UDP transaction performance.
- 2020‑04‑19:
An evaluation of password generation, storage, and autofill in browser-based password managers.
- 2020‑04‑19:
Analysis of DTLS implementations using protocol state fuzzing.
- 2020‑04‑19:
Forecasting logistic curves is hard.
- 2020‑04‑19:
The unpatchable silicon: a full break of the bitstream encryption of Xilinx 7-Series FPGAs.
- 2020‑04‑18:
Inside the Am2901: AMD's 1970s bit-slice processor.
- 2020‑04‑18:
Sneaky marketing: WD, Toshiba, Seagate shipping slower SMR drives without disclosure.
- 2020‑04‑17:
The decline of usability.
- 2020‑04‑17:
SELECT WAT FROM SQL;
- 2020‑04‑17:
GNU binutils: the ELF Swiss Army knife.
- 2020‑04‑17:
Surrounded by Elligators: implementing crypto with nothing to compare to.
- 2020‑04‑17:
SMART: string matching algorithms research tool.
- 2020‑04‑17:
Fix Boyer-Moore with the Rytter correction.
- 2020‑04‑16:
Embedding binary data into programs.
- 2020‑04‑16:
Embedding binary objects in C / ELF.
- 2020‑04‑16:
regex2fat: encode a regular expression into a DFA represented as a graph of FAT32 directories.
- 2020‑04‑16:
Didn't I write this story already? When your fictional pandemic becomes reality.
- 2020‑04‑16:
GCC always assumes aligned pointer accesses.
- 2020‑04‑15:
Types instead of strings for extensible architectures in Rust.
- 2020‑04‑15:
Fallible iterator adapters in Rust.
- 2020‑04‑15:
Cranelift: a possible new backend for Rust.
- 2020‑04‑15:
IJON: exploring deep state spaces via fuzzing.
- 2020‑04‑15:
Gluu: open source IAM / SSO.
- 2020‑04‑14:
Keycloak: open source identity and access management.
- 2020‑04‑14:
Defining the Really Habitable Zone.
- 2020‑04‑14:
Zig programming language 0.6.0 release notes.
- 2020‑04‑14:
Making Unix a little more like Plan9.
- 2020‑04‑14:
What's the type of JSON.parse(JSON.stringify(x)) in TypeScript?
- 2020‑04‑14:
libcpu: a library to emulate several CPU architectures using LLVM.
- 2020‑04‑14:
beebjit: clocking a 6502 to 15GHz!
- 2020‑04‑13:
Simple but powerful Pratt parsing in Rust.
- 2020‑04‑13:
Computers can be understood.
- 2020‑04‑13:
Benchmarking programming language VM JIT warmup.
- 2020‑04‑12:
Braid: an experimental team chat application.
- 2020‑04‑12:
Verification: why it's so hard to create new processors.
- 2020‑04‑12:
The US government runs on COBOL, and now it's falling apart
- 2020‑04‑11:
Error handling in a correctness-critical Rust project.
- 2020‑04‑11:
Eytzinger binary search.
- 2020‑04‑10:
Understanding JavaScript module formats and tools.
- 2020‑04‑09:
Optimizing lazy initialization in TruffleRuby with deoptimization.
- 2020‑04‑09:
Error handling in Rust: from `failure` to `fehler`.
- 2020‑04‑08:
Rules for data modelling with DynamoDB.
- 2020‑04‑08:
The ECHELON affair: the European Parliament and the global interception system.
- 2020‑04‑08:
Maximator: European signals intelligence cooperation.
- 2020‑04‑08:
How owls fly without making a sound.
- 2020‑04‑08:
The COBOL problem.
- 2020‑04‑07:
entr: run arbitrary commands when files change.
- 2020‑04‑05:
pg_hint_plan: execution plan hints for PostgreSQL.
- 2020‑04‑04:
6 things Markdown got wrong.
- 2020‑04‑04:
10 things I hate about PostgreSQL.
- 2020‑04‑04:
On generic traits and associated types in Rust.
- 2020‑04‑03:
Some more advanced aspects of pattern matching in Rust.
- 2020‑04‑03:
The Omit helper type in TypeScript.
- 2020‑04‑03:
Reducing tail latencies with automatic yielding in Tokio on Rust.
- 2020‑04‑03:
Bug bounty platforms buy researcher silence and violate labor and privacy laws.
- 2020‑04‑03:
Anatomy of CVE-2019-5736, a runc container escape.
- 2020‑04‑03:
RISC OS and NetBSD running on the same SoC.
- 2020‑04‑02:
CO2meter: a Python interface to USB CO2 monitor devices.
- 2020‑04‑02:
The open air factor: coronavirus and the sun.
- 2020‑04‑02:
Fish can reduce the methane emissions from rice paddies.
- 2020‑04‑02:
PID without a PhD.
- 2020‑04‑01:
Conditions and restarts in Common Lisp.
- 2020‑04‑01:
How is the Linux kernel tested?
- 2020‑04‑01:
Writing an OS in Rust: support for async/await.
- 2020‑04‑01:
Analysis of Google Chromium C++ compilation times.
- 2020‑04‑01:
Videogame doesn't infringe tattoo copyright by depicting basketball players.
- 2020‑03‑31:
32 bit time_t in Linux: the end of an epoch.
- 2020‑03‑31:
QuineDB: a quine that is also a key-value store.
- 2020‑03‑31:
The long and complicated history of why there are 360 degrees in a circle.
- 2020‑03‑30:
Lead-free solder is better for you.
- 2020‑03‑29:
Golang quirks.
- 2020‑03‑29:
PostgreSQL schema design with row-level security.
- 2020‑03‑29:
Leonardo Torres y Quevedo: an early computer designer from Spain.
- 2020‑03‑29:
Percy Ludgate: an early computer designer from Ireland.
- 2020‑03‑29:
Lessons from the Unix stdio ABI.
- 2020‑03‑29:
Setting up git identities.
- 2020‑03‑29:
Seven stages of open software.
- 2020‑03‑28:
How are Unix pipes implemented?
- 2020‑03‑28:
In-memory compute using off-the-shelf DRAM.
- 2020‑03‑28:
Protecting log records at 30,000 feet with syslog-ng.
- 2020‑03‑28:
Repairing a vintage 40-kilovolt xenon lamp igniter.
- 2020‑03‑28:
Icons for obsolete technology in Unicode.
- 2020‑03‑28:
Hyperlinks in terminal emulators.
- 2020‑03‑28:
Static analysis in gcc 10.
- 2020‑03‑28:
The Chapel parallel programming language.
- 2020‑03‑26:
Firefox's low-latency WebAssembly compiler.
- 2020‑03‑26:
Thomas Piketty takes on the ideology of inequality.
- 2020‑03‑26:
Fast and simple interned strings in Rust.
- 2020‑03‑26:
Optimising the size and performance of std::borrow::Cow<T> in Rust.
- 2020‑03‑26:
10 most(ly dead) influential programming languages .
- 2020‑03‑26:
BBC computer literacy project archive.
- 2020‑03‑25:
Investigating DNS lookup failures in Kubernetes.
- 2020‑03‑25:
git-2.26 release highlights.
- 2020‑03‑25:
Learn d3.js.
- 2020‑03‑25:
Breaking the random numbers in two Linux KASLR patches.
- 2020‑03‑25:
Coyote: Making it easier for .NET developers to build reliable asynchronous software.
- 2020‑03‑24:
zig cc: a powerful drop-in replacement for gcc or clang.
- 2020‑03‑24:
Concurrent programming, with examples.
- 2020‑03‑24:
X.509 web PKI insecurity.
- 2020‑03‑23:
Three typefaces for mathematics: The development of Times 4-line Mathematics, AMS Euler, and Cambria Math.
- 2020‑03‑23:
Why don't we just ban targeted advertising?
- 2020‑03‑23:
JANET LINX connection outage report.
- 2020‑03‑23:
An ineresting Discord outage report. (Elixir / Golang / Python / etcd)
- 2020‑03‑23:
Nornir: an automation framework in Python.
- 2020‑03‑23:
Napalm network automation.
- 2020‑03‑21:
An illustrated jq tutorial.
- 2020‑03‑20:
How to write documentation for a Rust crate.
- 2020‑03‑19:
ARIN VM cluster outage due to SAN failure.
- 2020‑03‑18:
JavaScript: the first 20 years. (HOPL)
- 2020‑03‑17:
Rewriting the heart of Dropbox's sync engine in Rust.
- 2020‑03‑16:
Getting started with Rust and Rocket for http services.
- 2020‑03‑15:
Finding a problem at the bottom of the Google stack.
- 2020‑03‑15:
MathJax turns 3.0.
- 2020‑03‑15:
Best practices for ACME client implementations.
- 2020‑03‑15:
Out of the Box dynamic dispatch in Rust.
- 2020‑03‑15:
xmake: a cross-platform build utility based on lua.
- 2020‑03‑15:
An Introduction to modern CMake.
- 2020‑03‑15:
A history of the trampoline.
- 2020‑03‑14:
Foundations of databases. (1995)
- 2020‑03‑14:
Automatic chess boards.
- 2020‑03‑14:
Cut / fold templates for paper mechanisms.
- 2020‑03‑13:
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
- 2020‑03‑13:
Analog computer museum.
- 2020‑03‑13:
Cyberpunk: then and now.
- 2020‑03‑13:
David Rumsey historical map collection at Stanford University.
- 2020‑03‑13:
HTTP desync attacks: request smuggling reborn.
- 2020‑03‑13:
The SOC2 starting seven.
- 2020‑03‑11:
How BBsmart email viewer worked, the best-selling BlackBerry app of all time.
- 2020‑03‑11:
The story of PS1/PS2 backwards compatibility from the engineer who built it.
- 2020‑03‑11:
Finding Mona Lisa in the Game of Life.
- 2020‑03‑11:
TRRespass: rowhammer target row refresh bypass.
- 2020‑03‑11:
Thinking psycopg3.
- 2020‑03‑11:
Actually using wasm with Rust.
- 2020‑03‑11:
What's the deal with IPv6 link-local addresses?
- 2020‑03‑11:
Your circuit breaker timeouts are probably misconfigured.
- 2020‑03‑10:
Defunctionalization: the best refactoring you've never heard of.
- 2020‑03‑10:
Setting height and width on HTML <img> tags is important again.
- 2020‑03‑09:
Green's dictionary of slang.
- 2020‑03‑09:
An experimental study on the effect of procedure under unexpected situations.
- 2020‑03‑09:
The TAOS operating system. (Byte, 1991)
- 2020‑03‑09:
Cryptographic signatures, surprising pitfalls, and ACME / Let's Encrypt.
- 2020‑03‑08:
Capability-based computer systems. (1984)
- 2020‑03‑06:
Recent and future pattern matching improvements in Rust.
- 2020‑03‑04:
IBM VS. MIT: an Apollo computer showdown.
- 2020‑03‑04:
The core memory inside an Apollo Saturn V rocket's computer.
- 2020‑03‑04:
Bluespec hardware description language compiler.
- 2020‑03‑04:
An introduction to d3.js.
- 2020‑03‑03:
A layman's guide to a subset of ASN.1, BER, and DER.
- 2020‑03‑03:
The growth of command line options, 1979-present.
- 2020‑03‑03:
The problem with single-threaded shared mutability.
- 2020‑03‑03:
Kill the newsletter!
- 2020‑03‑02:
Remote access to production infrastructure (death to the VPN!)
- 2020‑03‑02:
New sense discovered in dog noses: the ability to detect heat.
- 2020‑03‑02:
CRLite: Finally a fix for broken TLS certificate revocation?
- 2020‑03‑02:
The Odin programming language.
- 2020‑03‑02:
The Beef programming language.
- 2020‑03‑02:
The Worst programming language.
- 2020‑03‑01:
There's an entire industry dedicated to making foods crispy.
- 2020‑03‑01:
Concurrent programming with effect handlers in multicore OCaml.
- 2020‑02‑29:
A half-hour to learn Rust.
- 2020‑02‑28:
Why did I wake up just before my alarm clock went off?
- 2020‑02‑28:
Dave Prosser's C preprocessor algorithm.
- 2020‑02‑28:
TeleHammer: cross-privilege-boundary rowhammer through implicit DRAM accesses.
- 2020‑02‑28:
Show me your clipboard data.
- 2020‑02‑27:
What can you preseed when installing Debian?
- 2020‑02‑27:
How old are the symbols on these keys?
- 2020‑02‑27:
MLIR: a compiler infrastructure for the end of Moore's Law.
- 2020‑02‑26:
Delphinusdnsd: a small authoritative DNS server.
- 2020‑02‑26:
Why I'm not fan of UUIDs in databases.
- 2020‑02‑26:
PostgreSQL parallelism, what next?
- 2020‑02‑26:
UK public transport API.
- 2020‑02‑26:
The Ars Technica semi-scientific guide to Wi-Fi access point placement.
- 2020‑02‑26:
JSPaint.
- 2020‑02‑25:
Smithsonian Institution open access.
- 2020‑02‑25:
Modern, functional Common Lisp: myths and tips.
- 2020‑02‑25:
Securing Firefox with RLBox: WebAssembly sandboxes for C++ libraries.
- 2020‑02‑25:
Selectors explained: translate CSS selectors into plain English.
- 2020‑02‑23:
A guide to running Elasticsearch in production.
- 2020‑02‑23:
Stangenkunst: mechanical transmission of power.
- 2020‑02‑23:
A pragmatic approach to global state in a 3rd party library called from Rust.
- 2020‑02‑23:
Some nuances of undefined behavior in Rust.
- 2020‑02‑23:
Coverage-based fuzzing with libfuzzer.
- 2020‑02‑23:
QUIC and OpenSSL 3.0.
- 2020‑02‑23:
Insights: visually explore a PostgreSQL database.
- 2020‑02‑23:
Learn TLA+
- 2020‑02‑23:
Taking care of code ... more and more code ...
- 2020‑02‑22:
Hell of a handshake: abusing TCP for reflective amplification DDoS attacks.
- 2020‑02‑22:
Container security: nobody knows what it means but it's provocative.
- 2020‑02‑22:
Paris mayor pledges a greener '15-minute city'.
- 2020‑02‑22:
Does register selection matter to performance on x86 CPUs?
- 2020‑02‑21:
Fixing memory leaks in JavaScript in a web browser.
- 2020‑02‑21:
Racket-on-Chez Scheme status, February 2020.
- 2020‑02‑20:
Computer animation in 1961: the Stanford card stunt program. (YouTube)
- 2020‑02‑20:
PUB: an early scriptable markup language.
- 2020‑02‑19:
Recovering from useless vacuuming in PostgreSQL.
- 2020‑02‑19:
Taking back control from systemd networking.
- 2020‑02‑19:
Transaction isolation repeatable read in PostgreSQL vs MySQL.
- 2020‑02‑19:
Elixir, PostgreSQL, and query plan cache performance oddities.
- 2020‑02‑18:
The first computers in East Africa, and what became of them.
- 2020‑02‑18:
3-way FTP: Pushing files around with silly and unusual methods.
- 2020‑02‑18:
C++ move, simply (with appendices).
- 2020‑02‑17:
An emulator for a Sun 2 workstation.
- 2020‑02‑17:
playwright: a Node.js library to automate Chromium, Firefox and WebKit with a single API.
- 2020‑02‑16:
The human hemisphere.
- 2020‑02‑16:
OCSP checks for EV certificates make the web slow and unreliable.
- 2020‑02‑16:
The worst of time64 breakage.
- 2020‑02‑15:
Open access journals get a boost from librarians, much to Elsevier's dismay.
- 2020‑02‑15:
Evolution of the x86 context switch in Linux.
- 2020‑02‑15:
Creating a logical replica from a snapshot in RDS PostgreSQL.
- 2020‑02‑15:
Designing a performant row level security schema in PostgreSQL.
- 2020‑02‑15:
How sustainable is a solar powered website?
- 2020‑02‑15:
Improving compilation time of C/C++ projects.
- 2020‑02‑15:
What made the 1960s CDC6600 supercomputer fast?
- 2020‑02‑13:
The myth of the barter economy.
- 2020‑02‑13:
The parliamentary electoral system in Denmark.
- 2020‑02‑13:
Summer time clock changes: is it time for change in the UK and EU?
- 2020‑02‑13:
A bestiary of single-file programming language implementations.
- 2020‑02‑13:
Stage magic and software design.
- 2020‑02‑12:
Toward _FORTIFY_SOURCE parity between Clang and GCC.
- 2020‑02‑12:
Nuvia's ex-Apple CPU design team throws down the gauntlet to the server processor incumbents.
- 2020‑02‑12:
Gears.
- 2020‑02‑12:
ParaSail: parallel specification and implementation language.
- 2020‑02‑12:
How to escalate privileges and steal secrets in Google Cloud Platform.
- 2020‑02‑12:
Circllhist: a log-linear histogram quantile sketch for IT infrastructure monitoring.
- 2020‑02‑11:
Rotary dial cellphone.
- 2020‑02‑11:
A popular self-driving car machine learning dataset is missing labels for hundreds of pedestrians.
- 2020‑02‑11:
Investigating the performance overhead of C++ exceptions.
- 2020‑02‑11:
The Linux kernel /dev/urandom CSPRNG is now good!
- 2020‑02‑10:
Fax on the beach: The story of EO GO, the audacious, totally calamitous iPad of the 1990s.
- 2020‑02‑10:
Memory bandwidth napkin math and benchmarks.
- 2020‑02‑10:
A partial tour through the UNIX Bourne shell.
- 2020‑02‑10:
The discovery of metastability in digital computer circuits.
- 2020‑02‑10:
OmniXtend cache-coherent memory fabric over Ethernet for RISC-V.
- 2020‑02‑10:
Alpha: a history in facts and comments.
- 2020‑02‑09:
Deep sea diving: undersea telecommunication cables.
- 2020‑02‑09:
Lessons learned from writing ShellCheck.
- 2020‑02‑09:
50 years ago, better transistors and switching regulators revolutionized computer power supplies.
- 2020‑02‑09:
They called it "big iron" for a reason: Cray-1M site planning reference manual.
- 2020‑02‑09:
Stacked borrows: an aliasing model for Rust.
- 2020‑02‑09:
Librem 5: an open source phone shows the cost of being different.
- 2020‑02‑09:
Combinatris: Tetris with SKI combinators.
- 2020‑02‑08:
Dangerous domain corp.com goes up for sale.
- 2020‑02‑07:
Measuring space-time behaviours of piano keys with Rust.
- 2020‑02‑06:
Apollo 11 guidance computer vs USB-C chargers.
- 2020‑02‑06:
The JVM's mysterious AllocatePrefetch options: what do they actually do?
- 2020‑02‑06:
Before the DNS: how yours truly upstaged the NIC's official HOSTS.TXT
- 2020‑02‑05:
Security flaw in WhatsApp desktop app.
- 2020‑02‑05:
Units of measure in Rust with refinement types.
- 2020‑02‑05:
On the process that led to the introduction of leapseconds.
- 2020‑02‑03:
unsmear: convert to and from timescales with smeared leap seconds.
- 2020‑02‑03:
The state of full text search in PostgreSQL 12.
- 2020‑02‑02:
Watching for software inefficiencies with Valgrind.
- 2020‑02‑02:
JavaScript got better while I wasn't looking.
- 2020‑02‑02:
Too much locality... for stores to forward.
- 2020‑02‑02:
Old CSS, new CSS.
- 2020‑02‑02:
Typesense: an open source, typo tolerant search engine.
- 2020‑02‑02:
PostgresqlCO.NF: a PostgreSQL configuration guide.
- 2020‑02‑01:
8 tips for better negotiation.
- 2020‑02‑01:
TypeScript's quirks: How inconsistencies make the language more complex.
- 2020‑02‑01:
Writing runbook documentation when you're an SRE.
- 2020‑02‑01:
MIDI 2.0 could profoundly change the way music sounds.
- 2020‑02‑01:
Lessons learnt updating a Rust library to std::future.
- 2020‑02‑01:
Returning trait objects in Rust.
- 2020‑02‑01:
Packaging a Rust project for Debian.
- 2020‑02‑01:
Build your own block_on() in async Rust.
- 2020‑02‑01:
A stack-less Rust coroutine library under 100 LoC.
- 2020‑01‑31:
MIR: a lightweight JIT compiler project.
- 2020‑01‑30:
Some useful probability facts for systems programming.
- 2020‑01‑29:
Migrating from Oracle to PostgreSQL: tips and tricks.
- 2020‑01‑29:
pgagroal: a high-performance connection pool for PostgreSQL.
- 2020‑01‑28:
Hacking on clang is surprisingly easy.
- 2020‑01‑28:
128 bits of security vs 128 bits of security: know the difference.
- 2020‑01‑28:
git bundle: the right way to email a git repository.
- 2020‑01‑28:
How we've made the web use dirty energy.
- 2020‑01‑27:
Developing in production.
- 2020‑01‑27:
Building containers without Docker.
- 2020‑01‑27:
What we still haven't learned from Gamergate.
- 2020‑01‑27:
A list of LD_PRELOAD hacks.
- 2020‑01‑26:
GNU Recutils: a database management system using human-readable text files.
- 2020‑01‑26:
A Unix quiz (with answers!)
- 2020‑01‑26:
Dhall for Kubernetes.
- 2020‑01‑26:
Dimensional analysis in programming languages.
- 2020‑01‑26:
The text editors wiki.
- 2020‑01‑25:
Why the Sorbet typechecker for Ruby is fast.
- 2020‑01‑25:
Getting everything wrong without doing anything right! (YouTube)
- 2020‑01‑25:
What to know about GPS receiver elevation.
- 2020‑01‑25:
Measuring altitude using precision frequency transfer between optical atomic clocks.
- 2020‑01‑25:
New Zealand geodetic datum deformation model.
- 2020‑01‑25:
What happens to maps when tectonic plates move?
- 2020‑01‑25:
CASPaxos: linearizable databases without logs.
- 2020‑01‑25:
Modelling BBR's interactions with traditional TCP loss-based congestion control.
- 2020‑01‑24:
Resource scarcity in public clouds.
- 2020‑01‑23:
New browser on the block: Flow, from Ekioh in Cambridge.
- 2020‑01‑23:
The difficulties of retiring Internet Explorer.
- 2020‑01‑23:
A floating point bit twiddling toy.
- 2020‑01‑22:
The history of HAProxy.
- 2020‑01‑21:
A Unix quiz.
- 2020‑01‑21:
axel: lightweight CLI download accelerator.
- 2020‑01‑21:
The hunt for the fastest zero: when does C++ use memset?
- 2020‑01‑20:
'Remarkable' computational complexity proof that MIP* = RE.
- 2020‑01‑19:
IEEE 802.3cg 10Mb/s single-pair Ethernet: a guide.
- 2020‑01‑19:
10Mbit/s single-pair Ethernet enables connected intelligence in 2020.
- 2020‑01‑19:
The soundness pledge in Rust.
- 2020‑01‑19:
Mystery Flesh Pit National Park: a Redditor's colossal feat of worldbuilding.
- 2020‑01‑19:
C++ coroutines gcc initial implementation pushed to master.
- 2020‑01‑19:
No, dynamic type systems are not inherently more open.
- 2020‑01‑19:
The Cryptopals cryptography challenges.
- 2020‑01‑18:
About face (recognition).
- 2020‑01‑18:
fast_template: really easy blogging with GitHub Pages.
- 2020‑01‑17:
eSQLate: Build minimum viable admin panels quickly.
- 2020‑01‑16:
What is the random oracle model and why is it collapsing under the weight of its own contradictions?
- 2020‑01‑16:
Autocomplete as an interface.
- 2020‑01‑16:
Two edge cases in PostgreSQL full-text search.
- 2020‑01‑16:
EASYCHAIR: CIA covert listening devices.
- 2020‑01‑16:
Mistakes were made: huge ERP screwups.
- 2020‑01‑16:
Making the LinkedIn A/B testing engine 20x faster.
- 2020‑01‑15:
Is TypeScript worth it?
- 2020‑01‑15:
How to identify an "immoral maze".
- 2020‑01‑15:
Some advantages of the Caddy http server.
- 2020‑01‑14:
The split personalities of "brutalist" web development.
- 2020‑01‑14:
CSVlint: A ruby gem to validate CSV files and check their syntax and contents.
- 2020‑01‑14:
CleverCSV: a Python package for handling messy CSV files.
- 2020‑01‑14:
The few remaining uses of the name "Macintosh".
- 2020‑01‑13:
1195725856 and other mysterious numbers.
- 2020‑01‑13:
Reflections on Mercurial's journey to Python 3.
- 2020‑01‑13:
wasm3: The fastest WebAssembly interpreter.
- 2020‑01‑13:
The Niland geyser: a moving mudpot.
- 2020‑01‑12:
The deep sea.
- 2020‑01‑12:
Visual subnet calculator.
- 2020‑01‑12:
HTML attributes to improve your users' two factor authentication experience.
- 2020‑01‑11:
Scheme: R7RS versus R6RS.
- 2020‑01‑11:
T1: a programming language for constrained environments, derived from BearSSL.
- 2020‑01‑11:
A lazy fix 20 years ago means the Y2K bug is taking down computers now.
- 2020‑01‑10:
Ironies of automation.
- 2020‑01‑10:
How does a new generation of researchers perceive Sci-Hub?
- 2020‑01‑10:
kudeki-chain: git commits with increasing numbers of leading zeroes.
- 2020‑01‑09:
The birth of the Internet in the UK. (YouTube)
- 2020‑01‑09:
Web front-end performance checklist 2020.
- 2020‑01‑09:
Fast IPv4 to hostname lookups: PostgreSQL vs ClickHouse.
- 2020‑01‑09:
A brief history of badge ribbons at sf conventions.
- 2020‑01‑08:
The many places you can set PostgreSQL configuration parameters.
- 2020‑01‑08:
How to effectively dump PostgreSQL databases.
- 2020‑01‑08:
Neater async failure handling in Typescript.
- 2020‑01‑08:
Prometheus for beginners.
- 2020‑01‑07:
How to start a blog using Hugo.
- 2020‑01‑07:
EMI spikes from gas lift chairs can cause display interference.
- 2020‑01‑07:
SHA-1 is a shambles. (less technical overview)
- 2020‑01‑07:
SHA-1 is a shambles: first chosen-prefix collision on SHA-1 and application to the PGP web of trust.
- 2020‑01‑07:
Pegasus Mail, 30 years on.
- 2020‑01‑07:
Execute-only pages vs PAN (privileged access never) on arm64.
- 2020‑01‑07:
Debian Buster sysvinit notes.
- 2020‑01‑07:
Removing the Linux /dev/random blocking pool.
- 2020‑01‑07:
Ethernet power line adapter radio noise interference.
- 2020‑01‑06:
ClickHouse cost-efficiency in action: analyzing 500 billion rows on an Intel NUC.
- 2020‑01‑06:
Files are fraught with peril.
- 2020‑01‑05:
Algorithms interviews: theory vs. practice.
- 2020‑01‑05:
Linus on spinlocks and schedulers.
- 2020‑01‑04:
Notes on technical writing.
- 2020‑01‑04:
Mutexes are faster than spinlocks.
- 2020‑01‑04:
What's what in the world of TeX.
- 2020‑01‑04:
Our neophobic, conservative AI overlords want everything to stay the same.
- 2020‑01‑03:
An entomologist rates emoji ants.
- 2020‑01‑03:
Which emoji scissors can cut?
- 2020‑01‑03:
Interior mutability patterns in Rust.
- 2020‑01‑03:
Spinlocks considered harmful in Rust.
- 2020‑01‑02:
Serving dynamic vector tiles from PostGIS.
- 2020‑01‑02:
Why MemSQL uses skiplist indexes.
- 2020‑01‑02:
A brief history of liquid computers.
- 2020‑01‑02:
I'm not feeling the async backpressure.
- 2020‑01‑02:
Polio eradication program faces hard choices as endgame strategy falters.
- 2020‑01‑01:
Evaluating BBRv2 on the Dropbox edge network.
- 2020‑01‑01:
Semigroup resonance FizzBuzz.
- 2020‑01‑01:
Rewriting m4vgalib in Rust.
- 2020‑01‑01:
Measuring mutexes, spinlocks, and how bad the Linux scheduler really is.
- 2020‑01‑01:
Right-to-left styling: a guide on how to style for RTL in CSS.
- 2019‑12‑31:
The university is a ticking time bomb.
- 2019‑12‑31:
The old Internet died and we watched and did nothing.
- 2019‑12‑31:
Hard work and success.
- 2019‑12‑31:
CPU introspection: Intel load port snooping.
- 2019‑12‑31:
Refactoring with defunctionalization: everybody does it, nobody talks about it.
- 2019‑12‑31:
Reducing metadata leakage from encrypted files with PURBs.
- 2019‑12‑30:
A few comments on the `age` encryption tool.
- 2019‑12‑30:
Too much crypto: scientific selection of the number of rounds for symmetric primitives.
- 2019‑12‑30:
Scaling React server-side rendering.
- 2019‑12‑29:
DIY 'meta clock' of 24 analog clocks.
- 2019‑12‑29:
Why are my Golang executable files so large?
- 2019‑12‑29:
Apple Scorpius CPU architectural specification. (1989)
- 2019‑12‑29:
The ultimate Acorn Archimedes talk.
- 2019‑12‑29:
Google's monopoly is stifling free software.
- 2019‑12‑28:
rage: a Rust implementation of `age` file encryption.
- 2019‑12‑28:
A desperate plea for a Free Software alternative to Aspera.
- 2019‑12‑27:
Writing a seqlock in Rust.
- 2019‑12‑27:
Streams concurrency with async-std in Rust.
- 2019‑12‑27:
Testing for no_std compatibility in Rust crates.
- 2019‑12‑27:
Async exceptions in Haskell, and Rust.
- 2019‑12‑27:
Betrusted: can we build trustable hardware?
- 2019‑12‑27:
Tony Brooker and the Atlas Compiler Compiler.
- 2019‑12‑27:
Source code linking in C2Rust: merging C headers into Rust modules.
- 2019‑12‑26:
LEGO block structures as a sub-kelvin thermal insulator.
- 2019‑12‑25:
Gameslab: an FPGA-powered handheld game console.
- 2019‑12‑24:
SOICbite: a program/debug connector for an SOIC test clip.
- 2019‑12‑24:
The shitty add-on standard v1.69bis for electronic con badges.
- 2019‑12‑24:
A business card that runs Linux.
- 2019‑12‑24:
Flattening quadratic Béziers.
- 2019‑12‑24:
In praise of property-based testing.
- 2019‑12‑24:
Implementing WebGPU in Gecko.
- 2019‑12‑24:
Now you see it, now you don't: a large-scale analysis of early domain deletions.
- 2019‑12‑24:
What broke the bank: the failed TSB IT migration.
- 2019‑12‑22:
Winter Solstice, Camelot Station.
- 2019‑12‑20:
Bisecting Rust compiler regressions with cargo-bisect-rustc.
- 2019‑12‑20:
The common Rust traits.
- 2019‑12‑20:
Encoding animated GIFs into pure CSS.
- 2019‑12‑20:
On Linux's random number generator.
- 2019‑12‑20:
A progress update on Game of Trees, an alternative git implementation.
- 2019‑12‑20:
The use of the word 'robust' to describe software in UK law.
- 2019‑12‑20:
Xor filters are faster and smaller than Bloom filters and cuckoo filters.
- 2019‑12‑19:
The Atlas / Titan story.
- 2019‑12‑19:
Google's dangerous monopoly-based foreign policy.
- 2019‑12‑19:
The curious case of the table-locking UPDATE query on PostgreSQL.
- 2019‑12‑19:
Eller's line-at-a-time maze drawing algorithm.
- 2019‑12‑18:
Glush: a robust, human readable, top-down parser compiler.
- 2019‑12‑18:
Stop worrying about blocking: Rust's new async-std runtime, inspired by Golang.
- 2019‑12‑18:
Type families in Typescript.
- 2019‑12‑18:
Don't use booleans.
- 2019‑12‑17:
A letter from Gary Larson about The Far Side website.
- 2019‑12‑17:
FizzBuzz at compile time using C++ constexpr.
- 2019‑12‑17:
Runtime support for multicore Haskell: a retrospective.
- 2019‑12‑17:
Superdeterminism: The path we didn't take.
- 2019‑12‑17:
Hacking GitHub with Unicode's dotless 'i'.
- 2019‑12‑17:
The architecture of a large-scale web search engine, circa 2019.
- 2019‑12‑17:
Building a search engine from scratch.
- 2019‑12‑16:
A new cycle-stepped 6502 CPU emulator.
- 2019‑12‑16:
The SQL murder mystery!
- 2019‑12‑16:
Things I won't work with: the higher states of bromine.
- 2019‑12‑16:
In service of the narrative in an operational surprise writeup.
- 2019‑12‑16:
iter: a Golang implementation of C++ STL iterators and algorithms.
- 2019‑12‑15:
Pointer authentication in LLVM / Clang.
- 2019‑12‑15:
Best practices for designing a pragmatic RESTful API.
- 2019‑12‑15:
Seven deadly sins of talking about "types".
- 2019‑12‑14:
Modern garbage collection: Shenandoah and ZGC.
- 2019‑12‑14:
How to enable IPv6 in Docker.
- 2019‑12‑14:
Wine support for win32 on 64-bit-only macOS Catalina.
- 2019‑12‑14:
How we increased our Node.js parallelism by 30x.
- 2019‑12‑14:
Reimagining the PhD.
- 2019‑12‑14:
DepHell: project management for Python.
- 2019‑12‑14:
Why NUKEMAP isn't on Google Maps anymore.
- 2019‑12‑14:
Three ways to reduce the bandwidth costs of your HTTPS API on AWS.
- 2019‑12‑14:
The Amazon AWS premium.
- 2019‑12‑14:
Soundness bugs in Rust libraries: can't live with 'em, can't live without 'em.
- 2019‑12‑13:
hyper v0.13: an async HTTP library for Rust.
- 2019‑12‑13:
pg_query: parse PostgreSQL queries in Ruby.
- 2019‑12‑13:
Introducing sqlc: compile SQL queries to type-safe Golang.
- 2019‑12‑13:
Blocking inside async code in Rust.
- 2019‑12‑13:
The seductive diversion of 'solving' bias in artificial intelligence.
- 2019‑12‑13:
The surprising breadth of harbingers of failure: customers who buy products that fail.
- 2019‑12‑13:
A better Internet is waiting for us.
- 2019‑12‑13:
Conway's law: How do committees invent?
- 2019‑12‑13:
Experiments in constraint-based graphic design.
- 2019‑12‑13:
Solving the mystery of HRT shortages in the UK.
- 2019‑12‑13:
Threads can infect each other with their low priority.
- 2019‑12‑13:
PostgreSQL 12 EXPLAIN SETTINGS.
- 2019‑12‑13:
Dynamically scoped variables in Golang.
- 2019‑12‑12:
Building an Ansible training environment with FreeBSD jails.
- 2019‑12‑12:
Make it simple: a tale about Robert Dewar, Ada, and GNAT.
- 2019‑12‑12:
Odyssey: a scalable PostgreSQL connection pooler.
- 2019‑12‑11:
Best practices for APIs, if you hate your customers.
- 2019‑12‑11:
Results of a security audit of Unbound DNS.
- 2019‑12‑11:
The Nintendo Switch switch.
- 2019‑12‑11:
OpenLayers: easy dynamic maps on web pages.
- 2019‑12‑11:
ZMOB: a multiprocessor computer with 256 Z80 CPUs. (1981)
- 2019‑12‑11:
The ZedRipper multi-core Z80 laptop.
- 2019‑12‑10:
Report of the Stanford workshop on network buffer sizing.
- 2019‑12‑10:
DNS abuse framework.
- 2019‑12‑09:
How simple rules 'bootstrap' the laws of physics.
- 2019‑12‑09:
Windows Management Instrumentation (WMI) is accidentally quadratic.
- 2019‑12‑09:
SubX: bringing sub seasonal 3-to-4 week weather forecasts from research to operations.
- 2019‑12‑08:
Don't learn to code, learn to automate.
- 2019‑12‑08:
How to match "A B C" where A+B=C with a regex.
- 2019‑12‑06:
Stepping up to the GraphQL buffet.
- 2019‑12‑06:
Why ISOC sold .ORG to private equity.
- 2019‑12‑06:
No to Google Chrome.
- 2019‑12‑06:
Cliqz: a new search engine.
- 2019‑12‑05:
How to fight back against Google AMP as a web user and a web developer.
- 2019‑12‑05:
How I defeated the Tolkien estate.
- 2019‑12‑05:
Challenge: find Twitter memes with suffix arrays.
- 2019‑12‑04:
The origins of GPS, and the pioneers who launched the system.
- 2019‑12‑04:
Aerospace Corp's role in the development of GPS.
- 2019‑12‑04:
Abusing PostgreSQL as a SQL beautifier.
- 2019‑12‑04:
The Cannonball Run record has been broken again.
- 2019‑12‑04:
How to build and market IPv6-only services.
- 2019‑12‑04:
The science of Wi-Fi on airplanes.
- 2019‑12‑04:
Sinkholed: story of a domain takedown.
- 2019‑12‑04:
Flaws in HumanReadableByteCount(), the most copied StackOverflow snippet.
- 2019‑12‑03:
Symptoms of groupthink.
- 2019‑12‑03:
An interactive model-based calculator of cycling power vs. speed.
- 2019‑12‑03:
Minesweeper and logical circuits.
- 2019‑12‑03:
Internet Society says Ethos Capital's offer to buy .org for $1.14bn came out of the blue.
- 2019‑12‑03:
niche-museums.com, powered by Datasette.
- 2019‑12‑03:
datasette-atom: define an atom feed using a custom SQL query.
- 2019‑12‑03:
I ditched Google for DuckDuckGo, and you should too.
- 2019‑12‑03:
Did ISOC leave $1 billion on the table?
- 2019‑12‑03:
The .org fire sale: how it sold for less than half its valuation.
- 2019‑12‑03:
How I added 6 characters to Unicode (and you can too).
- 2019‑12‑03:
Notes on adding IEC power symbols to Unicode.
- 2019‑12‑02:
TAGS, simplified.
- 2019‑12‑01:
The world needs Cliqz. The world needs more search engines.
- 2019‑11‑30:
Is inequality inevitable?
- 2019‑11‑29:
Flow parallel multithreaded HTML5 browser, by Ekioh in Cambridge.
- 2019‑11‑29:
DDR4 initialization and calibration.
- 2019‑11‑28:
RedoxOS on real hardware, and self-hosting support for rustc.
- 2019‑11‑28:
Automated front-end testing is not working.
- 2019‑11‑28:
Methods for identifying and dealing with flaky tests.
- 2019‑11‑28:
Student rental scams.
- 2019‑11‑27:
Teacher effects on student achievement and height: a cautionary tale.
- 2019‑11‑27:
AWS instance metadata service (IMDSv2) protection against server-side request forgery (SSRF).
- 2019‑11‑27:
Comby: structural matching and rewriting for code.
- 2019‑11‑26:
dy: construct YAML from a directory tree.
- 2019‑11‑26:
Hours of daylight mapped as a function of latitude and time of year.
- 2019‑11‑26:
How do you remove unused CSS from a web site?
- 2019‑11‑26:
Independent review of TSB's failed 2018 banking platform migration.
- 2019‑11‑25:
The big push! IBM 360 Model 20 transported to the UK.
- 2019‑11‑25:
Mariana Mazzucato has reinvigorated the most important battle in economics.
- 2019‑11‑25:
The infinite hows: an argument against Five Whys and an alternative approach.
- 2019‑11‑25:
ICANN races towards regulatory capture: the great .ORG heist.
- 2019‑11‑24:
git-subtrac: all your git submodules in one place.
- 2019‑11‑24:
Critical perspectives on provable security: fifteen years of "Another Look" papers.
- 2019‑11‑23:
Python Tutor: ten years as a solo maintainer of open-source software in academia.
- 2019‑11‑23:
Internet world despairs as non-profit .org sold for $$$$ to private equity firm.
- 2019‑11‑23:
The ICs of 2030.
- 2019‑11‑23:
Forging a path away from containers and config tools.
- 2019‑11‑23:
AI today and tomorrow is mostly about curve fitting, not intelligence.
- 2019‑11‑23:
Towards a unified theory of reactive UI.
- 2019‑11‑23:
Save .ORG
- 2019‑11‑23:
The power of one-state Turing machines.
- 2019‑11‑22:
Wrapping images around Julia set fractals.
- 2019‑11‑22:
A survey of error handling crates for Rust.
- 2019‑11‑22:
Thermal performance of Raspberry Pi 4 firmware updates.
- 2019‑11‑22:
Golang's features of last resort.
- 2019‑11‑22:
Bits on the wire.
- 2019‑11‑22:
Multi-value all the wasm with Rust!
- 2019‑11‑22:
Thoughts on error handling in Rust.
- 2019‑11‑21:
Stacked Borrows: an aliasing model for Rust. (paper)
- 2019‑11‑21:
Rust compiler bug test case reduction techniques.
- 2019‑11‑21:
The Firefox UI is now built with Web Components.
- 2019‑11‑21:
An interview about PostgreSQL extensions.
- 2019‑11‑21:
Myths programmers believe about CPU caches.
- 2019‑11‑20:
Debian init systems: what, another GR?
- 2019‑11‑20:
A memoir of working on "black" secret space programs.
- 2019‑11‑20:
Restoring UNIX v0 on a PDP-7: a look behind the scenes.
- 2019‑11‑20:
Allsorts: a font shaping engine in Rust.
- 2019‑11‑20:
Accidentally breaking GitHub Actions with a shorthash collision.
- 2019‑11‑20:
How to recognize AI snake oil.
- 2019‑11‑19:
Clang format tanks performance?!
- 2019‑11‑19:
UCB CSRG BSD source code history converted from SCCS to git.
- 2019‑11‑19:
ISO C18 final committee draft.
- 2019‑11‑19:
Google search results have more human help than you think.
- 2019‑11‑19:
AT&T released Vyatta DANOS disaggregated network operating system to Linux Foundation.
- 2019‑11‑18:
The difference between fault tolerance, high availability, and disaster recovery.
- 2019‑11‑18:
Understanding Rust Serde.
- 2019‑11‑18:
Brand hijacking and Amazon's China strategy.
- 2019‑11‑18:
Welcome to China. You probably can't buy anything, though.
- 2019‑11‑18:
What makes a good runbook?
- 2019‑11‑17:
Instant stone (just add water!)
- 2019‑11‑17:
Writing userspace USB drivers for abandoned devices.
- 2019‑11‑17:
The Consul outage that never happened.
- 2019‑11‑16:
CSS utility classes and "separation of concerns".
- 2019‑11‑16:
The disappearance and return to print of John M. Ford.
- 2019‑11‑16:
drgn: scriptable debugger library.
- 2019‑11‑16:
Cue and the configuration complexity curse.
- 2019‑11‑15:
The architecture of declarative configuration management.
- 2019‑11‑15:
Me and monotropism: a unified theory of autism.
- 2019‑11‑15:
SCION: scalability, control, and isolation on next-generation networks.
- 2019‑11‑15:
Private equity company acquires .org registry.
- 2019‑11‑15:
The early history of Usenet, part 1: the technological setting.
- 2019‑11‑15:
Cooling off your Raspberry Pi 4.
- 2019‑11‑14:
Neutrinos lead to unexpected discovery about eigenvectors and eigenvalues.
- 2019‑11‑14:
Explaining 4K 60Hz video through USB-C hubs.
- 2019‑11‑14:
Configure HAProxy with PostgreSQL using built-in pgsql-check.
- 2019‑11‑14:
Making mystery-solving easier with auto_explain for PostgreSQL.
- 2019‑11‑14:
The maturing of QUIC.
- 2019‑11‑13:
Box. (YouTube)
- 2019‑11‑13:
A weird Internet career in linguistics.
- 2019‑11‑13:
Ancient earth: a visualization of continental drift. (WebGL)
- 2019‑11‑13:
How linguists are using Urban Dictionary.
- 2019‑11‑13:
Notes on type layouts and ABIs in Rust.
- 2019‑11‑12:
The Google squeeze.
- 2019‑11‑12:
CSS in librsvg is now in Rust, courtesy of Mozilla Servo.
- 2019‑11‑12:
Test-driving ARM cloud servers by compiling LLVM.
- 2019‑11‑11:
Staticcheck in action: catching bugs in Golang.
- 2019‑11‑10:
The New Zealand Poly computer preservation project.
- 2019‑11‑09:
The darker side of lean: an insider's perspective on the Toyota Production System.
- 2019‑11‑09:
Targeted ads are one of the world's most destructive trends.
- 2019‑11‑09:
PostgreSQL is a great pubsub and job server.
- 2019‑11‑09:
Everyone working in DevOps should read The Toyota Way.
- 2019‑11‑09:
Nesting limits in JSON parsers.
- 2019‑11‑09:
Kubernetes made my latency 10x higher.
- 2019‑11‑09:
How Swift achieved dynamic linking where Rust couldn't.
- 2019‑11‑08:
Type-driven design: parse, don't validate.
- 2019‑11‑08:
Type-level programming in Rust for safer hardware abstractions.
- 2019‑11‑08:
IBM terminals and the history of the 80×24 display.
- 2019‑11‑07:
Gigabit ethernet over plastic optical fibre.
- 2019‑11‑07:
Bypassing GitHub's OAuth flow with a HEAD request.
- 2019‑11‑06:
postgres-checkup: deep analysis of PostgreSQL database health.
- 2019‑11‑06:
The PostgreSQL billion tables project.
- 2019‑11‑06:
Base64 encoding and decoding at almost the speed of a memory copy with AVX512.
- 2019‑11‑05:
Typing errors: Dvorak is not better than QWERTY.
- 2019‑11‑05:
The lost ⋮ key of QWERTY
- 2019‑11‑05:
Systemd timer units hide errors in journald, unlike cron.
- 2019‑11‑04:
Zola: a static site generator written in Rust.
- 2019‑11‑04:
Light Commands: laser-based audio injection on voice-controllable systems.
- 2019‑11‑04:
A portrait in baroque / flemish style, in pure CSS.
- 2019‑11‑04:
David Rosenhan's flawed paper on psychiatric pseudopatients.
- 2019‑11‑04:
DNS wars.
- 2019‑11‑04:
View MySQL / MariaDB query progress with `pmonitor`.
- 2019‑11‑03:
Stop using ridiculously low DNS TTLs.
- 2019‑11‑03:
Web browsers will no longer have a single shared cache across all sites / origins.
- 2019‑11‑03:
gendrendr: highlight the inaccuracy and violence of assigning genders to others.
- 2019‑11‑02:
Raspberry Pi 4 USB-C gadget mode.
- 2019‑11‑02:
Always bump downwards when allocating memory.
- 2019‑11‑02:
A theorem of software engineering: the shortest possible schedule.
- 2019‑11‑02:
U2F support in OpenSSH HEAD.
- 2019‑10‑31:
Women's stories from the computer room.
- 2019‑10‑31:
Destroying x86_64 instruction decoders with differential fuzzing.
- 2019‑10‑31:
A gentle introduction to the wonderful world of Prometheus metrics.
- 2019‑10‑30:
Hello, production!
- 2019‑10‑30:
After using both, I regretted switching from Terraform to CloudFormation.
- 2019‑10‑30:
Seamless application failover using libpq features in PostgreSQL.
- 2019‑10‑30:
Fine tuning full text search with PostgreSQL 12.
- 2019‑10‑30:
PostgreSQL major version upgrade using logical replication.
- 2019‑10‑30:
Beating std::visit in D without really trying.
- 2019‑10‑30:
unfork() is the inverse of fork(2). sort of.
- 2019‑10‑29:
XML is almost always misused.
- 2019‑10‑29:
Ten simple rules for helping newcomers become contributors to open projects.
- 2019‑10‑29:
Text editing hates you too.
- 2019‑10‑29:
Operon: extreme performance for Ansible.
- 2019‑10‑28:
Thatcher had a battle plan for her economic revolution. The left needs one too.
- 2019‑10‑28:
Minimal Wim: a grid-based typography experiment.
- 2019‑10‑27:
Why it is hard for Rust to support async fn in traits.
- 2019‑10‑27:
Telling whiskey from whisky by evaporation residues.
- 2019‑10‑26:
Commas in big numbers everywhere: an OpenType adventure.
- 2019‑10‑26:
GCC's assembler syntax.
- 2019‑10‑26:
The wonders of the suffix tree through the lens of Ukkonen's algorithm.
- 2019‑10‑25:
Rust vs C++ on floating-point intensive code.
- 2019‑10‑25:
The future of open access academic publication.
- 2019‑10‑25:
The (quantum computing) Talk.
- 2019‑10‑25:
A Research Unix reader: annotated excerpts from the programmer's manual, 1971-1986.
- 2019‑10‑24:
Why are terminal windows traditionally 80×25?
- 2019‑10‑23:
Floorplan: spatial layout in memory management systems for Rust.
- 2019‑10‑22:
Faster quaternion arithmetic by XORing floating point sign bits.
- 2019‑10‑22:
Where `rustc` spends its time.
- 2019‑10‑22:
Structural insight: Lisp and interpreted programming languages.
- 2019‑10‑22:
70 vs 100: if you can stop safely at the speed limit, how fast do you crash when speeding?
- 2019‑10‑22:
Examining how AWS builds their own serverless apps.
- 2019‑10‑21:
What breaks our systems: a taxonomy of black swans.
- 2019‑10‑21:
Unix: a history and a memoir, by Brian Kernighan. (Amazon)
- 2019‑10‑21:
International maps of cities coloured by street/road/ave/etc.
- 2019‑10‑21:
Maps of cities coloured by street/road/ave/etc.
- 2019‑10‑19:
Are aerospike engines better than traditional rocket engines?
- 2019‑10‑19:
Debugging hidden memory leaks in Ruby.
- 2019‑10‑19:
Ahh shhgit! Real-time detection of credentials leaked in git commits.
- 2019‑10‑18:
libgcc: when exceptions collide.
- 2019‑10‑18:
Problem details for HTTP APIs.
- 2019‑10‑18:
REST is the new SOAP.
- 2019‑10‑18:
Software testing anti-patterns.
- 2019‑10‑18:
A £190M research programme around ARM's Morello, an experimental ARMv8-A CPU, SoC, and board with CHERI support.
- 2019‑10‑18:
The earliest Unix code: an anniversary source code release.
- 2019‑10‑18:
Types for units of measure in Rust.
- 2019‑10‑18:
ARM leading a UK Government programme to create a capability-secure chip platform.
- 2019‑10‑18:
Making a fast char searcher in C.
- 2019‑10‑17:
Verb-noun vs noun-verb.
- 2019‑10‑17:
Vulcain: HTTP/2 server push for fast and idiomatic client-driven REST APIs.
- 2019‑10‑17:
The node experiment: exploring async basics with Rust
- 2019‑10‑17:
Nondeterministic collations in PostgreSQL 12.
- 2019‑10‑17:
No-one knows the type of char + char.
- 2019‑10‑16:
I hate the X11 ICCCM selection system, and you should too.
- 2019‑10‑16:
I hate Xlib and so should you.
- 2019‑10‑16:
Beating C with an 80 line `wc` in Haskell.
- 2019‑10‑16:
Google can't fix the Android update problem.
- 2019‑10‑16:
Bloody story of Java and embedded databases in RIPE's RPKI validator.
- 2019‑10‑15:
DNS security: threat modeling DNSSEC, DoT, and DoH.
- 2019‑10‑15:
Notes on porting from Oracle to PostgreSQL.
- 2019‑10‑15:
Firefox privacy how-to guide.
- 2019‑10‑15:
A Kubernetes crime story.
- 2019‑10‑14:
Distributed types on the Erlang BEAM.
- 2019‑10‑14:
Making Rust's Tokio scheduler 10x faster.
- 2019‑10‑14:
How Heap failed, then succeeded, at migrating from CoffeeScript to TypeScript.
- 2019‑10‑14:
Underscores and SEO arms races.
- 2019‑10‑13:
Flour power: meet the bread heads baking a better loaf.
- 2019‑10‑13:
Binary arithmetic in the TypeScript type system.
- 2019‑10‑13:
The tyranny of stucturelessness. (1971)
- 2019‑10‑13:
Trashing: the dark side of sisterhood. (1976)
- 2019‑10‑13:
HOWTO make Linux run blazing fast (again) on Intel CPUs.
- 2019‑10‑12:
Response to "fibers under the magnifying glass".
- 2019‑10‑12:
The surprising limitations of C++ ranges beyond trivial cases.
- 2019‑10‑12:
The most important software design guideline. (YouTube)
- 2019‑10‑12:
Pointer-based data structures in SPARK Ada.
- 2019‑10‑12:
Solving remote build cache misses in Gradle Android builds.
- 2019‑10‑12:
PostgreSQL when it's not your job.
- 2019‑10‑12:
You cannot cURL under pressure.
- 2019‑10‑12:
Fibers under the magnifying glass.
- 2019‑10‑12:
How to speed up the Rust compiler some more in 2019.
- 2019‑10‑12:
The new function prototype for objc_msgSend.
- 2019‑10‑11:
How Monzo's security team handles secrets.
- 2019‑10‑11:
BPF at Facebook (and beyond).
- 2019‑10‑11:
A party parrot meme mystery has been solved.
- 2019‑10‑11:
Video footage of the PDP-7 on which Unix started.
- 2019‑10‑11:
8 papers that were rejected before winning a Nobel prize.
- 2019‑10‑10:
Build systems à la carte.
- 2019‑10‑10:
What's going on with WhatFreeWords?
- 2019‑10‑10:
Ownership and impl Trait in Rust.
- 2019‑10‑10:
How kettles switch off when the water boils.
- 2019‑10‑10:
Floppy disk history: The evolution of personal computing.
- 2019‑10‑10:
Postmodern C tooling.
- 2019‑10‑09:
Guix reduces reproducible build bootstrap seed TCB to 120MB.
- 2019‑10‑09:
Formally modelling database migrations using Alloy.
- 2019‑10‑09:
Logs were our lifeblood. Now they're our liability.
- 2019‑10‑09:
jtc: JSON manipulation and transformation tool.
- 2019‑10‑09:
Defining types in the Shen programming language.
- 2019‑10‑08:
How do individual contributors get stuck?
- 2019‑10‑08:
Applying SRE principles to US government recruitment and hiring for technical staff.
- 2019‑10‑08:
Kubernetes liveness probes are dangerous.
- 2019‑10‑08:
URGENT/11 zero day vulnerabilities in the IPnet TCP/IP stack used by VxWorks and other RTOSs.
- 2019‑10‑08:
A modern CSS reset.
- 2019‑10‑08:
Effect of network traffic engineering on TCP connections between AWS regions.
- 2019‑10‑08:
R, the master troll of statistical languages.
- 2019‑10‑08:
R is a joy if you treat it like awk.
- 2019‑10‑07:
Replication configuration changes in PostgreSQL 12.
- 2019‑10‑07:
My application ran away and called home from Redmond.
- 2019‑10‑07:
SLOG: cheating the low-latency vs. strict serializability tradeoff.
- 2019‑10‑07:
Testing in production: the hard parts.
- 2019‑10‑07:
id-objmodel: simple dynamic dispatch for C.
- 2019‑10‑06:
High finance is wrecking the economy and the planet, but it won't reform itself.
- 2019‑10‑06:
Recommended tools for building geospatial web applications.
- 2019‑10‑06:
Break before make, DevOps abstraction layers, and bad DNS.
- 2019‑10‑05:
Turning over: why page turners matter.
- 2019‑10‑05:
Whither literate programming: what went wrong?
- 2019‑10‑04:
25,000 RIPE LIRs: an end to the milestone highs?
- 2019‑10‑04:
Pricing niche products: selling mechanical keyboard kits with a Vickrey auction.
- 2019‑10‑04:
picolibc: a BSD licensed libc for embedded systems.
- 2019‑10‑04:
Too many outer joins.
- 2019‑10‑04:
SQL queries don't start with SELECT.
- 2019‑10‑03:
Is "ass" the most complicated word in English?
- 2019‑10‑03:
Autoantonyms.
- 2019‑10‑03:
Stepping on Rakes: a review of Terry Eagleton's Humour and Peter Timms' Silliness.
- 2019‑10‑02:
Same-site cookies by default.
- 2019‑10‑02:
A new R6RS Scheme compiler for Linux and bare metal amd64.
- 2019‑10‑02:
PDFex attack exfiltrates data from encrypted PDF files.
- 2019‑10‑01:
A new online era of The Far Side is coming!
- 2019‑10‑01:
Processing 40 TB of code from ~10 million project with scc.
- 2019‑10‑01:
A guide to HTML <head> elements.
- 2019‑10‑01:
Golang interfaces: the tricky parts.
- 2019‑10‑01:
My god, it's full of dots!
- 2019‑10‑01:
The failed political promise of Silicon Valley.
- 2019‑09‑30:
The asymmetry of Internet identity.
- 2019‑09‑30:
Let me automate that for you: removing pain points from data pipeline setup.
- 2019‑09‑30:
A computer built from NOR gates: inside the Apollo Guidance Computer.
- 2019‑09‑30:
Small world with high risks: a study of security threats in the npm ecosystem.
- 2019‑09‑30:
Before the East India Company.
- 2019‑09‑30:
Predictive CPU isolation of containers at Netflix using a MIP solver.
- 2019‑09‑30:
MiniZinc high-level solver-independent constraint satisfaction and optimization modelling language.
- 2019‑09‑30:
SCIP solver for mixed integer programming (MIP) and mixed integer nonlinear programming (MINLP).
- 2019‑09‑30:
MIP formulations and linearizations quick reference.
- 2019‑09‑30:
Cbc: open-source mixed integer linear programming solver.
- 2019‑09‑29:
JSON for modern C++.
- 2019‑09‑29:
Text rendering hates you.
- 2019‑09‑29:
Representing and editing JSON with Google Sheets.
- 2019‑09‑29:
Mainstream adoption and Agile's second chasm.
- 2019‑09‑29:
Relaxed JSON.
- 2019‑09‑28:
Games economists play.
- 2019‑09‑28:
Poor man's PoE for Raspberry Pi.
- 2019‑09‑28:
DevOps topologies.
- 2019‑09‑28:
Abusing Kubernetes defaults for privilege escalation.
- 2019‑09‑28:
A developer goes to a DevOps conference.
- 2019‑09‑28:
Neurosexism: the myth that men and women have different brains.
- 2019‑09‑26:
Blind software development at 450 words per minute.
- 2019‑09‑26:
Advanced SQL: window frames.
- 2019‑09‑26:
Using PostgreSQL row level security to make large companies more secure.
- 2019‑09‑25:
The async builder pattern in Rust.
- 2019‑09‑25:
SNI proxy.
- 2019‑09‑25:
Performance metrics for blazingly fast web apps.
- 2019‑09‑25:
Georgia Tech Software Tools subsystem and C compiler for Prime computers.
- 2019‑09‑25:
Reversing an unknown CPU at DSCTF 2019.
- 2019‑09‑24:
Types for Python HTTP APIs at Instagram.
- 2019‑09‑24:
Promising new hard disk technology.
- 2019‑09‑24:
Excavating AI: the politics of images in machine learning training sets.
- 2019‑09‑24:
ImageNet Roulette.
- 2019‑09‑24:
A few special-case performance enhancements in PostgreSQL 12.
- 2019‑09‑23:
Serverless: 15% slower and 8x more expensive.
- 2019‑09‑23:
Measuring DNS resolver centrality.
- 2019‑09‑23:
Weld: accelerating numpy, scikit and pandas as much as 100x with Rust and LLVM.
- 2019‑09‑23:
Folding paper polyhedral globes to print and make.
- 2019‑09‑22:
How to serve 200Gbit/s of TLS from one FreeBSD server.
- 2019‑09‑22:
Moore's Law graphed vs real CPUs & GPUs 1965-2019. (YouTube)
- 2019‑09‑21:
How I collected the complete short stories of F. Scott Fitzgerald.
- 2019‑09‑20:
The state of uBlock Origin (and other blockers) for Safari.
- 2019‑09‑19:
Closing the gap: cross-language LTO between Rust and C/C++.
- 2019‑09‑19:
Software architecture is overrated, clear and simple design is underrated.
- 2019‑09‑19:
Apple push notification device tokens in iOS 13.
- 2019‑09‑19:
Improved support for C variadic functions in Rust and C2Rust.
- 2019‑09‑18:
Reflinks vs symlinks vs hard links, and how they can help machine learning projects.
- 2019‑09‑18:
DVC: a version control system for machine learning data.
- 2019‑09‑17:
Why is the fossil record mostly male?
- 2019‑09‑17:
A radio telescope sundial for the Very Large Array in New Mexico.
- 2019‑09‑17:
Hard disk prices from Amazon UK.
- 2019‑09‑16:
A tenfold increase in Varnish throughput by replacing libvmod-curl with native request restarts.
- 2019‑09‑16:
LastPass leaks credentials from previous site.
- 2019‑09‑16:
BGP, 'screaming car wreck' of internet routing, needs a fire brigade.
- 2019‑09‑15:
Reverse engineering game cartridge printed circuit boards.
- 2019‑09‑15:
I have a feeling we're not in Emerald City anymore: a satirical history of Ada.
- 2019‑09‑14:
How hackers invented kiteboarding.
- 2019‑09‑14:
Parallel GCC research project.
- 2019‑09‑14:
Save thousands of dollars by packing Kubernetes pods efficiently.
- 2019‑09‑14:
$1,000,000 worth of invalid EV certificates revoked.
- 2019‑09‑13:
"DevOps didn't exist when I started as a developer."
- 2019‑09‑13:
BLUF: make your writing more powerful with the bottom line up front.
- 2019‑09‑13:
Big features of TypeScript 3.7 and how to use them.
- 2019‑09‑12:
The ultimate guide to HTML and CSS support in mail clients.
- 2019‑09‑12:
bic: a C interpreter and API explorer.
- 2019‑09‑12:
Efficient string copying and concatenation in C with memccpy().
- 2019‑09‑12:
The electric eel is actually three species, and not an eel.
- 2019‑09‑12:
Introducing caniemail.com: HTML and CSS interoperability in mail messages.
- 2019‑09‑12:
Why Ada is the language you want to be programming your systems with.
- 2019‑09‑12:
Debian Perl: digital detective.
- 2019‑09‑12:
Improving the compile time of a Rust crate.
- 2019‑09‑11:
Fairphone 3 teardown.
- 2019‑09‑11:
NY payroll company vanishes with $35 million.
- 2019‑09‑11:
How prohibition tossed a wet blanket on America's inventors.
- 2019‑09‑11:
Quantum INTERCAL.
- 2019‑09‑11:
The race to create a perfect lie detector, and the dangers of succeeding.
- 2019‑09‑11:
Why Teslas aren't the future.
- 2019‑09‑11:
Face recognition, bad people, and bad data.
- 2019‑09‑11:
A famous argument against free will has been debunked.
- 2019‑09‑10:
Uber's path of destruction.
- 2019‑09‑10:
What does "it's a good start" really mean?
- 2019‑09‑10:
A guide to Aussie slang.
- 2019‑09‑10:
American phrase book.
- 2019‑09‑10:
The tale of the missing semaphore.
- 2019‑09‑10:
How to chair an academic committee.
- 2019‑09‑10:
Strategies for fast lexical analysis.
- 2019‑09‑10:
Myths about USB-C.
- 2019‑09‑10:
A checklist for empirical evaluation, against replication difficulties in computer science.
- 2019‑09‑10:
Put down that banana, beekeeper.
- 2019‑09‑09:
psychec: ML-style type inference for C.
- 2019‑09‑09:
Towards a secured Android smartphone.
- 2019‑09‑09:
Policy debt.
- 2019‑09‑09:
Uses for the popcount instruction.
- 2019‑09‑08:
On string lengths and Unicode encodings.
- 2019‑09‑07:
DNS-over-HTTPS privacy and security concerns.
- 2019‑09‑07:
Thoughts on presenting a talk.
- 2019‑09‑07:
Does Sean Bean really die more than other actors?
- 2019‑09‑07:
From mind control to murder: a deadly fall revealed the CIA's MK-Ultra secrets.
- 2019‑09‑07:
Ronald Fisher, a bad cup of tea, and the birth of modern statistics.
- 2019‑09‑07:
Links to pages about COBOL web programming.
- 2019‑09‑07:
Can science survive without statistical significance?
- 2019‑09‑06:
42 is an answer to the question, what is the sum of three cubes?
- 2019‑09‑06:
How to do a code review at Google.
- 2019‑09‑06:
Human speech may have a universal transmission rate: 39 bits per second.
- 2019‑09‑06:
What the Uffington white horse reveals about the value of maintenance.
- 2019‑09‑06:
Cytoscape.js: visualisation library for networks / graphs.
- 2019‑09‑06:
dc.js: dimensional charting in JavaScript.
- 2019‑09‑06:
An introduction to D3.js.
- 2019‑09‑06:
DDSketch: a fast and fully-mergeable quantile sketch with relative-error guarantees.
- 2019‑09‑05:
Computer science from the bottom up.
- 2019‑09‑05:
Active learning is more effective, but students don't think so.
- 2019‑09‑05:
Universal adversarial triggers for attacking and analyzing NLP.
- 2019‑09‑05:
Why you need plpgsql_check if you write stored procedures for PostgreSQL.
- 2019‑09‑05:
Thunderbolt 3 cables longer than 0.5m generally don't support USB 3.1 speeds.
- 2019‑09‑05:
The most gender-switched names in the US.
- 2019‑09‑04:
Why does CD digital audio have a 44.1 kHz sample rate?
- 2019‑09‑04:
pspg: table-aware pager for PostgreSQL.
- 2019‑09‑04:
What happened to Hadoop?
- 2019‑09‑04:
Semantic validation in Rust.
- 2019‑09‑04:
Teardown of a failed Linux LTS Spectre fix.
- 2019‑09‑04:
sqldef: idempotent MySQL/PostgreSQL schema management.
- 2019‑09‑04:
Mangling dependent parameter types in C++, or, what happened to std::default_order.
- 2019‑09‑04:
A century of “shrill”: how bias in technology has hurt women's voices.
- 2019‑09‑04:
AssemblyScript: a TypeScript to WebAssembly compiler.
- 2019‑09‑04:
A static compiler for the TypeScript programming language to Thumb machine code.
- 2019‑09‑03:
oreboot: a fork of coreboot, with C removed, written in Rust.
- 2019‑09‑03:
Pseudorandom black swans: cache attacks on CTR_DRBG.
- 2019‑09‑03:
Shenanigans with interface vtable hashing.
- 2019‑09‑03:
Dave Jaggar's history of the ARM microprocessor architecture. (YouTube)
- 2019‑09‑03:
NLP's Clever Hans moment has arrived.
- 2019‑09‑02:
Tired of Stack Overflow.
- 2019‑09‑02:
Linkers: a 20 part series.
- 2019‑09‑02:
Beginner's guide to linkers.
- 2019‑09‑02:
The GNU configure and build system.
- 2019‑09‑02:
An introduction to deterministic builds with C/C++.
- 2019‑09‑02:
Unix at 50.
- 2019‑09‑02:
10 ways to tweak slow SQL queries.
- 2019‑09‑02:
Building interactive SSH applications.
- 2019‑09‑01:
Leon Sans: a geometric sans-serif typeface in JavaScript.
- 2019‑09‑01:
The life sciences advance one funeral at a time.
- 2019‑09‑01:
You should not run your mail server because mail is hard?
- 2019‑09‑01:
The design of littlefs: a fail-safe filesystem for microcontrollers.
- 2019‑09‑01:
What really happened in the UK blackouts?
- 2019‑08‑31:
Power bends light.
- 2019‑08‑31:
Croup and ipecac in Anne of Green Gables.
- 2019‑08‑31:
What to do once you admit that decentralizing everything never seems to work.
- 2019‑08‑31:
Linux pressure stall information (PSI): better load averages.
- 2019‑08‑31:
Why robots should have googly eyes.
- 2019‑08‑29:
Write fuzzable code.
- 2019‑08‑29:
Actually using crev / the problem of trusting software dependencies.
- 2019‑08‑29:
DEC WRL Titan system manual. (1988)
- 2019‑08‑29:
Async stack traces in Rust.
- 2019‑08‑28:
Performance tuning PostgreSQL for SquareSpace's TLS certificate service.
- 2019‑08‑28:
PostgreSQL row level security, views, and a lot of magic.
- 2019‑08‑28:
Managing high availability in PostgreSQL: PAF vs repmgr vs Patroni.
- 2019‑08‑28:
Lessons learned debugging an ssh scaling problem at GitLab.
- 2019‑08‑28:
Pay a visit to Cambridge's computer museum.
- 2019‑08‑28:
GoAccess: visual web log analyzer, in C, in the terminal.
- 2019‑08‑28:
How web pages affect power usage.
- 2019‑08‑27:
Just enough piracy can be a good thing.
- 2019‑08‑27:
Dungeons & Deceptions: the first D&D players and the origins of the game.
- 2019‑08‑26:
The astonishing gothic interior of David Parr's house.
- 2019‑08‑26:
Should small Rust structs be passed by-copy or by-borrow?
- 2019‑08‑26:
The difference between database isolation levels and consistency levels.
- 2019‑08‑26:
Report on December's CenturyLink network outage.
- 2019‑08‑26:
Complicated and complex systems in safety management.
- 2019‑08‑25:
A flawed idea is teaching millions of American kids to be poor readers.
- 2019‑08‑25:
Tweets about Dublin (some in Irish)
- 2019‑08‑25:
Blame economists for the mess we're in.
- 2019‑08‑25:
What the Code of Hammurabi can teach us about software liability.
- 2019‑08‑25:
Enabling a permanent revolution in internet architecture.
- 2019‑08‑24:
Does capital imply coercion?
- 2019‑08‑24:
P99: preprocessor macros and functions for C99 and C11.
- 2019‑08‑24:
C preprocessor tricks, tips, and idioms.
- 2019‑08‑24:
Introducing nushell.
- 2019‑08‑23:
Deadly superbug outbreak in humans linked to antibiotic spike in cows.
- 2019‑08‑23:
Adding continuous rendering to the PlantUML server.
- 2019‑08‑23:
Deconstructing Google's excuses on tracking protection.
- 2019‑08‑23:
About GNU readline.
- 2019‑08‑23:
Why does developing on Kubernetes suck?
- 2019‑08‑23:
The crystal growers who sparked a revolution in graphene electronics.
- 2019‑08‑23:
The origins of JavaScript sandbox realms.
- 2019‑08‑23:
How to build a JavaScript sandbox in a web browser.
- 2019‑08‑23:
Some obscure C features.
- 2019‑08‑23:
Irish firm's device to detect IBS triggers praised by researchers.
- 2019‑08‑22:
Thoughts on Rust bloat.
- 2019‑08‑21:
The web browser monopoly.
- 2019‑08‑21:
git-filter-repo: a fast and flexible git-filter-branch replacement.
- 2019‑08‑21:
Conventional Commits: A specification for formatted commit messages.
- 2019‑08‑21:
A look at HS2's huge Old Oak Common station.
- 2019‑08‑21:
Calculus is deeply irrational.
- 2019‑08‑21:
Kaspersky in the middle: what could possibly go wrong?
- 2019‑08‑21:
The answer to "Will you mentor me?" is "No."
- 2019‑08‑21:
Where do interrupts happen?
- 2019‑08‑21:
The financialization of the American elite.
- 2019‑08‑21:
How Rust optimizes async/await.
- 2019‑08‑21:
Ten simple rules for responsible referencing.
- 2019‑08‑21:
"Patent troll" is opinion, not defamation.
- 2019‑08‑20:
21st century datacenter locations driven by 19th century politics.
- 2019‑08‑20:
Sunsetting Mercurial support in Bitbucket.
- 2019‑08‑20:
The power of speaking Polari.
- 2019‑08‑19:
4 rules for intuitive UX.
- 2019‑08‑19:
A 3D map of building ages in the Netherlands.
- 2019‑08‑19:
async-std: an async version of the Rust standard library.
- 2019‑08‑17:
Rubber Band audio time stretcher library.
- 2019‑08‑16:
The order of the JSON.
- 2019‑08‑16:
Minimum benchmark times can be misleading.
- 2019‑08‑16:
WebKit tracking prevention policy.
- 2019‑08‑15:
Google fails to provide "One account. All of Google."
- 2019‑08‑15:
A history and evaluation of IBM System R.
- 2019‑08‑15:
Runtime configuration reloading in Rust.
- 2019‑08‑15:
Parsing Rust strings into slices.
- 2019‑08‑14:
A history of Slonik, the PostgreSQL elephant logo.
- 2019‑08‑14:
Bamboozling X.509 certificate authorities with BGP.
- 2019‑08‑13:
A short survey of sub $0.10 microcontrollers.
- 2019‑08‑13:
DMTF Redfish: a standard RESTful LOM API.
- 2019‑08‑13:
NFLX-2019-002: HTTP/2 denial of service vulnerabilities.
- 2019‑08‑13:
Timeline to remove gcc 4.2.1 from FreeBSD.
- 2019‑08‑13:
Bypass Windows user interface privilege isolation via the CTF input method protocol.
- 2019‑08‑13:
Best practices for code review.
- 2019‑08‑13:
Paged Out! a new experimental free magazine about programming.
- 2019‑08‑13:
The rule of 140.
- 2019‑08‑13:
Top seven myths of robust systems.
- 2019‑08‑13:
R13Y: are NixOS builds reproducible?
- 2019‑08‑13:
Banana-killing Panama disease TR4 has arrived in Latin America.
- 2019‑08‑13:
IndieWeb link sharing.
- 2019‑08‑13:
Await in Rust.
- 2019‑08‑13:
The horror of Microsoft Teams.
- 2019‑08‑12:
Extended Validation TLS certificates are really really dead.
- 2019‑08‑12:
Home 3D metal printing: first results.
- 2019‑08‑12:
Hall's Law: interchangeable parts and the 1800s industrial revolution prequel to Moore's Law.
- 2019‑08‑12:
Spying on HTTPS.
- 2019‑08‑12:
A personal history of modeless text editing and cut/copy-paste.
- 2019‑08‑11:
Bec Hill's translation of Edith Piaf's "Non Je Ne Regrette Rien".
- 2019‑08‑11:
Don't say "homoiconic".
- 2019‑08‑10:
What does a coder do if they can't type?
- 2019‑08‑10:
H3+: the molecules that made the universe.
- 2019‑08‑10:
H2 in space explains dark matter and redshift.
- 2019‑08‑10:
Kepler's forgotten ideas about symmetry help explain spiral galaxies without the need for dark matter.
- 2019‑08‑10:
Porting Unix to the IBM Series-1 minicomputer.
- 2019‑08‑10:
Game of Trees: an implementation of git for OpenBSD.
- 2019‑08‑10:
Swift ExpressibleBy protocols: What they are and how they work.
- 2019‑08‑10:
Parallelism in PostgreSQL.
- 2019‑08‑10:
Measuring DNS qname minimization.
- 2019‑08‑09:
The Erlang rationale.
- 2019‑08‑09:
Recursive language and modern imagination were acquired simultaneously 70,000 years ago.
- 2019‑08‑09:
Unix commands for breaking out of restricted shells.
- 2019‑08‑08:
Writing delightful HTTP middleware in Golang.
- 2019‑08‑07:
HTTP desync attacks: request smuggling reborn.
- 2019‑08‑07:
Understanding Rust through AVL trees.
- 2019‑08‑07:
plpgsql_check: find compilation errors and profile functions in PostgreSQL.
- 2019‑08‑07:
Hospital checklists are meant to save lives, so why do they often fail?
- 2019‑08‑07:
A formal investigation of diff3.
- 2019‑08‑07:
Recording 660fps video on a $6 Raspberry Pi camera.
- 2019‑08‑07:
10 years of seL4: still the best, still getting better.
- 2019‑08‑07:
Arend: a theorem prover based on Homotopy Type Theory.
- 2019‑08‑07:
C-mera: Lisp macros for metaprogramming C-like languages.
- 2019‑08‑07:
The last working Olivetti mainframe sits in a Tuscan high school.
- 2019‑08‑07:
Fact check: What you may have heard from Elsevier about the dispute with UC.
- 2019‑08‑07:
Don't underestimate grep based code security scanning.
- 2019‑08‑07:
Wine on Windows 10. It works.
- 2019‑08‑06:
Scalable scanning and automatic classification of TLS CBC padding oracle attacks.
- 2019‑08‑06:
Vectorized emulation: hardware accelerated taint tracking at 2 trillion instructions per second.
- 2019‑08‑06:
Pwnie award nominations.
- 2019‑08‑05:
Switching from Common Lisp to Julia.
- 2019‑08‑05:
All the best engineering advice I stole from non-technical people.
- 2019‑08‑05:
Rust language cheat sheet.
- 2019‑08‑04:
Elsevier threatens others for linking to Sci-Hub but does so itself.
- 2019‑08‑04:
Dissecting a dweet: Lorenz attractor.
- 2019‑08‑04:
Securely issuing HTTP requests from the cloud.
- 2019‑08‑04:
A technical analysis of the Capital One AWS S3 hack.
- 2019‑08‑04:
Using PostgreSQL full text search with Golang.
- 2019‑08‑04:
What's new in PostgreSQL 11: built-in web search.
- 2019‑08‑04:
Mastering PostgreSQL full-text search and phrase search.
- 2019‑08‑04:
PostgreSQL fulltext search with DBIx::Class.
- 2019‑08‑03:
Tektronix schematic cartoons.
- 2019‑08‑03:
How a 6,000-year-old dog cancer spread around the world.
- 2019‑08‑03:
Killing a process and all of its descendants.
- 2019‑08‑03:
Motion smoothing is ruining cinema.
- 2019‑08‑03:
How Atlassian stopped XML vulnerabilities from landing in production.
- 2019‑08‑02:
I assure you, medieval people bathed.
- 2019‑08‑02:
Astronauts plan to bake cookies on the ISS.
- 2019‑08‑01:
John Mashey on RISC vs CISC.
- 2019‑08‑01:
The enduring mystery of 'jawn,' Philadelphia's all-purpose word.
- 2019‑08‑01:
Touchpad, Interrupted.
- 2019‑08‑01:
A history of Tetris randomizers.
- 2019‑08‑01:
A discussion of the origins of UNIX filesystem permissions.
- 2019‑08‑01:
Inquiry into the implications for the UK of the proposal to end seasonal clock changes in the EU.
- 2019‑08‑01:
A brief guide to a few algebraic structures.
- 2019‑08‑01:
In Australia, one cat seems to have destroyed an entire bird sanctuary.
- 2019‑08‑01:
Rome's border walls were the beginning of its end.
- 2019‑07‑31:
Golang experience report: generics in Kubernetes.
- 2019‑07‑31:
Thoughts on package dependencies and scaling trust.
- 2019‑07‑31:
After the warming. [1989] (YouTube)
- 2019‑07‑31:
LoRaWAN distance world record: 766km at 25mW.
- 2019‑07‑31:
Container security: a developer guide.
- 2019‑07‑31:
ANTLR: an informal introduction.
- 2019‑07‑31:
Gradual typing from theory to practice.
- 2019‑07‑31:
AWS S3 event notifications have "probably once" delivery.
- 2019‑07‑30:
Learn not to speak Esperanto.
- 2019‑07‑30:
One-bit computing at 60 Hz.
- 2019‑07‑30:
C++ modules might be dead on arrival.
- 2019‑07‑30:
Modern C++ lamentations.
- 2019‑07‑30:
A complete guide to the node.js event loop.
- 2019‑07‑29:
Amazon Web Services: a practical guide.
- 2019‑07‑29:
The encryption/surveillance debate is over, killed by Facebook.
- 2019‑07‑29:
The Swiss Ephemeris is a GPL high precision ephemeris developed by Astrodienst.
- 2019‑07‑29:
Comparisons in C++20.
- 2019‑07‑29:
The hidden costs of automated thinking.
- 2019‑07‑28:
The master of packing-tape calligraphy shares his story.
- 2019‑07‑28:
Entrepreneurs don't have a special gene for risk, they come from families with money.
- 2019‑07‑28:
Goodbye Docker: using Podman, Buildah, and Skopeo instead.
- 2019‑07‑28:
Tokyo subway's duct-tape typographer.
- 2019‑07‑27:
OOP before OOP with Simula.
- 2019‑07‑27:
Glasgow: Scots Army Knife for electronics.
- 2019‑07‑27:
Efficient Golang APIs with the mid-stack inliner.
- 2019‑07‑26:
Not so private thoughts at IETF 105.
- 2019‑07‑26:
Data isn't the new oil, it's the new CO₂.
- 2019‑07‑26:
Safely rewriting Mixpanel's highest-throughput service from Python to Golang.
- 2019‑07‑26:
Alpha compositing.
- 2019‑07‑26:
Cosmic ray update: new results from the moon.
- 2019‑07‑26:
No Moore left to give: enterprise computing after Moore's Law.
- 2019‑07‑26:
Decades-old boolean sensitivity conjecture solved in two pages.
- 2019‑07‑26:
Users hate change.
- 2019‑07‑26:
Hacking a Transcend WiFiSD.
- 2019‑07‑26:
SFTPGo: highly configurable SQL-backed SFTP server.
- 2019‑07‑26:
Some criticisms of RISC-V.
- 2019‑07‑25:
Open infrastructure map.
- 2019‑07‑25:
The Internet golden age that wasn't.
- 2019‑07‑24:
Use plaintext email.
- 2019‑07‑24:
How (not) to sign a JSON object.
- 2019‑07‑24:
Notes on a smaller Rust.
- 2019‑07‑24:
Perils of constructors.
- 2019‑07‑24:
Object-oriented programming in C: a case study of git and the Linux kernel.
- 2019‑07‑24:
Automatic index recommendations in PostgreSQL using pg_qualstats and hypopg.
- 2019‑07‑24:
The mysterious PostgreSQL "backend_flush_after" configuration setting.
- 2019‑07‑24:
A client certificate authentication recipe for PostgreSQL Docker containers.
- 2019‑07‑24:
How are PostgreSQL functions and stored procedures replicated?
- 2019‑07‑24:
PostgreSQL tips for average and power users.
- 2019‑07‑24:
BRIN indexes in PostgreSQL.
- 2019‑07‑24:
Standby in production: scaling PostgreSQL for a large classified ads site.
- 2019‑07‑24:
Unblocking second-generation smart meters.
- 2019‑07‑24:
Python anti-patterns.
- 2019‑07‑24:
How the retweet ruined the Internet.
- 2019‑07‑24:
Lisp code for the textbook "Paradigms of Artificial Intelligence Programming".
- 2019‑07‑24:
Norvig and Pitman tutorial on good Lisp programming style.
- 2019‑07‑24:
Pascal Costanza's highly opinionated guide to Lisp.
- 2019‑07‑24:
A Common Lisp style guide.
- 2019‑07‑24:
Algebraic effects for the rest of us.
- 2019‑07‑24:
Facebook: Mark Zuckerberg's Ponzi scheme.
- 2019‑07‑24:
Mitchell Feigenbaum (1944-2019), 4.66920160910299067185320382...
- 2019‑07‑24:
Composable multi-threaded parallelism in Julia.
- 2019‑07‑23:
Kubernetes is in hospice.
- 2019‑07‑23:
Unicode utilities.
- 2019‑07‑23:
URLhaus: a database of malicious URLs used for malware distribution.
- 2019‑07‑23:
Signs your bra may be the wrong size or a snake.
- 2019‑07‑23:
Raspberry Pi time measurement performance.
- 2019‑07‑23:
Racket2 possibilities.
- 2019‑07‑23:
A pgp long key ID collider.
- 2019‑07‑22:
Do-nothing scripting: a path to gradual automation.
- 2019‑07‑22:
A2-class microSD cards offer no better performance for the Raspberry Pi.
- 2019‑07‑21:
Browsers are pretty good at loading web pages, it turns out.
- 2019‑07‑21:
LGP-30: a drum computer of significance.
- 2019‑07‑21:
Intel prepares add support for Google's bfloat16.
- 2019‑07‑21:
Satellite images show vast swaths of the arctic on fire.
- 2019‑07‑21:
The little-known Soviet mission to rescue the dead space station Salyut 7.
- 2019‑07‑21:
Models of generics and metaprogramming: Golang, Rust, Swift, D, and more.
- 2019‑07‑20:
PuTTY 0.72 release following end of EU bug bounty.
- 2019‑07‑20:
A list of private fusion projects.
- 2019‑07‑20:
History and effective use of vim.
- 2019‑07‑19:
A plan to mine the world's research papers.
- 2019‑07‑19:
Amateur radio digital communications 44.0.0.0/8 partial sell-off.
- 2019‑07‑19:
DataSpill: browser extensions slurped up browsing histories from 4M users.
- 2019‑07‑19:
The challenges of single toggle buttons.
- 2019‑07‑19:
The lesson from the ruins of Notre Dame: don't rely on billionaires.
- 2019‑07‑19:
XSS attacks on Googlebot allow search index manipulation.
- 2019‑07‑18:
How developers use API documentation: an observation study.
- 2019‑07‑18:
Analysis of the Galileo satellite navigation outage.
- 2019‑07‑17:
QuickJS: Fabrice Bellard's JavaScript engine.
- 2019‑07‑17:
Indexing documents for full text search in PostgreSQL.
- 2019‑07‑17:
Not so fast: the performance of WebAssembly vs. native code.
- 2019‑07‑17:
Zelda screen transitions are undefined behaviour.
- 2019‑07‑17:
You thought OpenStreetMap uses WGS84? No it doesn't!
- 2019‑07‑17:
What's coming in Python 3.8?
- 2019‑07‑17:
Certificate flooding, SKS and GnuPG issues, and the Sequoia pgp-in-Rust project.
- 2019‑07‑17:
What is unsafe Rust?
- 2019‑07‑17:
How to speed up the Rust compiler in 2019.
- 2019‑07‑17:
Stream combinators implemented using for await syntax in Rust.
- 2019‑07‑17:
An interview with Margaret Hamilton.
- 2019‑07‑17:
Who's afraid of a big bad optimizing compiler?
- 2019‑07‑17:
Modelling the mythical man-month with the universal scalability law.
- 2019‑07‑17:
Minisign, based on libsodium, compatible with OpenBSD signify.
- 2019‑07‑17:
The PGP problem.
- 2019‑07‑16:
Extending the algebraic manipulability of differentials.
- 2019‑07‑16:
Experience report: rebuilding Racket on Chez Scheme.
- 2019‑07‑16:
Elsa: Emacs Lisp static analyzer.
- 2019‑07‑16:
BPF performance tools: Linux system and application observability. (book announcement)
- 2019‑07‑16:
Ownership and borrowing in the D programming language.
- 2019‑07‑16:
Cookies: what does 'good' look like to the UK ICO?
- 2019‑07‑16:
Why did we wait so long for the bicycle?
- 2019‑07‑16:
A summary of USB-C cable features.
- 2019‑07‑15:
There are 6 kinds of USB-C cables.
- 2019‑07‑15:
dnsfrag2tc: force DNS clients to retry fragmented UDP over TCP using nfqueue.
- 2019‑07‑15:
OpenTTP: a platform for traceable time and frequency.
- 2019‑07‑15:
Against IETF BCP190 on URI design.
- 2019‑07‑15:
bulldohzer: DNS performance measurement tool for DoH and Do53.
- 2019‑07‑15:
Jony Ive's mistakes: when beautiful design is bad design.
- 2019‑07‑14:
What the hardware does is not what your program does with uninitialized memory.
- 2019‑07‑14:
Plot maps of Star Wars.
- 2019‑07‑14:
C++ curiosities: std::move doesn't move.
- 2019‑07‑13:
Why does the C++ standard ship every three years?
- 2019‑07‑13:
C++20 <version> header wreaks havoc on case-insensitive filesystems.
- 2019‑07‑13:
rnp: an OpenPGP library in C++.
- 2019‑07‑13:
notqmail: a collaborative open-source successor to netqmail and qmail.
- 2019‑07‑13:
Tiles to curves: fun with Voronoi graphs.
- 2019‑07‑12:
Literate commits.
- 2019‑07‑12:
International typography on the Web: language support matrix.
- 2019‑07‑12:
ARPANET: the subnet IMPs.
- 2019‑07‑12:
Fuzzing DNS zone parsers.
- 2019‑07‑11:
Lexical differential highlighting.
- 2019‑07‑11:
How to read the international phonetic alphabet.
- 2019‑07‑11:
DoX: a GUI utility for querying DNS via DoH, DoT, or Do53.
- 2019‑07‑11:
Identifying the PDP-7 where Unix began.
- 2019‑07‑11:
DNS fragmentation considered harmful.
- 2019‑07‑11:
Fragmentation considered harmful. (1987)
- 2019‑07‑11:
Pictures of the Cambridge Mathematical Laboratory from the early 1970s.
- 2019‑07‑10:
Raspberry Pi 4 PCI Express.
- 2019‑07‑10:
For 40 years, crashing trains was ovne of America's favorite pastimes.
- 2019‑07‑10:
Python consumes a lot of memory; how to reduce the size of objects?
- 2019‑07‑10:
Impact of A1 and A2 microSD card application performance class.
- 2019‑07‑10:
Raspberry Pi 4 microSD card performance comparisons.
- 2019‑07‑10:
Emulating higher-kinded types in Rust.
- 2019‑07‑10:
Rust async-await status report #2.
- 2019‑07‑09:
The "platform" excuse is dying.
- 2019‑07‑09:
Database transaction correctness anomalies under serializable isolation.
- 2019‑07‑09:
The Riemann Hypothesis says 5040 is the last.
- 2019‑07‑09:
Some Dockerfile best practices.
- 2019‑07‑08:
Tips for reviewing code you don't like.
- 2019‑07‑08:
Earth's eighth persistent lava lake confirmed in the South Sandwich Islands.
- 2019‑07‑08:
Cryptographic key size and algorithm recommendations.
- 2019‑07‑08:
Libsodium quick reference.
- 2019‑07‑08:
Cryptographic right answers.
- 2019‑07‑08:
Fuck RSA.
- 2019‑07‑08:
Linux 5.2 release notes.
- 2019‑07‑07:
Creating hardware where no hardware exists: using Intel SMM to emulate Apple SMC.
- 2019‑07‑07:
Secure EcmaScript: a secure runtime for running third-party code without ambient authority.
- 2019‑07‑07:
Deno: a runtime for TypeScript built with V8, Rust, and Tokio.
- 2019‑07‑06:
Collecting two electrons from each photon could break through the solar cell efficiency limit.
- 2019‑07‑06:
Amazon is liable for defective products sold by their 3rd party marketplace vendors.
- 2019‑07‑06:
Goodbye aberration: physicist solves 2,000-year-old optical problem.
- 2019‑07‑06:
Dr. Robin DiAngelo discusses 'White Fragility'. (YouTube)
- 2019‑07‑05:
Why the Raspberry Pi 4 is incompatible with some USB-C chargers.
- 2019‑07‑05:
Mistakes we make using JavaScript promises.
- 2019‑07‑05:
Software woven into wire: Core rope memory and the Apollo Guidance Computer.
- 2019‑07‑05:
The mystery of Florida's cannonball-eating Spanish fort.
- 2019‑07‑05:
How FZF and ripgrep improved my workflow.
- 2019‑07‑05:
The good voting systems agreement.
- 2019‑07‑05:
What is the female stress response and why is it interesting?
- 2019‑07‑05:
Why not to use two axes on a chart, and what to use instead.
- 2019‑07‑05:
Optimizing jieba-rs to be 33% faster than cppjieba.
- 2019‑07‑04:
The forgotten trans history of the Wild West.
- 2019‑07‑04:
A guide to peeling the trickiest foods.
- 2019‑07‑04:
A better zip decompression bomb.
- 2019‑07‑04:
The coming Boeing bailout?
- 2019‑07‑04:
User Inyerface: a worst-practice UI experiment.
- 2019‑07‑04:
Modern web design.
- 2019‑07‑03:
Why GitLab is ending support for MySQL.
- 2019‑07‑03:
Matlab vs. Julia vs. Python.
- 2019‑07‑03:
D as a C replacement.
- 2019‑07‑03:
Member function pointers in C++.
- 2019‑07‑03:
Tabs are more accessible to the visually impaired than spaces.
- 2019‑07‑02:
ReScue: a tool to detect exponential backtracking regex input.
- 2019‑07‑02:
TLS performance: rustls versus OpenSSL.
- 2019‑07‑02:
How Rust views tradeoffs.
- 2019‑07‑02:
Erskine May, the bible of parliamentary procedure.
- 2019‑07‑02:
Choose boring technology.
- 2019‑07‑02:
Reviving Tim Berners-Lee's WorldWideWeb browser on NeXTSTEP 486.
- 2019‑07‑01:
An astrobiologist tries cooking in Antarctica at -70°C.
- 2019‑07‑01:
lazydocker: a text UI to manage everything Docker.
- 2019‑07‑01:
How to pick a random number from 1-10 using only people.
- 2019‑07‑01:
Strongly TypeScript Vue.
- 2019‑07‑01:
AIs named by AIs.
- 2019‑07‑01:
The convoy phenomenon in lock contention.
- 2019‑07‑01:
jk: configuration as code with TypeScript.
- 2019‑06‑30:
NetBSD on the last G4 Mac mini (and making the kernel power failure proof).
- 2019‑06‑30:
jass: share secrets using SSH keys.
- 2019‑06‑30:
age: A design for a simple file encryption tool and format.
- 2019‑06‑30:
America's monopoly crisis hits the military.
- 2019‑06‑30:
Blitcha.
- 2019‑06‑28:
trustydns: DNS Over HTTPS proxy, server and query programs.
- 2019‑06‑27:
Thin yet repairable devices: HP proves they exist.
- 2019‑06‑26:
Implement with types, not your brain!
- 2019‑06‑26:
RapidCheck: a QuickCheck clone for C++, simple to use with as little boilerplate as possible.
- 2019‑06‑26:
Fuzzing vs property testing.
- 2019‑06‑26:
The Software Tools Users Group archive.
- 2019‑06‑26:
Google's llibc proposal vs musl libc.
- 2019‑06‑25:
Bloom indexes in PostgreSQL.
- 2019‑06‑24:
nom 5: parser combinators for Rust.
- 2019‑06‑24:
Call-by-need is clairvoyant call-by-value.
- 2019‑06‑24:
Facebook's Libra must be stopped.
- 2019‑06‑24:
The Petrie multiplier: how oppression is amplified against minorities.
- 2019‑06‑24:
In the wiggle of an ear, a surprising insight into bat sonar.
- 2019‑06‑24:
Build a Debian Raspberry Pi 3 image.
- 2019‑06‑24:
The spycraft revolution.
- 2019‑06‑24:
Raspberry Pi 4.
- 2019‑06‑24:
Before you use a password manager.
- 2019‑06‑24:
How to avoid dangerous counterfeits on Amazon.
- 2019‑06‑24:
What happens after Amazon's domination Is complete? Its bookstore offers clues.
- 2019‑06‑24:
What does debugging a program look like?
- 2019‑06‑23:
The simple essence of automatic differentiation.
- 2019‑06‑23:
FPGAs have the wrong abstraction for software acceleration.
- 2019‑06‑23:
Generative adversarial networks: the story so far.
- 2019‑06‑23:
Wikipedia page view counts for lyrics in Billy Joel's "we didn't start the fire".
- 2019‑06‑23:
json-table: Transform nested JSON data into tabular data.
- 2019‑06‑22:
mimalloc: a compact general purpose allocator with excellent performance.
- 2019‑06‑22:
Deprecating volatile in C++.
- 2019‑06‑22:
C, Fortran, and single-character strings.
- 2019‑06‑22:
A liquid helix model helps explain the dribbly teapot effect.
- 2019‑06‑22:
The typestate pattern in Rust.
- 2019‑06‑21:
Getting 2FA right.
- 2019‑06‑21:
Confusing JavaScript browser globals.
- 2019‑06‑20:
atexit() is broken.
- 2019‑06‑19:
Debian riscv64 port status.
- 2019‑06‑19:
Tools to set up macOS in QEMU / KVM.
- 2019‑06‑19:
Accelerating Redis with Intel DPDK.
- 2019‑06‑19:
Myths about testosterone and athletics.
- 2019‑06‑19:
Journalism and the TRS-80 model 100.
- 2019‑06‑19:
Nefarious LinkedIn exfiltrates a list of installed extensions from your browser.
- 2019‑06‑18:
Graham Nelson on open sourcing Inform 7.
- 2019‑06‑18:
Secure systems design principles.
- 2019‑06‑18:
Security architecture anti-patterns.
- 2019‑06‑18:
Containers, microservices, and service meshes.
- 2019‑06‑18:
Michaelhouse: a lost Cambridge college, 1324-1540.
- 2019‑06‑18:
Why women leave academia and why universities should be worried.
- 2019‑06‑17:
MillionDollarHomepage domains for sale.
- 2019‑06‑16:
Has "Homosexual" always been in the Bible?
- 2019‑06‑15:
How Joy Division's 'Unknown Pleasures' went from underground album cover to cultural ubiquity.
- 2019‑06‑14:
Grit: mirror monorepo subtrees to GitHub.
- 2019‑06‑14:
Using an iPad for LaTeX.
- 2019‑06‑14:
DNSSEC negative answer synthesis: measuring missing queries for missing names.
- 2019‑06‑13:
Teaching a cheap Dell ethernet switch new tricks.
- 2019‑06‑13:
How to design for the web in 2019.
- 2019‑06‑13:
Adding static type checking to Julia in 100 lines of code.
- 2019‑06‑13:
Preemption is GC for memory reordering.
- 2019‑06‑13:
CERN Microsoft alternatives project: taking back control using open software.
- 2019‑06‑12:
A compilation of Kubernetes failure/horror stories.
- 2019‑06‑12:
RAMbleed: reading bits in memory without accessing them.
- 2019‑06‑12:
Matrix 1.0 and the Matrix.org foundation.
- 2019‑06‑12:
Missions to Mars during the 2020 minimum energy launch window.
- 2019‑06‑12:
"1984" at seventy: why we still read Orwell's book.
- 2019‑06‑12:
Out of stock: how to survive the lack of LTO-8 tapes.
- 2019‑06‑12:
A C++ access control pattern: the badge.
- 2019‑06‑12:
IBM and the Holocaust.
- 2019‑06‑12:
You (probably) don't need ReCAPTCHA.
- 2019‑06‑12:
Using the Z3 SMT solver to find optimal GBA palettes.
- 2019‑06‑11:
How the CIA flattened literature.
- 2019‑06‑11:
Typed constants in Golang.
- 2019‑06‑11:
From design patterns to category theory.
- 2019‑06‑11:
From dependency injection to dependency rejection.
- 2019‑06‑11:
Compiling to categories.
- 2019‑06‑11:
Unicode programming, with examples in C.
- 2019‑06‑11:
AMD Zen 2 microarchitecture analysis: Ryzen 3000 and EPYC Rome.
- 2019‑06‑10:
The ice bucket challenge dramatically accelerated the fight against ALS.
- 2019‑06‑09:
Opera, Brave, Vivaldi to ignore Chrome's anti-ad-blocker changes.
- 2019‑06‑08:
A mysterious crystal that melts at two different temperatures.
- 2019‑06‑08:
World flags as Japanese cosplay.
- 2019‑06‑07:
Using pointers in Ada SPARK.
- 2019‑06‑07:
Why do Python lists let you += a tuple, when you can't + a tuple?
- 2019‑06‑07:
Quantum leaps, long assumed to be instantaneous, take time.
- 2019‑06‑07:
DSAC: why is NASA sending an atomic clock into space?
- 2019‑06‑07:
Happy birthday, BGP.
- 2019‑06‑07:
A lithium-glass battery that keeps getting better?
- 2019‑06‑06:
Google street view hyperlapse. (Video)
- 2019‑06‑06:
The weather forecaster: The man who decided D-Day.
- 2019‑06‑06:
Tokyo mechanical keyboard meetup photos.
- 2019‑06‑06:
Using one RNG to sample another: the shrinking generator and stream ciphers.
- 2019‑06‑05:
The cutting-edge of cutting: How Japanese scissors have evolved.
- 2019‑06‑05:
Good Omens: Neil Gaiman and creators talk about adapting the book for TV.
- 2019‑06‑05:
Links to papers on the history of atomic clocks.
- 2019‑06‑05:
This page is a truly naked, brutalist html quine.
- 2019‑06‑04:
Colons in computer-science paper titles.
- 2019‑06‑04:
Challenges in time transfer using the network time protocol (NTP).
- 2019‑06‑04:
The abominable Laffer curve.
- 2019‑06‑04:
Google Chrome, the perfect antitrust villain?
- 2019‑06‑03:
Analyzing performance analysis performance: weird PostgreSQL slowness on Docker for Mac.
- 2019‑06‑03:
Brython: Python 3 in the browser.
- 2019‑06‑03:
Uh-oh .io: Question mark over trendy TLD as UN condemns British treatment of Chagos.
- 2019‑06‑03:
What makes a (graphics / SIGGRAPH) systems paper beautiful.
- 2019‑06‑03:
REIN: repetitive electrical impulse noise.
- 2019‑06‑02:
Compiling C to WebAssembly without Emscripten.
- 2019‑06‑02:
At least one Vim trick you might not know.
- 2019‑06‑02:
Metadata is the biggest little problem plaguing the music industry.
- 2019‑06‑02:
A DIY microhydro plant.
- 2019‑06‑02:
Reinventing the small wind turbine.
- 2019‑06‑02:
Scaling to 1 million active GraphQL subscriptions with Hasura and PostgreSQL.
- 2019‑06‑01:
How Qualcomm shook down the cell phone industry for almost 20 years.
- 2019‑06‑01:
Notes to myself on software engineering.
- 2019‑05‑30:
Why Intel Ice Lake AVX512 is important: a bit-basher's perspective.
- 2019‑05‑30:
Cake or death: AMP and the worrying power dynamics of the web.
- 2019‑05‑30:
runtypes: runtime validation for static types in TypeScript.
- 2019‑05‑30:
io-ts: runtime types for IO decoding/encoding in TypeScript.
- 2019‑05‑30:
Announcing TypeScript 3.5.
- 2019‑05‑30:
WhatDoTheyKnow Pro helps TBIJ get the whole picture on council land sell-off.
- 2019‑05‑30:
The author of uBlock on Google Chrome's proposal to cripple ad blockers.
- 2019‑05‑30:
Google's IPv6 traffic stats: will 28% deployment really be the limit?
- 2019‑05‑30:
Google goes ahead with ad-blocker crackdown, except for paid-up enterprise Chrome users.
- 2019‑05‑30:
Goroutine local storage.
- 2019‑05‑28:
Beating up on qsort with radix sort.
- 2019‑05‑28:
inNative: WebAssembly as an architecture-neutral executable distribution format.
- 2019‑05‑27:
An interview with DuckDuckGo CEO Gabe Weinberg.
- 2019‑05‑27:
Ten simple rules for better charts and graphs.
- 2019‑05‑27:
Pragmatic Debian packaging in 2019.
- 2019‑05‑27:
How we found the source of the mystery signals at The Dish.
- 2019‑05‑27:
Urbanism under Google: lessons from Sidewalk Toronto.
- 2019‑05‑27:
Insulin pumps, decapped chips, and software defined radios.
- 2019‑05‑27:
We need to talk about digital blackface in reaction GIFs.
- 2019‑05‑26:
RCE without native code: exploiting a write-what-where vulnerability in Internet Explorer.
- 2019‑05‑26:
The Euclid-Mullin sequence of prime numbers.
- 2019‑05‑26:
Giving Haskell a promotion.
- 2019‑05‑26:
Button placement and order in web forms and dialogs.
- 2019‑05‑26:
What the Royal Astronomical Society in 1884 tells us about Python time handling bugs.
- 2019‑05‑26:
Thinking with Types: type-level programming in Haskell.
- 2019‑05‑26:
Higher-order type-level programming in Haskell.
- 2019‑05‑26:
Self-distancing: what it is and how you can use it to make better decisions.
- 2019‑05‑26:
Is SpaceX's Raptor the king of rocket engines?
- 2019‑05‑25:
CSS rules that will make your life easier.
- 2019‑05‑25:
The lingua franca of LaTeX.
- 2019‑05‑25:
MIDI 2.0, MIDI-CI, profiles, and property exchange.
- 2019‑05‑24:
Extending the slit-scan video special effect technique.
- 2019‑05‑24:
How to ruin a perfectly good container.
- 2019‑05‑24:
Creating C/C++ APIs in Rust.
- 2019‑05‑24:
The definitive guide to running EC2 spot instances as Kubernetes worker nodes.
- 2019‑05‑24:
A Kubernetes any% speedrun.
- 2019‑05‑24:
Website popularity rankings: an extensive analysis.
- 2019‑05‑24:
Hobbling Huawei: the 5G risks of China's tech giant.
- 2019‑05‑24:
LEGO Braille bricks.
- 2019‑05‑23:
Animagraffs: animated infographics about everything.
- 2019‑05‑23:
507 mechanical movements.
- 2019‑05‑23:
When the AWS DNS resolver drops packets because you hit the query quota.
- 2019‑05‑23:
Visualizing PostgreSQL vacuum progress.
- 2019‑05‑23:
Analysis of various tricky Rust code.
- 2019‑05‑23:
Efficiently searching in-memory sorted arrays: revenge of the interpolation search?
- 2019‑05‑23:
Exploring new frontiers for Git push performance.
- 2019‑05‑23:
Stupid git tricks: Combining two files into one while preserving line history.
- 2019‑05‑22:
The physical kilogram is officially dead.
- 2019‑05‑22:
It's a trap-ezoid: CSS Shapes aren't what you'd expect.
- 2019‑05‑22:
ads.txt specification for authorized ad resellers.
- 2019‑05‑21:
Heroines of chaos: Ellen Fetter and Margaret Hamilton.
- 2019‑05‑21:
Make Linux fast again: when you don't need sidechannel vulnerability protection.
- 2019‑05‑20:
Star Wars Vader vs Kenobi, reimagined.
- 2019‑05‑20:
A tale of query optimization in PostgreSQL.
- 2019‑05‑20:
Fixing an XSS vulnerability in the Haskell search engine Hoogle.
- 2019‑05‑20:
IBM 360 Model 20 rescue and restoration.
- 2019‑05‑19:
When male runners lose to women.
- 2019‑05‑19:
Virtual DOM is pure overhead.
- 2019‑05‑19:
Using Ed25519 signing keys for encryption.
- 2019‑05‑18:
Abusing SECURITY DEFINER functions in PostgreSQL.
- 2019‑05‑18:
Black, hot superionic ice may be nature's most common form of water.
- 2019‑05‑17:
The 2019 Linux storage, filesystem, and memory-management summit.
- 2019‑05‑17:
WireGuard on OpenBSD.
- 2019‑05‑17:
The story male editors kept killing.
- 2019‑05‑17:
Pointedly confusing: a longstanding sizeof() bug in Microsoft C.
- 2019‑05‑17:
dnsfire: a proof-of-concept DNS-driven firewall enforcer.
- 2019‑05‑17:
Writing a procedural puzzle generator.
- 2019‑05‑17:
Fundamental design principles for non-designers.
- 2019‑05‑16:
The 3.5% rule: a threshold of success for non-violent protest.
- 2019‑05‑16:
A report from Google's AMP advisory committee meeting.
- 2019‑05‑15:
Things you might not be using in Python 3, but should.
- 2019‑05‑15:
Going Critical: diffusion models, disease, and knowledge.
- 2019‑05‑13:
A horrifying globalThis polyfill in universal JavaScript.
- 2019‑05‑12:
Linux iptables processing flowchart.
- 2019‑05‑12:
The fully general system for learning to do hard things.
- 2019‑05‑12:
Trial of overhead electric lines for HGVs in Germany.
- 2019‑05‑12:
The peculiar blindness of experts.
- 2019‑05‑11:
OCaml has some shiny new monadic and applicative syntax.
- 2019‑05‑11:
Shenandoah GC in production: an experience report.
- 2019‑05‑11:
Announcing GraalVM 19.
- 2019‑05‑11:
2D graphics on modern GPU.
- 2019‑05‑11:
From collisions to chosen-prefix collisions, applied to full SHA-1.
- 2019‑05‑10:
Agnotology and epistemological fragmentation.
- 2019‑05‑10:
Compile-time coprocessor codegen with Rust macros.
- 2019‑05‑10:
It's time to break up Facebook.
- 2019‑05‑10:
Fourier synthesis vector CRT character generator.
- 2019‑05‑10:
PostScript and Interpress: a comparison. (1985)
- 2019‑05‑10:
Why are 2D vector graphics so much harder than 3D?
- 2019‑05‑09:
Inside the recovery from the Firefox add-on certificate expiry failure.
- 2019‑05‑09:
For better computing, liberate CPUs with a garbage collection coprocessor.
- 2019‑05‑09:
Post-mortem and remediations for matrix.org's April security incident.
- 2019‑05‑09:
When dates became regular and universal, it changed history.
- 2019‑05‑08:
JSMpeg: an MPEG1 decoder in JavaScript for low-latency streaming.
- 2019‑05‑08:
How C array sizes become part of a library's ABI.
- 2019‑05‑08:
Google Ads malware seen in the wild.
- 2019‑05‑08:
Brian Kernighan interviews Ken Thompson. (YouTube)
- 2019‑05‑08:
Ted Chiang returns with an awe-inducing collection "Exhalation".
- 2019‑05‑08:
pg_auto_failover: Open source extension for high availability of PostgreSQL.
- 2019‑05‑08:
Dealing with software collapse / rot.
- 2019‑05‑08:
Securing network time.
- 2019‑05‑08:
Surprisingly Turing-Complete.
- 2019‑05‑08:
Securing cookies with cookie prefixes.
- 2019‑05‑08:
Building a URL shortener with only AWS Lambda.
- 2019‑05‑08:
css-only-chat: A truly monstrous async web chat using no JS whatsoever on the frontend.
- 2019‑05‑07:
How Cloudflare serves up hate online.
- 2019‑05‑07:
Halving metrics ingestion latency by (briefly) forking the Golang compiler.
- 2019‑05‑07:
How Rust solves dependency hell.
- 2019‑05‑07:
ups: an X11 debugger for C.
- 2019‑05‑06:
May 1968: a chronology of events in France and internationally.
- 2019‑05‑06:
Low-latency typing with pleasure.
- 2019‑05‑06:
Rust await syntax considerations.
- 2019‑05‑06:
A final proposal for await syntax in Rust.
- 2019‑05‑06:
The existential crisis plaguing online extremism researchers.
- 2019‑05‑06:
Lithium-ion batteries from Amazon are exploding.
- 2019‑05‑05:
How twisted graphene became the big thing in physics.
- 2019‑05‑04:
Unraveling the JPEG.
- 2019‑05‑04:
Legit: an esoteric programming language encoded in a git commit graph.
- 2019‑05‑04:
Don't do this with PostgreSQL.
- 2019‑05‑03:
Enforcing compile-time permission checking with TypeScript brands.
- 2019‑05‑03:
Generic returns in Rust.
- 2019‑05‑03:
Mathematical jargon failures.
- 2019‑05‑02:
The myth of the impartial machine.
- 2019‑05‑01:
The search for McLaren's extra pedal.
- 2019‑05‑01:
YouTube's conspiracy to kill IE6.
- 2019‑05‑01:
What we're learning about how the sector understands "digital".
- 2019‑05‑01:
GIN indexes in PostgreSQL.
- 2019‑04‑29:
The weirdest JavaScript syntax.
- 2019‑04‑29:
Too simple to be simple.
- 2019‑04‑29:
Why isn't 1 a prime number?
- 2019‑04‑29:
The saddest thing about the integers: you can't tune a piano.
- 2019‑04‑28:
The structure of a programming language revolution.
- 2019‑04‑28:
Forget privacy: you're terrible at targeting anyway.
- 2019‑04‑28:
Psychology of human misjudgment.
- 2019‑04‑27:
Stop memset()ing structures.
- 2019‑04‑27:
A woman's work: the inside story.
- 2019‑04‑27:
Turing completeness, weird machines, and muddled terminology.
- 2019‑04‑27:
Open-sourcing F14: Facebook's memory-efficient hash tables.
- 2019‑04‑26:
Ireland blocks the world on data privacy.
- 2019‑04‑26:
Making the DNS more private with QNAME minimisation.
- 2019‑04‑25:
Extensibility, XML Vocabularies, and XML Schema.
- 2019‑04‑24:
Getting started with qemu.
- 2019‑04‑24:
First debris pieces from the Indian ASAT test of 27 March catalogued.
- 2019‑04‑24:
A 'blockchain bandit' is guessing private keys and scoring millions.
- 2019‑04‑24:
Past the tipping point: the persistence of firefighting in product development.
- 2019‑04‑23:
Consoles of IBM System/360 mainframes.
- 2019‑04‑23:
When workers control the code.
- 2019‑04‑23:
(Right to Left (The Mirror World
- 2019‑04‑23:
TLS guidelines from NCSC-NL.
- 2019‑04‑23:
Egg Clock, with photochromic paint and a laser. (YouTube)
- 2019‑04‑23:
An overview of the C++ lifetime safety proposal.
- 2019‑04‑23:
Lifetime safety: preventing common dangling pointer errors in C++.
- 2019‑04‑23:
Modern C++ won't save us.
- 2019‑04‑22:
Windows CreateProcess() is accidentally quadratic.
- 2019‑04‑22:
Generating fractals with Postgres.
- 2019‑04‑22:
Is everything an MLM?
- 2019‑04‑22:
Some internet outages predicted soon as BGP '768k Day' approaches.
- 2019‑04‑22:
Hardening SSH with 2FA.
- 2019‑04‑22:
Facial recognition is the plutonium of AI.
- 2019‑04‑22:
Optimize What? Silicon Valley is full of the stupidest geniuses you'll ever meet.
- 2019‑04‑21:
The antique toaster that's better than yours. (YouTube)
- 2019‑04‑21:
Computus, antisemitism, and the early christian debate over easter.
- 2019‑04‑21:
Defeating Racket's separate compilation guarantee.
- 2019‑04‑20:
Fairylog: a Racket DSL for generating Verilog.
- 2019‑04‑20:
BYD, the world's biggest electric car maker.
- 2019‑04‑20:
New features in Fortran 2018.
- 2019‑04‑20:
What is Infocom ZIL anyway?
- 2019‑04‑19:
12 nice Rust libraries you should try.
- 2019‑04‑19:
Custom allocators in C++.
- 2019‑04‑18:
Neopentylglycol: a competitive solid refrigerant.
- 2019‑04‑18:
Adventures in reverse engineering Broadcom NIC firmware.
- 2019‑04‑18:
Thundering herds and cached promises.
- 2019‑04‑18:
Microsoft Windows Tiles vulnerable to a subdomain takeover attack.
- 2019‑04‑17:
Let's Encrypt will transition to their own root CA in July.
- 2019‑04‑17:
Post-surgical deaths in Scotland drop by a third, with the help of a checklist.
- 2019‑04‑17:
From the MCU to Star Wars: in praise of poorly built worlds.
- 2019‑04‑17:
RFC 8546: the wire image of a network protocol.
- 2019‑04‑17:
Nearly every sport except long-distance running is fundamentally absurd.
- 2019‑04‑16:
A look at IBM/360 core memory.
- 2019‑04‑16:
More DoH.
- 2019‑04‑15:
Convenient and idiomatic conversions in Rust.
- 2019‑04‑14:
A wander through a weird landscape to the heart of compilation.
- 2019‑04‑14:
Moving to a provenance-aware memory object model for C: a proposal for C2x.
- 2019‑04‑14:
Autonomous precision landing of space rockets.
- 2019‑04‑13:
Languages I want to write.
- 2019‑04‑13:
Automated testing of Rust examples in README files.
- 2019‑04‑13:
Value categories and references to them in C++.
- 2019‑04‑13:
Stable half-pixel filtering for video codecs.
- 2019‑04‑12:
A novel compact VLF antenna for communicating where other radios fail.
- 2019‑04‑11:
Using 6 page and 2 page documents to make organizational decisions.
- 2019‑04‑11:
Visibility of IPv4 and IPv6 prefix lengths.
- 2019‑04‑11:
EU agencies falsely report more than 550 archive.org URLs as terrorist content.
- 2019‑04‑10:
Mysterious safety-tampering malware infects a second critical infrastructure site.
- 2019‑04‑10:
Network boot to the rescue, with UEFI and IPv6.
- 2019‑04‑10:
Building the System/360 mainframe nearly destroyed IBM.
- 2019‑04‑10:
NVMM: NetBSD virtual machine manager.
- 2019‑04‑10:
A fork() in the road.
- 2019‑04‑09:
Amazon shoppers misled by 'bundled' star-ratings and reviews.
- 2019‑04‑09:
Facebook's ad targeting algorithm is inherently biased.
- 2019‑04‑08:
Most people do not expect Google to track their activities so pervasively.
- 2019‑04‑08:
Codecademy vs. the BBC Micro.
- 2019‑04‑08:
Angst about DNS privacy and DoH / DoC.
- 2019‑04‑08:
Types for programming and reasoning.
- 2019‑04‑08:
Compiling C to WebAssembly using clang/LLVM and WASI.
- 2019‑04‑07:
How poor public transport explains the UK's productivity puzzle.
- 2019‑04‑07:
Most browsers do not let you turn off hyperlink auditing third-party click tracking.
- 2019‑04‑07:
Fast directory listing on Linux.
- 2019‑04‑05:
Writing six-pagers at Amazon.
- 2019‑04‑05:
"Problems" with git format-patch and Gmail.
- 2019‑04‑05:
Using grub to patch the bios so Windows will boot with 16 GB of RAM in a motherboard that doesn't support it.
- 2019‑04‑04:
Idiomatic monads in Rust.
- 2019‑04‑02:
From gnuplot to Matplotlib and Pandas.
- 2019‑04‑01:
Mailchimp's Mandrill outage due to PostgreSQL XID wraparound.
- 2019‑04‑01:
Learning from The Economist's errors in data visualisation.
- 2019‑04‑01:
A parser for the TLS data description language used in the IETF RFCs.
- 2019‑03‑31:
Why are economists giving Piketty the cold shoulder?
- 2019‑03‑31:
Transparent huge pages: measuring the performance impact on a large JVM application.
- 2019‑03‑31:
Making chip packaging simpler.
- 2019‑03‑31:
RaptorQ (RFC6330) performance optimization in Rust.
- 2019‑03‑30:
The day the dinosaurs died.
- 2019‑03‑30:
Common statistical tests are linear models, or, how to teach stats.
- 2019‑03‑30:
DEC VT100 raster CRT typography.
- 2019‑03‑29:
Five super helpful Rust things that you might not have been told about.
- 2019‑03‑29:
mal: make a lisp.
- 2019‑03‑29:
The filter bubble is actually a decision bubble.
- 2019‑03‑28:
Lucet: Fastly's native WebAssembly compiler and runtime.
- 2019‑03‑28:
Stoicism's appeal to the rich and powerful.
- 2019‑03‑28:
The phantom builder in Rust.
- 2019‑03‑27:
Appl still hasn't fixd its MacBook kyboad poblm.
- 2019‑03‑27:
Some reasons why ASN.1 BER/CER/DER and other TLV encodings are bad.
- 2019‑03‑27:
From L3 to seL4: what have we learnt in 20 years of L4 microkernels?
- 2019‑03‑27:
An Intel programmer's impressions of ARM SIMD programming.
- 2019‑03‑27:
Sum-of-three-cubes problem solved for stubborn number 33.
- 2019‑03‑27:
A commentary on Arthur Whitney's b compiler.
- 2019‑03‑27:
Unexpected DNSKEY query growth around the 2018 root zone KSK rollover.
- 2019‑03‑26:
European parliament votes to delegate summer time rules to member states.
- 2019‑03‑26:
An experimental DNS-over-QUIC to UDP proxy.
- 2019‑03‑26:
Moral crumple zones: The future of designing autonomous systems will involve ethnographers.
- 2019‑03‑26:
Moral crumple zones: cautionary tales in human-robot interaction.
- 2019‑03‑25:
Gravitational lensing: a new Einstein cross is discovered.
- 2019‑03‑25:
In defense of YAML.
- 2019‑03‑25:
Hexagonal cross stitch.
- 2019‑03‑24:
What has your microcode done for you lately?
- 2019‑03‑24:
On the S-Box of GOST Streebog and Kuznyechik.
- 2019‑03‑24:
Pyre: Facebook's static type checker for Python.
- 2019‑03‑24:
PyType: Google's static type analyzer for Python.
- 2019‑03‑24:
KaTeX: the fastest math typesetting library for the web.
- 2019‑03‑24:
Symbols and functions available and not available in KaTeX.
- 2019‑03‑24:
PyRight: a static type checker for Python written by Microsoft in TypeScript.
- 2019‑03‑23:
Maybe you want Nomad rather than Kubernetes.
- 2019‑03‑23:
A Julia interpreter and debugger.
- 2019‑03‑23:
SRE case study: http load balancer confusion caused by broken back end web server.
- 2019‑03‑22:
Under the hood of the new ARIN web site.
- 2019‑03‑22:
So you want your app/website to work in China...
- 2019‑03‑21:
Computer latency at human scale.
- 2019‑03‑20:
Hacking JSON Web Tokens.
- 2019‑03‑20:
The pneumatic clock network in Paris, 1880-1927.
- 2019‑03‑20:
International space station docking standard.
- 2019‑03‑20:
How to take back control of /etc/resolv.conf on Linux.
- 2019‑03‑20:
CVE-2019-6454: systemd (PID1) crash with specially crafted unprivileged D-Bus message.
- 2019‑03‑20:
When pigs fly: optimising bytecode interpreters.
- 2019‑03‑20:
Optimizing a 350 line pathtracer in Rust From 48s to 5s.
- 2019‑03‑20:
Hardware debugging with JTAG on a Raspberry Pi.
- 2019‑03‑20:
Neo-Nazis bet big on Bitcoin (and lost).
- 2019‑03‑18:
IPv6 address unmasking via UPnP.
- 2019‑03‑18:
Meritocracy doesn't exist, and believing it does is bad for you.
- 2019‑03‑17:
Questions on the future of Open Source.
- 2019‑03‑17:
The 15 most famous transcendental numbers.
- 2019‑03‑17:
Nile shipwreck discovery proves Herodotus right, after 2,469 years.
- 2019‑03‑17:
On the hunt for Japan's elaborate, colorful utility access covers.
- 2019‑03‑17:
What is Amazon?
- 2019‑03‑17:
Unicode TOFU: detect changes to strings over time that might be spoofing.
- 2019‑03‑17:
Association of cognitive function with carbon dioxide exposure in office workers.
- 2019‑03‑17:
A gallery of early computers, 1940s - 1960s.
- 2019‑03‑16:
DNS timeline.
- 2019‑03‑16:
Analytical methods for mapping a circular disc to a square.
- 2019‑03‑16:
Repairing brass instruments with magnets.
- 2019‑03‑16:
William Jones: the man who invented π.
- 2019‑03‑15:
XXH3: a new speed-optimized hash algorithm.
- 2019‑03‑15:
What causes Ruby memory bloat?
- 2019‑03‑15:
Gwern's law: ads cost you 10% of your traffic.
- 2019‑03‑14:
Porting PuTTY to Windows on Arm.
- 2019‑03‑14:
A curious case of intermittent test failures due to slow SSD TRIM.
- 2019‑03‑14:
On the past, present, and future of COBOL.
- 2019‑03‑13:
Alice 4: a tablet dedicated to old SGI demos.
- 2019‑03‑13:
Fast / accurate floating point division with known divisor.
- 2019‑03‑13:
Generating bit combinations with Gosper's hack.
- 2019‑03‑13:
RFC 8555 ACME: universal encryption through automation.
- 2019‑03‑13:
GoDaddy, Apple, and Google misissue >1 million certificates with short serial numbers.
- 2019‑03‑13:
'The Left Hand of Darkness' at fifty.
- 2019‑03‑13:
Bugs and fixes for boot delays due to lack of random entropy on Linux.
- 2019‑03‑12:
Tips for a JavaScript-free web frontend.
- 2019‑03‑12:
Researchers find critical backdoor in Swiss online voting system.
- 2019‑03‑12:
Font shaping is Turing complete.
- 2019‑03‑10:
Usability improvements in GCC 9.
- 2019‑03‑10:
Lvalue min and max in C++.
- 2019‑03‑08:
Theranos: How a broken patent system sustained its decade-long deception.
- 2019‑03‑07:
A Golang malformed HTTP POST mystery.
- 2019‑03‑07:
Why do remote meetings suck so much?
- 2019‑03‑07:
Orchestrating false beliefs about gender discrimination.
- 2019‑03‑07:
Gender imbalances in the world's leading orchestras.
- 2019‑03‑07:
The precarious effort to continue traditional soy sauce production in Japan.
- 2019‑03‑06:
Automated tools discriminate against Black American language.
- 2019‑03‑06:
Keeping CALM: when distributed consistency is easy.
- 2019‑03‑06:
Why American rail construction costs are so high.
- 2019‑03‑06:
Mathgen: Randomly generated mathematics research papers.
- 2019‑03‑04:
Remote code execution and Domain Admin privileges due to a typo in PHP.
- 2019‑03‑04:
A quick look at QUIC.
- 2019‑03‑04:
What part of "No!" doesn't the DNS understand?
- 2019‑03‑04:
TLS in F*: Generating C code that people actually want to use.
- 2019‑03‑04:
Near misses, and how to avoid catastrophe.
- 2019‑03‑04:
The birthday paradox: on Jupiter, and beyond!
- 2019‑03‑04:
The MBA myth and the CEO cult.
- 2019‑03‑04:
Discrete robot motion planning in a continuous domain.
- 2019‑03‑03:
Understanding real-world concurrency bugs in Golang.
- 2019‑03‑03:
Debugging the Postgres query planner.
- 2019‑03‑03:
Memory Models: a case for rethinking parallel languages and hardware.
- 2019‑03‑03:
Not quite so broken TLS.
- 2019‑03‑03:
Lower bounds for the cost of multiplication via network coding.
- 2019‑03‑02:
Your database migrations are bad and you should feel bad.
- 2019‑03‑02:
Millions of binaries later: a look into Linux hardening in the wild.
- 2019‑03‑02:
OpenSSL future architecture plans.
- 2019‑03‑01:
DigiCert in-addr.arpa X.509 certificate mis-issuance.
- 2019‑03‑01:
Casper's clever little nightlight.
- 2019‑03‑01:
NASA is planning a space station in a weird lunar orbit.
- 2019‑03‑01:
Transparent logs for skeptical clients.
- 2019‑03‑01:
Formally specifying user interfaces.
- 2019‑03‑01:
Twitter (un)official API keys.
- 2019‑03‑01:
Reconstructing Twitter's firehose.
- 2019‑03‑01:
re2c: a free and open-source lexer generator for C and C++.
- 2019‑03‑01:
Hyperscan: a fast multi-pattern regex matcher for modern CPUs.
- 2019‑03‑01:
University of California terminates subscriptions with Elsevier in support of open access.
- 2019‑03‑01:
The other wrapping-the-Earth problem.
- 2019‑03‑01:
Git over FTP.
- 2019‑02‑28:
A deep dive on the recent widespread DNS hijacking attacks.
- 2019‑02‑28:
The surprising subtleties of zeroing a register.
- 2019‑02‑28:
We need Chrome no more.
- 2019‑02‑28:
PostgreSQL BRIN indexes: performance for big data with minimal storage.
- 2019‑02‑28:
The current state of open source backup management for PostgreSQL.
- 2019‑02‑28:
ExSpectre: hiding malware in speculative execution.
- 2019‑02‑27:
The soothing promise of our own artisanal Internet.
- 2019‑02‑27:
Content moderation has no easy answers.
- 2019‑02‑27:
Why women are underrepresented in clinical trials.
- 2019‑02‑27:
The 1979 Delft cycle plan.
- 2019‑02‑27:
Running a bakery on Emacs and PostgreSQL.
- 2019‑02‑26:
Thunderclap: vulnerabilities in IOMMU protection against untrustworthy peripherals.
- 2019‑02‑26:
The unscalable deadlock-prone thread pool.
- 2019‑02‑26:
Normalization of deviance.
- 2019‑02‑26:
Sisterhood of Cycling: the radical roots of the bicycle.
- 2019‑02‑26:
Type systems and logic.
- 2019‑02‑25:
Vim anti-patterns.
- 2019‑02‑25:
Stabilizer: statistically sound performance evaluation.
- 2019‑02‑24:
A meta approach to implementing programming languages.
- 2019‑02‑24:
How does the measles vaccine protect against other infectious diseases?
- 2019‑02‑24:
Stressing the elements: "illegal" Lego builds.
- 2019‑02‑24:
Enquire: discover C limits.h and float.h machine and compiler properties.
- 2019‑02‑24:
The cost of abstraction.
- 2019‑02‑24:
PostgreSQL on Linux fsync failure fixed.
- 2019‑02‑24:
The magical thinking of guys who love logic.
- 2019‑02‑23:
Varieties of polymorphism in Haskell.
- 2019‑02‑23:
Why does Julia work so well?
- 2019‑02‑23:
How not to measure computer system performance.
- 2019‑02‑22:
Gordon Ramsay's approach to food helped my family of autistic eaters.
- 2019‑02‑22:
Password managers: under the hood of secrets management.
- 2019‑02‑22:
Finally tagless, partially evaluated.
- 2019‑02‑21:
TSMC's photoresist contamination incident: $550 million in lost revenue.
- 2019‑02‑21:
COI: chat-over-IMAP.
- 2019‑02‑21:
Delta Chat: chat-over-email.
- 2019‑02‑21:
Patent exhaustion and open source.
- 2019‑02‑21:
Exploitation from malicious PCI Express peripherals.
- 2019‑02‑21:
simdjson: Parsing gigabytes of JSON per second.
- 2019‑02‑21:
How to get rid of sponsored Facebook posts.
- 2019‑02‑20:
Lessons from six software rewrite stories.
- 2019‑02‑20:
Mathematics, morally.
- 2019‑02‑20:
Vector instructions are better then SIMD instructions.
- 2019‑02‑20:
Maybe 'Oumuamua is an interstellar snowflake.
- 2019‑02‑19:
AWS Nitro system.
- 2019‑02‑19:
3264 conics tangent to five conics.
- 2019‑02‑19:
Linux kernel DNS resolver module.
- 2019‑02‑19:
Why a grape turns into a fireball in a microwave.
- 2019‑02‑18:
ASCII art in comments in code.
- 2019‑02‑18:
Spectre is here to stay: An analysis of side-channels and speculative execution.
- 2019‑02‑18:
Machine-learning in science is producing results that are misleading and often completely wrong.
- 2019‑02‑18:
Differential privacy: an easy case.
- 2019‑02‑18:
Dropgangs: darknet markets using systems of dead drops.
- 2019‑02‑18:
Encrypted databases, searchable encryption, and the ever-expanding leakage function.
- 2019‑02‑18:
Operable software: on simplicity, complexity, and observability.
- 2019‑02‑18:
How GitLab used delayed replication for disaster recovery with PostgreSQL.
- 2019‑02‑18:
Towards an understanding of technical debt.
- 2019‑02‑18:
The log/event processing pipeline you can't have.
- 2019‑02‑18:
LD_PRELOAD: the hero we need and deserve.
- 2019‑02‑17:
The joy of standards.
- 2019‑02‑17:
You probably don't need a single-page application.
- 2019‑02‑17:
Mesh: compacting memory management for C/C++ applications.
- 2019‑02‑17:
The rest of the world always knew Churchill was a villain.
- 2019‑02‑16:
Information related to #dns on freenode.
- 2019‑02‑16:
The Single Rotation rule: a remarkably simple and rich reversible cellular automaton.
- 2019‑02‑15:
The complicated economy of Open Source software.
- 2019‑02‑15:
Don't get clever with login forms.
- 2019‑02‑15:
Dudle: online event coordination and survey application. (A Free alternative to Doodle.)
- 2019‑02‑15:
Computing extremely accurate quantiles using t-digests.
- 2019‑02‑15:
Tubes vs. transistors: a comparative study.
- 2019‑02‑15:
Lessons from Google's geographical GDPR goof.
- 2019‑02‑15:
Logical difficulties in modern mathematics.
- 2019‑02‑15:
Why do the Northern and Southern Lights differ?
- 2019‑02‑15:
Making a Menger sponge in stained glass.
- 2019‑02‑14:
How white space killed an enterprise app, and why data density matters.
- 2019‑02‑13:
A history of the Network Information Center.
- 2019‑02‑13:
Is email making professors stupid?
- 2019‑02‑12:
The curious case of disappearing buses.
- 2019‑02‑12:
Kubernetes ndots 5 and long DNS search path.
- 2019‑02‑11:
None of my web projects want to be single page applications.
- 2019‑02‑11:
1839 woven portrait of Jacquard: an important image from the early history of computing.
- 2019‑02‑11:
CVE-2019-5736: Linux container breakout.
- 2019‑02‑11:
A century of Noether's theorem.
- 2019‑02‑11:
Chronos: a secure selection and filtering mechanism for NTP.
- 2019‑02‑11:
Laziness does not exist, but unseen barriers do.
- 2019‑02‑11:
The New Systems Engineer.
- 2019‑02‑11:
Fact-checking Facebook was like playing a doomed game of Whack-A-Mole.
- 2019‑02‑11:
Questions for a new technology.
- 2019‑02‑11:
Make the web boring.
- 2019‑02‑11:
The future of public access to Castle Mound.
- 2019‑02‑11:
How do we know the history of extreme poverty?
- 2019‑02‑10:
Five things that scare me about AI.
- 2019‑02‑10:
DasKeyboard lights show blood sugar changes using my body's REST API.
- 2019‑02‑10:
What PostgreSQL developers know about fsync() errors.
- 2019‑02‑10:
Oh god, it's raining newsletters.
- 2019‑02‑10:
Checking firewall equivalence with Z3.
- 2019‑02‑09:
Building a RISC-V PC.
- 2019‑02‑09:
A new Python kernel for Jupyter.
- 2019‑02‑08:
Reflecting on a failure to build a billion-dollar company.
- 2019‑02‑08:
Move fast and migrate things: how Benchling automated migrations in Postgres.
- 2019‑02‑08:
Downgrade attack on TLS 1.3 and vulnerabilities in major TLS libraries.
- 2019‑02‑08:
Faster remainders when the divisor is a constant: beating compilers and libdivide.
- 2019‑02‑08:
HTML, CSS and our vanishing industry entry points
- 2019‑02‑07:
The big DNS privacy debate at FOSDEM.
- 2019‑02‑07:
FOSDEM 2019: a new view from the NOC.
- 2019‑02‑07:
What happened to the 100,000-hour LED bulbs?
- 2019‑02‑06:
The Earth and the far side of the moon photographed by radio amateurs.
- 2019‑02‑06:
A simple explanation for the existence of adversarial examples with small Hamming distance.
- 2019‑02‑06:
Previous: a NeXT emulator.
- 2019‑02‑06:
Vulnerability postmortem: A curious case of convexity confusion in Skia.
- 2019‑02‑05:
There and Snack Again: How to eat everything in the Lord of the Rings.
- 2019‑02‑05:
Analysis: Why the UK's CO2 emissions have fallen 38% since 1990.
- 2019‑02‑04:
A 6502 assembly language monad in Haskell.
- 2019‑02‑04:
Ten rules for a better conference name badge.
- 2019‑02‑04:
Debugging Emacs or: how I learned to stop worrying and love DTrace.
- 2019‑02‑04:
Asterius: A Haskell to WebAssembly compiler.
- 2019‑02‑03:
A brief history of the UUID.
- 2019‑02‑03:
Using BGP to calculate fastest paths around the London Underground.
- 2019‑02‑03:
All late projects are the same.
- 2019‑02‑03:
The death of transit and the future Internet.
- 2019‑02‑03:
RustPython: A Python Interpreter written in Rust.
- 2019‑02‑03:
Machine learning leads mathematicians to undecidable problem.
- 2019‑02‑03:
The Soviet license plate game and Kolmogorov complexity.
- 2019‑02‑02:
Bats and dolphins evolved echolocation in the same way.
- 2019‑02‑02:
The cloud skills shortage and the unemployed army of the certified.
- 2019‑02‑01:
How many .com domain names are unused?
- 2019‑01‑30:
The day I fell in love with fuzzing.
- 2019‑01‑30:
Lock-free Rust: Crossbeam in 2019.
- 2019‑01‑30:
The 26,000-year astronomical monument at the Hoover dam.
- 2019‑01‑30:
Lessons learned scaling PostgreSQL database to 1.2bn records/ month.
- 2019‑01‑29:
How a teenage 'Fortnite' player found Apple's FaceTime bug. It was so hard to report!
- 2019‑01‑28:
JVM issue: concurrency is affected by changing the system time!
- 2019‑01‑28:
The story of Squeak/Pharo, a practical Smalltalk written in itself.
- 2019‑01‑28:
Abusing 2FA to maintain persistence after a password change.
- 2019‑01‑28:
World's oldest periodic table chart found in St Andrews.
- 2019‑01‑28:
Smoothsort demystified.
- 2019‑01‑28:
A SQL to C compiler in 500 lines of code.
- 2019‑01‑28:
Outperforming LAPACK with Python and LLVM.
- 2019‑01‑27:
tinykaboom: how to ray-trace an explosion.
- 2019‑01‑27:
The legacy of Firefox OS.
- 2019‑01‑27:
PostgreSQL backend flowchart.
- 2019‑01‑27:
Why is it so hard to detect a key up event on Linux?
- 2019‑01‑26:
MDT9100 Motorola mobile data terminal.
- 2019‑01‑26:
Special cases are a code smell.
- 2019‑01‑26:
JMAP: it's like IMAP but not really.
- 2019‑01‑26:
Why do Americans claim to be more religious than they are?
- 2019‑01‑26:
It's time to move on from two phase commit.
- 2019‑01‑26:
websocketd: WebSockets the Unix way.
- 2019‑01‑26:
websocat: a command-line client for WebSockets.
- 2019‑01‑25:
Women on the pill don't need a period.
- 2019‑01‑25:
Oxford scientists successfully recreated a famous rogue wave in the lab.
- 2019‑01‑25:
How much maintenance_work_mem does PostgreSQL need?
- 2019‑01‑24:
How to make the Chord DHT correct.
- 2019‑01‑24:
Why don't people use formal methods?
- 2019‑01‑24:
'The goal is to automate us': welcome to the age of surveillance capitalism.
- 2019‑01‑24:
How LiveJournal pioneered then lost blogging.
- 2019‑01‑23:
pg_permission: Inspecting your PostgreSQL access controls.
- 2019‑01‑23:
Ghostscript vulnerability: subroutines within pseudo-operators must themselves be pseudo-operators.
- 2019‑01‑23:
proc-macro-rules: macro-rules pattern matching inside Rust procedural macros.
- 2019‑01‑23:
A lifetime of systems thinking.
- 2019‑01‑22:
Remote code execution vulnerability in Debian `apt`.
- 2019‑01‑22:
Accounting machines, the IBM 1403, and why printers standardized on 132 columns.
- 2019‑01‑22:
HTML5 input types: where are they now?
- 2019‑01‑22:
Build better forms by not taking away affordances.
- 2019‑01‑22:
UTC time scales and leap second support in the Koka programming language.
- 2019‑01‑21:
Advanced Mac Substitute: a 68k Mac emulator.
- 2019‑01‑20:
Kubernetes failure stories.
- 2019‑01‑20:
An obituary of Karen Sparck Jones, who pioneered natural language processing.
- 2019‑01‑20:
The archetype of the haunted house: Winchester Mystery House.
- 2019‑01‑20:
A history of Algol 68-R.
- 2019‑01‑20:
MySQL client allows MySQL server to request any local file.
- 2019‑01‑19:
AWS EC2 instance price guide.
- 2019‑01‑18:
Introduction to TLA+ model checking on the command line.
- 2019‑01‑18:
Is C++ fast?
- 2019‑01‑18:
History of IEEE P1003.1 POSIX time.
- 2019‑01‑18:
The malign incompetence of the British ruling class.
- 2019‑01‑18:
How SMS set back the mobile internet by ten years.
- 2019‑01‑18:
Why is storage on Kubernetes so hard?
- 2019‑01‑18:
The route of a text message.
- 2019‑01‑17:
CSRG Archive, now on DVD with extra non-BSD software.
- 2019‑01‑17:
The heterosexual tragedy of Top Gun.
- 2019‑01‑17:
The need for sustainable open source projects, like FRR.
- 2019‑01‑17:
Isle Of Man is the first place in the British Isles to decriminalise abortion.
- 2019‑01‑17:
Amazon Aurora: avoiding distributed consensus for IO, commits, and membership changes.
- 2019‑01‑17:
More than you really wanted to know about patch.
- 2019‑01‑17:
Crisis on the High Plains: the loss of America's largest aquifer, the Ogallala.
- 2019‑01‑17:
A Pratt parser in TypeScript.
- 2019‑01‑17:
A cascading failure of distributed systems in a large Kubernetes cluster.
- 2019‑01‑16:
Battle of the axe men: who really built the first electric rock 'n' roll guitar?
- 2019‑01‑16:
Field notes from an American in London.
- 2019‑01‑16:
Gettier cases: the relevance to programming of a three-page paper that shook philosophy.
- 2019‑01‑15:
A workflow for maintaining feature branches and submitting patches to PostgreSQL.
- 2019‑01‑15:
Stepping away from Sass.
- 2019‑01‑14:
The mysterious, stubborn appeal of mass-produced fried chicken.
- 2019‑01‑14:
Porting 30K lines of code from Flow to TypeScript.
- 2019‑01‑14:
The rise and demise of RSS.
- 2019‑01‑14:
Getting an IBM AS/400 midrange computer on the Internet.
- 2019‑01‑14:
Designing resilient systems with retries.
- 2019‑01‑14:
Courier and Dropbox's migration to gRPC.
- 2019‑01‑13:
Sail ISA model of ARM-v8.5-a can boot Linux.
- 2019‑01‑12:
The second GPS week number rollover is coming in April.
- 2019‑01‑12:
Crochet relays.
- 2019‑01‑12:
The Embroidered Computer.
- 2019‑01‑12:
Spurious correlations.
- 2019‑01‑12:
The holes in the map: England's unregistered land.
- 2019‑01‑11:
The early history of F#.
- 2019‑01‑11:
Factoring polynomials is not a shortcut to breaking RSA.
- 2019‑01‑11:
Earth's magnetic field is acting up and geologists don't know why.
- 2019‑01‑11:
How you can organize your GitHub repositories.
- 2019‑01‑11:
Tony Hoare's proposal for record handling in ALGOL. (1965)
- 2019‑01‑11:
Deriving traits in Rust with procedural macros.
- 2019‑01‑11:
Find the hard work you are willing to do.
- 2019‑01‑10:
The painful price of becoming Jackie Chan.
- 2019‑01‑10:
AWS gives open source the middle finger.
- 2019‑01‑10:
Why people in cities walk fast.
- 2019‑01‑10:
The disappearing Windows DNS debug log.
- 2019‑01‑09:
Looking back at the Berkeley Postgres project.
- 2019‑01‑09:
An analysis of lapis lazuli in medieval dental plaque illuminates the forgotten history of female scribes.
- 2019‑01‑09:
How cartographers for the U.S. military inadvertently screwed up international geoIP locations.
- 2019‑01‑09:
Using TypeScript transforms to enrich runtime code.
- 2019‑01‑09:
Think Sci-Hub is just downloading PDFs? Think again.
- 2019‑01‑09:
Notes on test-case reduction.
- 2019‑01‑08:
DHCP is hard: a story in five bugs.
- 2019‑01‑08:
The FRRouting protocol suite: a descendent of Zebra and Quagga.
- 2019‑01‑08:
The dangers of PostgreSQL streaming across versions of glibc with different collation orders.
- 2019‑01‑08:
OneDev: git hosting and code review in Java.
- 2019‑01‑08:
Emulating a buffer overflow for fun and profit in StarCraft: Remastered.
- 2019‑01‑07:
How to make sure your talk doesn't suck.
- 2019‑01‑07:
libeatmydata: disable fsync and speed up your tests!
- 2019‑01‑07:
SQL is no excuse to avoid DevOps.
- 2019‑01‑07:
Huawei unveils the highest-performance ARM-based CPU.
- 2019‑01‑07:
Why SRE documents matter.
- 2019‑01‑07:
Atomic clocks: it is important that they keep good time. (part 2)
- 2019‑01‑07:
Atomic clocks: it is important that they keep good time. (part 1)
- 2019‑01‑07:
Why isn't bamboo wood more popular?
- 2019‑01‑07:
The state of software security in 2019
- 2019‑01‑07:
A history of soap.
- 2019‑01‑07:
ARM Memory Tagging: how it improves C/C++ memory safety.
- 2019‑01‑06:
Hints and principles for computer system design.
- 2019‑01‑06:
Hints for computer system design.
- 2019‑01‑06:
The verified CakeML compiler backend.
- 2019‑01‑06:
The evolutionary mystery of left-handedness.
- 2019‑01‑06:
Mapping and visualization by Scott Reinhard.
- 2019‑01‑05:
Why is Maxwell's theory so hard to understand?
- 2019‑01‑05:
Towards a better Pythagorean cup.
- 2019‑01‑05:
LEGO Porsche crashing in slow motion at 1000 fps . (YouTube)
- 2019‑01‑04:
We'll never know whether monorepos are better.
- 2019‑01‑03:
Some common CSS problems.
- 2019‑01‑03:
Monorepos: Please don't!
- 2019‑01‑03:
How 'magic angle' graphene is stirring up physics.
- 2019‑01‑03:
Programmer as wizard, programmer as engineer.
- 2019‑01‑03:
Chip design at Apple in the 1980s.
- 2019‑01‑03:
Exploiting the Math.expm1 typing bug in V8.
- 2019‑01‑03:
caro: if jq and xargs had a baby.
- 2019‑01‑02:
POLA would have prevented the npm event-stream incident.
- 2019‑01‑02:
STAMPing on the npm event-stream compromise.
- 2019‑01‑02:
How 'Spider-Man: Into the Spider-Verse' was animated.
- 2019‑01‑02:
Fixing the nargs() subroutine on a PDP-11 with split I/D address space.
- 2019‑01‑02:
Be Moore Like Chuck.
- 2019‑01‑01:
Travels with Smalltalk.
- 2019‑01‑01:
The 4th annual Tucker awards for excellence in swearing.
- 2019‑01‑01:
Let's Encrypt looking forward to 2019.
- 2019‑01‑01:
The Vimes boots theory: further reflections.
- 2018‑12‑31:
Fuzzing like it's 1989.
- 2018‑12‑31:
The elements of UI engineering.
- 2018‑12‑31:
For 30 years I've been obsessed by why children get leukaemia. Now we have an answer.
- 2018‑12‑31:
How not to canonicalize IPv6 addresses.
- 2018‑12‑31:
μKanren: a minimal functional core for relational / logic programming.
- 2018‑12‑31:
Adaptation decay has sucked the meaning out of "A Christmas Carol".
- 2018‑12‑30:
Umlauts of Berlin, part 3: Ö.
- 2018‑12‑30:
Little's Law: for estimation only.
- 2018‑12‑30:
Why Microsoft Windows network performance is bad during media playback.
- 2018‑12‑30:
Why Microsoft Windows filesystem access is much slower than Unix.
- 2018‑12‑29:
Why are printed circuit boards usually green?
- 2018‑12‑29:
A nice, little known C feature: static array sizes in parameter declarations.
- 2018‑12‑29:
The story of the Grateful Dead's Wall of Sound.
- 2018‑12‑29:
In January, the EU starts running bug bounties on free and open source software.
- 2018‑12‑29:
How Facebook keeps messenger from crashing on New Year's eve.
- 2018‑12‑28:
A history of flavoring food with beaver butt juice.
- 2018‑12‑28:
22 ssh examples, practical tips, and tunnels.
- 2018‑12‑28:
"Modern" C++ lamentations.
- 2018‑12‑28:
Easy Postgres extensions in Rust with pg-extend-rs.
- 2018‑12‑28:
Circular dependencies for provisioning systems.
- 2018‑12‑28:
Securing the hardware supply chain.
- 2018‑12‑27:
Patterns for Array initialization in Rust.
- 2018‑12‑27:
A demo of Rust async io: from mio to stackless coroutines.
- 2018‑12‑27:
Using C libraries in Rust: how to make a sys crate.
- 2018‑12‑27:
Rust Tokio end of year recap.
- 2018‑12‑27:
Procedural macros in Rust 2018.
- 2018‑12‑27:
Post-mortem of the Word for Windows 1.0 project.
- 2018‑12‑27:
Swedish startup Rdot is trying to take on E-Ink.
- 2018‑12‑27:
JMAP is on the home straight.
- 2018‑12‑27:
The wavefunction collapse algorithm explained very clearly.
- 2018‑12‑27:
Much more than you wanted to know about melatonin.
- 2018‑12‑27:
Understanding throttling and debouncing.
- 2018‑12‑27:
Ranges, code quality, coroutines, and the future of C++.
- 2018‑12‑26:
Unicode CLDR LDML date/time format patterns.
- 2018‑12‑26:
Experience deploying IETF QUIC at Facebook.
- 2018‑12‑26:
Rust 2019 and beyond: limits to (some) growth.
- 2018‑12‑26:
The language of Brussels, translated.
- 2018‑12‑26:
History of the Marshfield Mummers play.
- 2018‑12‑26:
The many ways to launch FreeBSD in AWS EC2.
- 2018‑12‑26:
White Hart Lane's movable football pitch in three pieces.
- 2018‑12‑26:
Twitter's upcoming changes to PNG image support.
- 2018‑12‑26:
2018 Matrix year in review.
- 2018‑12‑26:
ECMAScript modules in Node.js: the new plan.
- 2018‑12‑26:
A one-line Linux Dropbox client.
- 2018‑12‑25:
Designing web page layouts for screen readers.
- 2018‑12‑25:
Sloc Cloc and Code revisited: optimizing an already fast Golang program.
- 2018‑12‑25:
Exclave: hardware testing in mass production, made easier.
- 2018‑12‑25:
DOOMBA
- 2018‑12‑25:
Wiv.js: a library for a more wiggly div.
- 2018‑12‑24:
IPv6 xmas display uses 75 Internet's worth of addresses.
- 2018‑12‑24:
Theft of NTP service for the Internet of Unprofitable Things.
- 2018‑12‑24:
Lexically scopes type variables.
- 2018‑12‑24:
Partitioned consensus and its impact on Google Spanner's latency.
- 2018‑12‑24:
HyperLogLog in Facebook Presto: faster cardinality estimation.
- 2018‑12‑24:
Solving a murder with Prolog.
- 2018‑12‑24:
Site reliability engineering is operations.
- 2018‑12‑24:
Designing resilient systems with circuit breakers.
- 2018‑12‑24:
Dropbox Cape service mesh technical deep dive.
- 2018‑12‑24:
World's first no-kill eggs go on sale in Berlin.
- 2018‑12‑23:
Ten simple rules for documenting scientific software.
- 2018‑12‑23:
Standard ranges for C++.
- 2018‑12‑23:
The bleak picture of two-factor authentication adoption in the wild.
- 2018‑12‑23:
Finding a sparse file bug in GNU tar.
- 2018‑12‑23:
The cyclical theory of Open Source, and new anti-cloud hybrid commercial licenses.
- 2018‑12‑22:
The MGR window system.
- 2018‑12‑22:
Offshore wind: bigger is better.
- 2018‑12‑22:
gQUIC crypto and simple state machines.
- 2018‑12‑22:
A new spline.
- 2018‑12‑21:
DNS over TLS from Cloudflare's recursive servers to Facebook's authoritative servers.
- 2018‑12‑21:
Dear developer, the Web isn't about you.
- 2018‑12‑21:
When anti-virus software causes 15 minute GC pauses and crashes in a .NET Windows service.
- 2018‑12‑21:
MySQL: do not pass this way again.
- 2018‑12‑21:
Max Planck Society discontinues agreement with Elsevier; stands firm with Projekt DEAL negotiations.
- 2018‑12‑21:
Five facts about smell.
- 2018‑12‑21:
Manage virtual machines with virt-manager.
- 2018‑12‑21:
WireGuard setup guide for iOS.
- 2018‑12‑21:
WireGuard for iOS, now in the App Store.
- 2018‑12‑20:
sr.ht, the hacker's forge, now open for public alpha.
- 2018‑12‑20:
The state we're in: visualizing the health of an organization's IT estate.
- 2018‑12‑20:
Why "just Google it" is now a synonym for "indoctrinate someone".
- 2018‑12‑20:
The Guardian says, bye bye Mongo, Hello PostgreSQL.
- 2018‑12‑19:
Did Google cripple Microsoft Edge's YouTube performance?
- 2018‑12‑19:
GPS week rollover in 2019: what you need to know.
- 2018‑12‑19:
Status of async in Rust at the end of 2018.
- 2018‑12‑19:
Storing unboxed trait objects in Rust.
- 2018‑12‑19:
Making Rust float parsing fast and correct.
- 2018‑12‑19:
Evaluating high availability solutions for TimescaleDB and PostgreSQL.
- 2018‑12‑19:
Hello, JIT World: the joy of simple JITs with dynasm.
- 2018‑12‑19:
Stop trying to be so DRY, instead Write Everything Twice (WET).
- 2018‑12‑18:
WaveFunctionCollapse: bitmap generation from one example using ideas from quantum mechanics.
- 2018‑12‑18:
How to build a real-time app with GraphQL subscriptions on PostgreSQL.
- 2018‑12‑17:
Future fossils of the 21st Century.
- 2018‑12‑17:
Support Driven Engineering (SDE).
- 2018‑12‑17:
The best programming advice I ever got.
- 2018‑12‑17:
5 German exclaves in Belgium separated by a bicycle path from the rest of Germany.
- 2018‑12‑17:
Can repelling magnets replace the spring in a pogo stick?
- 2018‑12‑16:
On rewriting code: No haunted forests.
- 2018‑12‑16:
A collection of Pratt parsing articles.
- 2018‑12‑16:
A brief history of just-in-time compilation.
- 2018‑12‑16:
Firefox 64 built with GCC and Clang.
- 2018‑12‑16:
Algol 68: a retrospective.
- 2018‑12‑15:
Does Scrabble need to be fixed? An experiment in controlling how much of the game is luck.
- 2018‑12‑15:
Defense against dark arts: safely allowing full SQL access to untrusted users with SQLite.
- 2018‑12‑15:
A remote code execution vulnerability in SQLite.
- 2018‑12‑15:
Paxos made live: an engineering perspective from Google Chubby.
- 2018‑12‑15:
Exploiting font parsing in LaTeX with CVE-2018-17407.
- 2018‑12‑15:
Bootstrapping Rust.
- 2018‑12‑15:
Modelling the true cost of software rewrites.
- 2018‑12‑14:
An investigation of misunderstanding code patterns in C open-source software projects.
- 2018‑12‑14:
Soup-salad-sandwich space.
- 2018‑12‑13:
A history of the waterfall methodology.
- 2018‑12‑13:
50 CVEs in 50 days fuzzing Adobe Reader.
- 2018‑12‑13:
The Titanic was on fire for days before the iceberg hit.
- 2018‑12‑13:
Git your SQL together with a query library.
- 2018‑12‑13:
Obituary of Evelyn Berezin, creator of the first true word processor.
- 2018‑12‑13:
Securing your web site like it's 1999.
- 2018‑12‑13:
AFLSmart: smart greybox fuzzing.
- 2018‑12‑13:
Guaranteed copy elision in C++17 does not elide copies.
- 2018‑12‑12:
Clusters of re-used keys.
- 2018‑12‑12:
Routing security roadmap.
- 2018‑12‑12:
Running FreeBSD on OSX using xhyve.
- 2018‑12‑12:
Existential types in Rust.
- 2018‑12‑12:
Hashbrown: Rust's Swiss army knife of hash tables.
- 2018‑12‑12:
Patterns of refactoring C to Rust: the case of librsvg.
- 2018‑12‑12:
GHC: from bug to merge.
- 2018‑12‑12:
A guide to modern router architecture for network protocol designers.
- 2018‑12‑12:
Inside Rust's async transform.
- 2018‑12‑12:
Beware Java Attach API.
- 2018‑12‑12:
ATDT relief.
- 2018‑12‑12:
GraphIt: A high-performance graph DSL.
- 2018‑12‑12:
How PowerDNS deals with security vulnerabilities.
- 2018‑12‑11:
The cube rule of food.
- 2018‑12‑11:
A tale of 132 e's on GitHub.
- 2018‑12‑11:
A Unicode BMP codepoint chart.
- 2018‑12‑11:
20 years of open source Erlang.
- 2018‑12‑11:
Troubleshooting obscure OpenSSH failures due to a broken firewall.
- 2018‑12‑11:
Can we drop upstream Linux x32 support?
- 2018‑12‑11:
Human terrain: visualizing the world's population in 3D.
- 2018‑12‑11:
Bezier moi, Julia.
- 2018‑12‑11:
Seemingly impossible Swift programs.
- 2018‑12‑11:
The Empress of Facebook: a befuddling dinner With Sheryl Sandberg.
- 2018‑12‑11:
The seductive diversion of 'solving' bias in artificial intelligence.
- 2018‑12‑10:
Who ever said no two snowflakes are alike?
- 2018‑12‑10:
jl: turn structured JSON logs into human-readable lines.
- 2018‑12‑10:
Graphing the distribution of English letters towards the beginning, middle or end of words.
- 2018‑12‑10:
Rolling out EC2 Nitro instance types revealed AWS's 1024qps DNS query rate limit.
- 2018‑12‑10:
Atomic clocks on a pair of eccentric Galileo satellites provided the first refinement of gravitational redshift since 1976.
- 2018‑12‑10:
Pave the cowpaths.
- 2018‑12‑10:
Spooky tales of testing in production.
- 2018‑12‑10:
Billionaires are the leading cause of climate change.
- 2018‑12‑10:
Autism from the inside is not the neurotypical cliché.
- 2018‑12‑09:
The computer technology that changed air travel.
- 2018‑12‑09:
Replacing the user story with the job story.
- 2018‑12‑09:
JIRA is an antipattern.
- 2018‑12‑09:
When the allocator works against you: memory fragmentation in Python on glibc.
- 2018‑12‑09:
Fixing a tough memory leak involving C extensions in Python.
- 2018‑12‑09:
The Programming Languages Zoo: miniature languages demonstrating concepts and techniques in design and implementation.
- 2018‑12‑09:
Little languages for elucidating programming language design.
- 2018‑12‑09:
Secrets of smooth Béziers and Euler spirals revealed.
- 2018‑12‑09:
No, negative masses have not revolutionized cosmology.
- 2018‑12‑09:
The curious tale of ICANN, Verisign, claims of subterfuge, and the $135m .web TLD.
- 2018‑12‑09:
The CRISPR baby scandal gets worse by the day.
- 2018‑12‑09:
Deep-comparing two 5GB JSON files 3x faster with jq.
- 2018‑12‑09:
MIT team develops 3D printer that's 10x faster than comparable 3D printers.
- 2018‑12‑09:
AMD EPYC 7371 aggressive pricing.
- 2018‑12‑09:
Four days trapped at sea with crypto's nouveau riche.
- 2018‑12‑08:
Troubleshooting a connection timeout issue due to tcp_tw_recycle (which should not be used).
- 2018‑12‑08:
Uncomfortable privacy research.
- 2018‑12‑08:
How to recognize fake AI-generated images.
- 2018‑12‑08:
Eels stuck in Hawaiian monk seals' noses baffle scientists.
- 2018‑12‑08:
Early mammals were thought to be small and unseen in the age of dinosaurs. An elephant-sized fossil complicates that story.
- 2018‑12‑08:
Why ratings and feedback forms don't work.
- 2018‑12‑07:
You need neither PWA nor AMP to make your website load fast.
- 2018‑12‑07:
Understanding the type of call/cc.
- 2018‑12‑07:
IPv6 in the UK 6 years after World IPv6 day.
- 2018‑12‑07:
How to game Apple's iOS App Store.
- 2018‑12‑07:
HTTPS in the real world.
- 2018‑12‑07:
WALL᛫E | Typeset In The Future
- 2018‑12‑07:
Reverse engineering the ARM1 processor's microinstructions.
- 2018‑12‑07:
Tesla's giant battery saved $40 million during its first year, and cost $66 million to install.
- 2018‑12‑07:
Rust 2018 is here... but what is it?
- 2018‑12‑07:
Killing Microsoft Edge: Making the web worse through capitulation to Google.
- 2018‑12‑07:
Goodbye, EdgeHTML.
- 2018‑12‑06:
The rise of Microsoft Visual Studio Code.
- 2018‑12‑06:
Managing high availability in PostgreSQL with Pacemaker + Corosync + PAF.
- 2018‑12‑06:
GNU Mes 0.17: towards bootstrappable builds for GuixSD.
- 2018‑12‑06:
Bootstrappable builds.
- 2018‑12‑06:
Postgres 12 highlight: DOS prevention.
- 2018‑12‑06:
It's DNS Jim, but not as we know it!
- 2018‑12‑06:
A well-known URL for changing passwords.
- 2018‑12‑06:
A standard web site password change API.
- 2018‑12‑06:
Eight #aabill predictions: consequences of Australia's new spying law.
- 2018‑12‑06:
Anatomy of an AI system.
- 2018‑12‑06:
QUIC and HTTP/3 : Too big to fail?!
- 2018‑12‑06:
Bizarre 'dark fluid' with negative mass could dominate the universe.
- 2018‑12‑06:
Privilege escalation vulnerability in the Kubernetes apiserver.
- 2018‑12‑05:
Why parking minimums almost destroyed my hometown and how we repealed them.
- 2018‑12‑05:
Unprivileged users with UID > INT_MAX can successfully execute any systemctl command.
- 2018‑12‑05:
How to write a modern C++ library in Rust.
- 2018‑12‑05:
Learning how AI makes decisions.
- 2018‑12‑05:
Our bipolar free-speech disorder and how to fix it.
- 2018‑12‑05:
BT to remove Huawei from 4G infrastructure over security concerns.
- 2018‑12‑05:
Constructive softwre engineering?
- 2018‑12‑05:
The friendship that made Google huge.
- 2018‑12‑05:
What is Windows Lite? It's Microsoft's Chrome OS killer.
- 2018‑12‑05:
Samsung used a DSLR photo to fake their phone's "portrait mode".
- 2018‑12‑05:
The modality of mortality in domain names: an in-depth study of domain lifetimes.
- 2018‑12‑05:
DOHA and ZIPPO make forty five dead gTLDs.
- 2018‑12‑05:
ICANN registry agreement termination information page: graveyard of new gTLDs.
- 2018‑12‑04:
A look at CSS resets in 2018.
- 2018‑12‑04:
Single-direction margin declarations in CSS.
- 2018‑12‑04:
PayPal, Square, and big banking's war on the sex industry.
- 2018‑12‑04:
The case for reopening Edinburgh's lost circle line to passengers.
- 2018‑12‑04:
Microsoft is replacing Edge in Windows 10 with a browser based on Google Chromium.
- 2018‑12‑04:
A not-called function can cause a 5x slowdown.
- 2018‑12‑04:
Yak shaving and fixing.
- 2018‑12‑04:
How Facebook is fueling French populist rage.
- 2018‑12‑04:
EverSet ES100 dev kit for receiving WWVB 60kHz new BPSK modulation.
- 2018‑12‑04:
RSS to ActivityPub converter.
- 2018‑12‑03:
Specter: Clojure's missing piece.
- 2018‑12‑03:
Tadashi Tokieda collects maths and physics surprises.
- 2018‑12‑03:
Tumblr will ban all adult content starting December 17th.
- 2018‑12‑03:
Developers on call.
- 2018‑12‑03:
Software sprawl, the golden path, and scaling teams with agency.
- 2018‑12‑03:
Truths programmers should know about character case.
- 2018‑12‑03:
Wiki Creole 1.0 lightweight markup language.
- 2018‑12‑02:
AWS is competing with its customers.
- 2018‑12‑02:
Making the best of MacBook Air touchpad on Ubuntu.
- 2018‑12‑02:
Describe Chinese characters with the Recursive Radical Packing Language (RRPL).
- 2018‑12‑02:
Portal for the Commodore 64.
- 2018‑12‑02:
Linux Bcachefs status update.
- 2018‑12‑01:
Bed a champion! A training course on urban design.
- 2018‑12‑01:
Decentralizing social interactions with ActivityPub.
- 2018‑12‑01:
Psychology's replication crisis is real, says the Many Labs 2 project.
- 2018‑12‑01:
The world's most efficient languages.
- 2018‑12‑01:
SSH performance.
- 2018‑12‑01:
Falsehoods programmers believe about names, with examples.
- 2018‑12‑01:
The 9 lives of Bleichenbacher's CAT: new Cache ATtacks on TLS implementations.
- 2018‑11‑30:
Google tried to patent someone else's work after a job interview.
- 2018‑11‑30:
A crowdfunding customer patented the project they backed.
- 2018‑11‑30:
UTF-7: a ghost from the time before UTF-8.
- 2018‑11‑30:
Dynamic configuration at Twitter.
- 2018‑11‑30:
Golang 2, here we come!
- 2018‑11‑29:
Competition is dying, and taking capitalism with it.
- 2018‑11‑29:
Strange earthquake waves rippled around Earth, and nobody knows why.
- 2018‑11‑29:
Multi-level MDA-Lite Paris Traceroute.
- 2018‑11‑29:
The baseline costs of JavaScript frameworks.
- 2018‑11‑29:
Amazon's homegrown Graviton processor was very nearly an AMD Arm CPU.
- 2018‑11‑29:
The Holy Hand Grenade of Antioch: OpenSSL version numbering and licence change.
- 2018‑11‑29:
Secrets of the magus: a profile of Ricky Jay. (1993)
- 2018‑11‑28:
How GitLab spent two weeks hunting an NFS bug in the Linux kernel.
- 2018‑11‑28:
What's in a Docker image? How to find out.
- 2018‑11‑28:
A perfect storm that brought down LinkedIn.com.
- 2018‑11‑28:
The datacenter as a computer: how Google designs warehouse-scale machines.
- 2018‑11‑28:
A history of Unix man pages.
- 2018‑11‑28:
Why do computers use so much energy?
- 2018‑11‑28:
OpenBGPD: adding diversity to the route server landscape.
- 2018‑11‑27:
What's the time? Measuring computer clocks on the Internet.
- 2018‑11‑27:
How programmable calculators and an sf story brought Soviet teens into the digital age.
- 2018‑11‑27:
Cryptocurrency collapse.
- 2018‑11‑27:
Why women in psychology can't program.
- 2018‑11‑27:
Beating hash tables with trees? The ART-ful radix trie.
- 2018‑11‑27:
Preventing SQL injection with PostgreSQL and Python.
- 2018‑11‑27:
The state of WiFi vs mobile network experience.
- 2018‑11‑27:
Amsterdam vs Copenhagen (a British view).
- 2018‑11‑27:
Is Copenhagen a city of cyclists? (A Dutch view.)
- 2018‑11‑27:
AWS designed ARM processor: Graviton.
- 2018‑11‑27:
Designing headers for HTTP compression (HPACK and QPACK).
- 2018‑11‑26:
Today's JavaScript trash fire and pile on: the flatmap-stream compromise.
- 2018‑11‑26:
The "feel-good" horror of late-stage capitalism.
- 2018‑11‑26:
The power of Web Components.
- 2018‑11‑26:
No cutting corners cutting corners.
- 2018‑11‑26:
Integer overflow and SMT-solvers.
- 2018‑11‑26:
Cuckoo breeding ground: a better cuckoo hash table.
- 2018‑11‑25:
How I changed the law with a GitHub pull request.
- 2018‑11‑25:
Motorists punish helmet-wearing cyclists with close passes, confirms data recrunch.
- 2018‑11‑25:
WebAssembly doesn't make unsafe languages safe (yet).
- 2018‑11‑25:
5919 default passwords from Open Sez Me!
- 2018‑11‑25:
Why most of America is terrible at making biscuits.
- 2018‑11‑25:
LinkedIn violated data protection by using 18M email addresses of non-members to buy targeted ads on Facebook.
- 2018‑11‑25:
The Lisp Machines Inc. K-Machine.
- 2018‑11‑24:
Type-safe builders in Kotlin.
- 2018‑11‑24:
NovaSolix hopes to make a 90% efficient solar cell using carbon nanotubes.
- 2018‑11‑24:
Model View Controller isn't.
- 2018‑11‑24:
Tworoutines in Python: easy mixing of synchronous and asynchronous code.
- 2018‑11‑24:
U.S. finally legalizes modern, European-style train cars.
- 2018‑11‑24:
The code hiding on these Madrid security bollards.
- 2018‑11‑24:
How a mysterious tech billionaire created two fortunes and a global software sweatshop.
- 2018‑11‑24:
Enumerating the rationals (without duplication).
- 2018‑11‑24:
Riding the Space Shuttle's solid rocket booster.
- 2018‑11‑24:
Amazing time-lapse video of a rocket launch... seen from space!
- 2018‑11‑24:
'12 Monkeys': why Terry Gilliam's movie is so relevant today.
- 2018‑11‑24:
JavaScript modules.
- 2018‑11‑23:
6 strange facts about the interstellar visitor 'Oumuamua.
- 2018‑11‑23:
Nuisance calls: new UK law provides for company director liability.
- 2018‑11‑23:
Are pop lyrics getting more repetitive?
- 2018‑11‑23:
Twelve steps to enable IPv6 in government and enterprise networks.
- 2018‑11‑23:
Killed by Google: the Google graveyard.
- 2018‑11‑22:
Working on the engines while the plane is flying: eBay's router replacement project.
- 2018‑11‑21:
dav1d AV1 decoder: performance and completion of the first release.
- 2018‑11‑21:
Django core no more.
- 2018‑11‑21:
Undumping TeX.
- 2018‑11‑21:
D compilation is too slow and I am forking the compiler.
- 2018‑11‑21:
Falcon Heavy 1/48 scale model, flight 1. (YouTube)
- 2018‑11‑21:
IBM's future system of the past.
- 2018‑11‑21:
Herding the DNS camel.
- 2018‑11‑21:
PhotoFunia Retro Wave neon 1980s image macro generator.
- 2018‑11‑21:
Compile-time feature flags in Rust.
- 2018‑11‑21:
The brown one, the honey eater, the shaggy coat, the destroyer: names for bears.
- 2018‑11‑21:
Why we should let the Pantheon crack.
- 2018‑11‑21:
Do you even bake, bro? How the Silicon Valley set fell in love with sourdough.
- 2018‑11‑21:
IBM's 1970s future system (FS) project.
- 2018‑11‑21:
A 3270 font in a modern format.
- 2018‑11‑21:
The IBM z14 microprocessor and system control design.
- 2018‑11‑21:
How a small French privacy ruling could remake adtech for good.
- 2018‑11‑20:
4-year-old fixes a documentation bug in Linux.
- 2018‑11‑20:
Techno-Sublime: a review of Benoit Mandelbrot's autobiography.
- 2018‑11‑20:
Taking out the garbage: GC for GJS, the Gnome Shell SpiderMonkey JavaScript hooks.
- 2018‑11‑20:
Surveillance marketing: Too much personalization can hurt your brand.
- 2018‑11‑20:
Drop-down usability: when you should (and shouldn't) use them.
- 2018‑11‑19:
Italy's olive crisis intensifies as deadly tree disease spreads.
- 2018‑11‑19:
Post-REST.
- 2018‑11‑19:
Time is Partial: why do distributed consistency models and weak memory models look so similar?
- 2018‑11‑19:
The case against quantum computing.
- 2018‑11‑19:
Facebook, Google, Amazon, railroads, and the collapse of the tech mythology.
- 2018‑11‑19:
The secret of cube-shaped wombat faeces.
- 2018‑11‑19:
Analyzing the GitHub outage.
- 2018‑11‑19:
That time a provider screwed CircleCI: remembering a security breach five years ago.
- 2018‑11‑18:
Windows 10 vs. Linux performance on AMD Threadripper 2990WX.
- 2018‑11‑18:
typed-html: Type checked JSX for Rust.
- 2018‑11‑18:
The invention of the AeroPress.
- 2018‑11‑18:
Unscii: a bitmapped Unicode font for blocky graphics.
- 2018‑11‑17:
Hurts so good: spicy foods and the compelling chemistry of chemesthesis.
- 2018‑11‑17:
Resinferatoxin is so spicy hot it destroys nerve endings - in a good way.
- 2018‑11‑17:
File mtime comparison considered harmful.
- 2018‑11‑17:
As the toffs began to retreat: the decline and fall of Great Britain.
- 2018‑11‑17:
Rare microbes lead scientists to discover new branch on the tree of life.
- 2018‑11‑17:
Why sleep apnea patients rely on a CPAP machine hacker.
- 2018‑11‑16:
International System of Units overhauled in historic vote at CGPM.
- 2018‑11‑16:
He found the best burger place in America. And then he killed it.
- 2018‑11‑16:
Tips on migrating SQL from Oracle to PostgreSQL.
- 2018‑11‑16:
Bit fields in the Zig programming language.
- 2018‑11‑16:
Fast line-following robots.
- 2018‑11‑15:
Statistical rule of three: how to estimate the chances of something that hasn't happened yet.
- 2018‑11‑15:
The "C" in CSS: a tutorial about the cascade.
- 2018‑11‑15:
How Operation Libero tackled toxic right-wing politics in Switzerland.
- 2018‑11‑15:
The Asus Eee: how close did we come to a Linux desktop?
- 2018‑11‑15:
Period-tracking apps are not for women.
- 2018‑11‑14:
Scaling millions of connections with zero-propagation dynamic DNS.
- 2018‑11‑14:
Zero-cost abstractions in Julia: indexing vectors by name with LabelledArrays.
- 2018‑11‑14:
Experiences with Unix on the Cray X/MP.
- 2018‑11‑13:
Medium is a poor choice for blogging.
- 2018‑11‑12:
The automation charade.
- 2018‑11‑12:
Hello, and welcome to libh2o.
- 2018‑11‑12:
C2x standard revision now in progress.
- 2018‑11‑12:
Distributed consistency at scale: Spanner vs. Calvin.
- 2018‑11‑12:
Hob3l: 100x faster slicing of SCAD files for 3D printing.
- 2018‑11‑12:
Refactoring towards language with Objective C.
- 2018‑11‑12:
The easiest way to debug node.js is with VSCode.
- 2018‑11‑12:
25th anniversary of NCSA Mosaic 1.0.
- 2018‑11‑11:
TLS: what can go wrong?
- 2018‑11‑11:
HTTP-over-QUIC will be HTTP/3.
- 2018‑11‑11:
Why Intel processors draw more power than expected: TDP and Turbo explained.
- 2018‑11‑11:
Some notes on running new software in production.
- 2018‑11‑11:
How bicycles have changed in the last 25 years.
- 2018‑11‑11:
Cross shard transactions at 10 million requests per second.
- 2018‑11‑11:
RocketLab's successful launch in New Zealand brings quick, cheap space access.
- 2018‑11‑11:
iSH: Linux emulator for iOS.
- 2018‑11‑11:
Should you use www or not in your web site host name?
- 2018‑11‑11:
Exploiting coroutines to reduce cache miss latency "killer nanoseconds".
- 2018‑11‑10:
The semiconductor industry and economic growth theory.
- 2018‑11‑10:
Before envelopes, people protected messages with letterlocking.
- 2018‑11‑09:
Against software development.
- 2018‑11‑09:
Deliveroo's data shows cyclists are faster in cities than cars and motorbikes.
- 2018‑11‑09:
Introducing Badger: A fast key-value store written purely in Golang.
- 2018‑11‑09:
A history of the sentence "buffalo buffalo buffalo buffalo buffalo".
- 2018‑11‑09:
Amazon's AbeBooks backs down after booksellers stage global protest.
- 2018‑11‑09:
GitHub reaches 100 million repositories.
- 2018‑11‑09:
Haskell type checker complaint 184 of 698.
- 2018‑11‑07:
Profiling: the case of the missing milliseconds.
- 2018‑11‑07:
Donut math: how donut.c works.
- 2018‑11‑07:
Migrating away from Google Maps and cutting costs by 99%.
- 2018‑11‑07:
On dealing with owning and borrowing in public interfaces in Rust.
- 2018‑11‑07:
Interprocedural borrow conflicts in Rust.
- 2018‑11‑07:
.brand TLD observatory.
- 2018‑11‑06:
SideTrail: verifying time-balancing countermeasures against side-channel attacks against cryptosystems.
- 2018‑11‑06:
AMD announces 64-core 7nm Rome CPUs, 7nm MI60 GPUs, and Zen 4.
- 2018‑11‑06:
How to speed up the Rust compiler in 2018: NLL edition.
- 2018‑11‑06:
The copyleft bust up.
- 2018‑11‑06:
British underground utility colour codes explained.
- 2018‑11‑06:
Colorful language: decoding utility markings spray-painted on city streets.
- 2018‑11‑06:
SF writer Greg Egan and anonymous 4chan poster advance permutation problem.
- 2018‑11‑06:
Performance of SMT solving on an iPhone.
- 2018‑11‑05:
Julia: dynamism and performance reconciled by design.
- 2018‑11‑05:
Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs).
- 2018‑11‑05:
Who called 1688 a "Glorious Revolution"?
- 2018‑11‑05:
Envoy proxy and gRPC-web: a fresh new alternative to REST.
- 2018‑11‑05:
Deadlines, lies and videotape: The tale of a gRPC bug.
- 2018‑11‑05:
Impact of daylight saving time on the clinical laboratory.
- 2018‑11‑05:
Epic fail: daylight saving time stumps hospital record keeping.
- 2018‑11‑05:
When Unix time was measured in 1/60 second ticks.
- 2018‑11‑05:
The origin of C's cast operator.
- 2018‑11‑05:
6502 programming language Implementation survey.
- 2018‑11‑05:
A Google Books OCR cliche: into his/her anus.
- 2018‑11‑04:
AI ethics, impossibility theorems, and tradeoffs.
- 2018‑11‑04:
How managers can decide which data science projects to pursue.
- 2018‑11‑04:
How to manage connections efficiently in Postgres.
- 2018‑11‑02:
ExploderBot: a slow-drip DDoS attack system.
- 2018‑11‑01:
Why pencils are yellow.
- 2018‑11‑01:
sdns: Golang recursive DNS server with DNSSEC support.
- 2018‑10‑31:
Apple XNU kernel RCE vulnerability due to buffer overflow in ICMP packet handling. (CVE-2018-4407)
- 2018‑10‑31:
The evolution of character codes, 1874-1968.
- 2018‑10‑31:
Analyzing the root DNSSEC key rollover.
- 2018‑10‑31:
The recent root DNSSEC key rollover: summary and next steps.
- 2018‑10‑31:
Introduction to Linux interfaces for virtual networking.
- 2018‑10‑30:
GitHub October 21 post-incident analysis.
- 2018‑10‑30:
Archaeologists find 300,000-year-old stone tools in Saudi Arabia.
- 2018‑10‑30:
Post-mortem: helium leak from MRI disables every iOS device in facility.
- 2018‑10‑30:
Ira Magaziner's view of ICANN's creation.
- 2018‑10‑29:
Chocolate has a origin 1500 years earlier than we thought.
- 2018‑10‑29:
Honeycomb.io postmortem: RDS clogs and cache-refresh crash loops.
- 2018‑10‑29:
Atlassian incident management handbook.
- 2018‑10‑29:
To err is human: mistakes and slips in skydiving and other disciplines.
- 2018‑10‑29:
The core practical problems with HiDPI on Linux.
- 2018‑10‑29:
HiDPI on dual 4K monitors with Linux.
- 2018‑10‑29:
Exploring C semantics and pointer provenance.
- 2018‑10‑29:
Ten platform commandments.
- 2018‑10‑29:
Status page updates: It's all about timing.
- 2018‑10‑28:
IBM nears deal to acquire Red Hat.
- 2018‑10‑28:
One Windows kernel.
- 2018‑10‑28:
Why logical clocks are easy.
- 2018‑10‑27:
Windows Defender Antivirus can now run in a sandbox.
- 2018‑10‑27:
Legal curiosities: fact or fable?
- 2018‑10‑27:
Systemd is bad parsing DHCPv6 packets and its programmers should feel bad.
- 2018‑10‑26:
Proposal: Golang 2 transition.
- 2018‑10‑26:
Detecting Agile BS.
- 2018‑10‑26:
A Plan 9 C compiler for RISC-V.
- 2018‑10‑26:
RobinHood tail latency aware caching: dynamic reallocation from cache-rich to cache-poor.
- 2018‑10‑26:
The peer review industry: implausible and outrageous.
- 2018‑10‑26:
From the endpoint to the cloud: Joanna Rutkowska says goodbye to Qubes OS.
- 2018‑10‑25:
MongoDB's Server Side Public License is likely unenforceable.
- 2018‑10‑25:
US copyright office ruling imposes sweeping right-to-repair reforms.
- 2018‑10‑25:
What application developers should know about leap seconds on Windows 10.
- 2018‑10‑25:
A mini biography of Sidney Darlington.
- 2018‑10‑25:
Stardate 5928.5. USS Enterprise monthly catchup meeting with DS9.
- 2018‑10‑25:
Investigating the implausible Bloomberg Supermicro stories.
- 2018‑10‑25:
Bitcoin must die.
- 2018‑10‑24:
Yelp production engineering documentation style guide.
- 2018‑10‑24:
Rust has higher kinded types already, but only sinners can use them.
- 2018‑10‑24:
Towards fearless SIMD.
- 2018‑10‑24:
.br DNSSEC algorithm rollover report.
- 2018‑10‑24:
Drivers wildly overestimate what "semiautonomous" cars can do.
- 2018‑10‑24:
The myth of whiteness in classical sculpture.
- 2018‑10‑24:
Apps installed on millions of Android phones tracked user behavior to execute a multimillion-dollar ad fraud scheme.
- 2018‑10‑24:
Consolidation, centralisation, and the Internet architecture.
- 2018‑10‑24:
Why did the golden age of The Simpsons end?
- 2018‑10‑24:
A fast, reliable cuckoo hash table for Node.js.
- 2018‑10‑23:
An alternative history of Silicon Valley disruption.
- 2018‑10‑23:
LLVM on SVN to GitHub migration.
- 2018‑10‑23:
Is WebAssembly faster than JavaScript?
- 2018‑10‑23:
Lack of progress exposed by the Canary MacGuffin.
- 2018‑10‑23:
Hexagonal Architecture: three principles and an implementation example.
- 2018‑10‑23:
Advanced techniques to implement fast hash tables.
- 2018‑10‑23:
Windows Server 2019 and Windows 10 October 2018 Update implement leap seconds in a UTC-compliant manner.
- 2018‑10‑23:
Rust can be difficult to learn and frustrating, but it's also the most exciting thing in software development in a long time.
- 2018‑10‑23:
PrEP is stopping HIV in Sydney, a world-first study shows.
- 2018‑10‑22:
WebAssembly's post-MVP future.
- 2018‑10‑22:
Superpermutations.
- 2018‑10‑22:
First-class automatic differentiation in Swift: a manifesto.
- 2018‑10‑22:
Intel kills off its 10nm process.
- 2018‑10‑22:
Facebook is now adding "fbclid" surveillance parameters to outbound links.
- 2018‑10‑22:
RISC OS relicensed under Apache 2.0.
- 2018‑10‑22:
Pronouncing SQL: "S-Q-L" or "sequel"?
- 2018‑10‑22:
Uptime Institute standards for data centre design.
- 2018‑10‑22:
LegoOS: a disseminated, distributed OS for hardware resource disaggregation.
- 2018‑10‑22:
Parsing Timeline version 3.1.
- 2018‑10‑22:
Everyone in a room keeps giving dollars to random others. You'll never guess what happens next.
- 2018‑10‑21:
The indefatigable efforts of J. M. Keynes.
- 2018‑10‑21:
Oral tradition: the oldest true stories in the world.
- 2018‑10‑21:
Basic features that will hopefully return to the MacBook Pro.
- 2018‑10‑21:
Asterix in translation: the genius of Anthea Bell and Derek Hockridge.
- 2018‑10‑21:
Massachusetts gas explosions: Another technological tragedy.
- 2018‑10‑21:
Alzheimer's disease: mounting evidence that herpes virus is a cause.
- 2018‑10‑21:
Pando, the most massive organism on Earth, Is shrinking.
- 2018‑10‑21:
Inside the poisonous British fight over transgender acceptance.
- 2018‑10‑21:
So you want to open a small press bookstore / artist-run space?
- 2018‑10‑20:
Did Uber steal Google's intellectual property?
- 2018‑10‑20:
The elegance of deflate (zlib).
- 2018‑10‑20:
It's not a bug, it's a feature.
- 2018‑10‑20:
The future's so bright, I gotta wear blinders.
- 2018‑10‑20:
Notes on type layouts and ABIs in Rust.
- 2018‑10‑20:
JavaScript fat arrow functions: how, why, when, and when not to use them.
- 2018‑10‑20:
The illustrated TLS connection: every byte explained.
- 2018‑10‑20:
Encrypted SNI comes to Firefox Nightly.
- 2018‑10‑19:
Let's talk about PAKE: password authenticated key exchange.
- 2018‑10‑19:
(Semi-)plausible strategies for moving a whole damn planet.
- 2018‑10‑19:
Flight rules for git.
- 2018‑10‑19:
Exoplanet sizes and spacing around other stars is unlike what we see in our own system.
- 2018‑10‑19:
Fold N Fly paper aeroplane designs.
- 2018‑10‑19:
Orca: differential bug localization in large-scale services.
- 2018‑10‑19:
Looking back at 20 years of ICANN.
- 2018‑10‑18:
Ada Lovelace day: important type theory researchers to follow.
- 2018‑10‑18:
Did Facebook's faulty data push news publishers to make terrible decisions on video?
- 2018‑10‑17:
REPT: reverse debugging of failures in deployed software on Windows.
- 2018‑10‑17:
Bankruptcy and destitution is what happens when you take Ayn Rand seriously.
- 2018‑10‑17:
Accessibility Cheatsheet: practical approaches to universal design.
- 2018‑10‑17:
MODALZ MODALZ MODALZ: design patterns for avoiding modal popups.
- 2018‑10‑15:
GitLab.com stability and performance after migration from Microsoft Azure to Google Cloud.
- 2018‑10‑15:
A batpoo-eating pitcher plant.
- 2018‑10‑14:
The reason we have not detected dark matter.
- 2018‑10‑13:
DOH! An overview of DNS-over-HTTPS.
- 2018‑10‑12:
Vector space model: the most influential paper Gerard Salton never wrote.
- 2018‑10‑12:
Oil droplets guided by "pilot waves" have failed to reproduce the results of the quantum double-slit experiment.
- 2018‑10‑12:
Asterisks in Python: what they are and how to use them.
- 2018‑10‑12:
Deduplicating files in Public Git Archive.
- 2018‑10‑11:
Uncoiling the spiral: Maths, hallucinations, and patterns in fur.
- 2018‑10‑11:
Fastly Debug connection diagnostics.
- 2018‑10‑11:
Dropbox Debug connection diagnostics.
- 2018‑10‑11:
GitHub Debug connection diagnostics.
- 2018‑10‑11:
Dropbox traffic infrastructure: Edge network.
- 2018‑10‑10:
How a fraudster got $12 million out of a Canadian university: spear phishing.
- 2018‑10‑10:
sql-indent.el: Syntax based indentation for SQL in GNU Emacs.
- 2018‑10‑10:
Protobuffers are wrong.
- 2018‑10‑10:
Helium leak from MRI disabled all Apple devices in the facility.
- 2018‑10‑10:
Rust has a static garbage collector.
- 2018‑10‑10:
Secrets in serverless functions.
- 2018‑10‑10:
Who is stealing my power? An ad network case study.
- 2018‑10‑10:
pgFormatter: A PostgreSQL SQL syntax beautifier.
- 2018‑10‑10:
A Rust FFI adventure in unsafety.
- 2018‑10‑10:
Web advertising, where your data is traded in the time it takes to click.
- 2018‑10‑10:
Continued progress porting Emacs to Rust.
- 2018‑10‑10:
Despite proposed solutions, DNS security issues remain.
- 2018‑10‑10:
12 factor CLI apps.
- 2018‑10‑09:
Rust RAII is better than Haskell's bracket pattern.
- 2018‑10‑09:
Reified generics: the search for a cure.
- 2018‑10‑09:
Biscuit: a research OS written in Golang.
- 2018‑10‑09:
The benefits and costs of writing a POSIX kernel in Golang.
- 2018‑10‑08:
The truth about traditional JavaScript benchmarks.
- 2018‑10‑08:
bpftrace (DTrace 2.0) for Linux: source code now available.
- 2018‑10‑08:
Calls between JavaScript and WebAssembly are finally fast.
- 2018‑10‑08:
How newline characters affect Linux kernel performance.
- 2018‑10‑08:
Google+ to shut down after coverup of data-exposing bug.
- 2018‑10‑08:
The untold story of Stripe, the secretive $20bn online payments startup.
- 2018‑10‑08:
SRE: the biggest lie since Kanban?
- 2018‑10‑08:
detect-secrets: prevent new secrets from being committed, and gradually eliminate old ones.
- 2018‑10‑08:
Microsoft pulls Windows 10 October 2018 update after reports of documents being deleted.
- 2018‑10‑08:
Perl 5 static analysis: how to hide errors in macros.
- 2018‑10‑07:
A classification of comments in code.
- 2018‑10‑06:
The Python Unicode mess.
- 2018‑10‑06:
How blind players succeed at sports video games they've never seen.
- 2018‑10‑06:
The $250 biohack that's revolutionizing life with diabetes.
- 2018‑10‑06:
A journey into the heart of bragging: 17 modes of showing off.
- 2018‑10‑05:
How Etsy localizes addresses.
- 2018‑10‑05:
Making sense of the Supermicro motherboard attack.
- 2018‑10‑05:
Peeking behind the curtains of serverless platforms.
- 2018‑10‑05:
Do you really know CORS?
- 2018‑10‑05:
Ubuntu Linux performance over the past six years on an Intel Xeon server.
- 2018‑10‑04:
Sans Forgetica: a font designed to help you remember your study notes.
- 2018‑10‑04:
Bloomberg's 'The Big Hack'.
- 2018‑10‑04:
The Big Hack: how China used a tiny chip to infiltrate American companies.
- 2018‑10‑04:
TLS token-binding standard gains a foothold on the Web.
- 2018‑10‑04:
Bagpiper: decentralized secret management at Airbnb.
- 2018‑10‑04:
How Dropbox rolled out one of the largest Python 3 migrations ever.
- 2018‑10‑03:
The mystery of the continuously functioning battery from 1840.
- 2018‑10‑03:
Commodore 64 left outside for over a decade! Could it still work? (YouTube)
- 2018‑10‑03:
The rise of Netflix competitors pushed consumers back toward piracy.
- 2018‑10‑03:
Intel ME Manufacturing Mode and Apple MacBook vulnerability CVE-2018-4251.
- 2018‑10‑03:
A history of .NET runtimes.
- 2018‑10‑03:
Arm offers free-as-in-beer Cortex IP for Xilinx FPGAs.
- 2018‑10‑03:
The remarkable persistence of 24x36mm.
- 2018‑10‑03:
Why are enterprises so slow?
- 2018‑10‑03:
Kubernetes: a surprisingly affordable platform for personal projects.
- 2018‑10‑03:
When workers automate their own duties, who should reap the benefits?
- 2018‑10‑03:
How cyber attackers stole £2.26m from Tesco Bank customers.
- 2018‑10‑02:
The art of DNS subdomain enumeration.
- 2018‑10‑02:
What the heck is going on with measures of programming language popularity?
- 2018‑10‑02:
Vigilante engineer stops Waymo from patenting key lidar technology.
- 2018‑10‑02:
Introducing dav1d: a new AV1 decoder.
- 2018‑10‑01:
Think globally, act local-ly: restoring environment variables for a subprocess in Perl.
- 2018‑10‑01:
Rethinking Netflix's edge load balancing.
- 2018‑10‑01:
Reimagining of Schrödinger's cat breaks quantum mechanics, and stumps physicists.
- 2018‑10‑01:
UK telecomms access hatch covers.
- 2018‑10‑01:
What if everything we know about dark matter is totally wrong?
- 2018‑09‑30:
NanoLog: high performance nanosecond scale logging system for C++ with a printf-like API.
- 2018‑09‑30:
Peter Flynn set up the first web server in Ireland, and caused the first broken link 404 error.
- 2018‑09‑30:
Estonia sues Gemalto for 152 mln euros over ID card flaws.
- 2018‑09‑29:
Tesla big battery defies skeptics, sends industry bananas over performance.
- 2018‑09‑29:
State of memory safety in Linux.
- 2018‑09‑29:
How 50 million Facebook accounts were hacked.
- 2018‑09‑29:
Innocent until proven guilty / believe the plaintiff.
- 2018‑09‑29:
Rust collections case study: BTreeMap.
- 2018‑09‑29:
The relative performance of C and Rust: AVL tree vs B-tree.
- 2018‑09‑28:
Building Raspberry Pi systems with Yocto.
- 2018‑09‑28:
How to visualize decision trees.
- 2018‑09‑27:
Bizarre particles keep flying up out of Antarctica's ice, and they don't fit the Standard Model.
- 2018‑09‑26:
Why scatter plots suggest causality, and how diamond plots can compensate.
- 2018‑09‑26:
How to build a LOW←TECH solar-powered web site.
- 2018‑09‑26:
Deploying anycast DNS using OpenBSD and BGP.
- 2018‑09‑26:
ARIN routing security deployment stymied by legal restrictions on trust anchor distribution.
- 2018‑09‑26:
What I learned about trash collection from a Taipei alley.
- 2018‑09‑25:
The sorry state of TLS security in enterprise interception appliances.
- 2018‑09‑25:
Although many thought Koko the ape used sign language, science tells us that probably wasn't really true.
- 2018‑09‑25:
Which countries are most resilient to a tier 1 Internet provider failure?
- 2018‑09‑25:
Build systems à la carte.
- 2018‑09‑25:
Taking algorithms to court: current strategies for litigating government use of algorithmic decision-making (in the USA).
- 2018‑09‑25:
Review of the system failure that led to the 2018 tax day IRS outage.
- 2018‑09‑25:
Am I logged in or not? GDPR and the Google Chrome browser sync change.
- 2018‑09‑24:
Computer scientists close in on a proof of the Unique Games conjecture.
- 2018‑09‑24:
Inside a demo of NSO Group's powerful iPhone malware.
- 2018‑09‑23:
Instagram is the unlikely savior of concrete Brutalist architecture.
- 2018‑09‑23:
PostgreSQL 11: something for everyone.
- 2018‑09‑23:
Qualcomm's bid to chase Intel in servers fell victim to Broadcom.
- 2018‑09‑23:
Common cyborg.
- 2018‑09‑22:
A mathematical pattern that fails after about 10^43 examples.
- 2018‑09‑22:
How the GNU coreutils are tested.
- 2018‑09‑21:
NewSQL database systems are failing to guarantee consistency, and Google Spanner is to blame.
- 2018‑09‑21:
Writing documentation when you aren't a technical writer.
- 2018‑09‑21:
Pallene: A statically typed companion language for Lua.
- 2018‑09‑21:
Core Coroutines: making C++ coroutines simpler, faster, and more general.
- 2018‑09‑21:
Whatever happened to the semantic web?
- 2018‑09‑21:
The Open Graph protocol: web page metadata for Facebook.
- 2018‑09‑21:
How to create a Twitter card.
- 2018‑09‑21:
Titans of mathematics clash over epic "proof" of the ABC conjecture.
- 2018‑09‑20:
Why aren't users more happy with programming language JIT VMs?
- 2018‑09‑20:
Persistent DNS connections for reliability and performance.
- 2018‑09‑19:
Javascript: call functions without using parentheses, Lua style.
- 2018‑09‑19:
Scaling AFL to a 256 thread machine.
- 2018‑09‑19:
ICANN board approval of the DNSSEC root KSK rollover.
- 2018‑09‑18:
Why mathematicians can't find the hay in a haystack.
- 2018‑09‑18:
How to kill your tech industry: British computing after the war.
- 2018‑09‑18:
Ruby's Hashes and Perl's Autovivification, in JavaScript.
- 2018‑09‑18:
DDoS attacks on colleges and universities: who, when and why?
- 2018‑09‑18:
Apple and Firefox aim to thwart Facebook and Google tracking.
- 2018‑09‑18:
What really happened to Apple's AirPower.
- 2018‑09‑18:
RIPE's DNSSEC signer migration.
- 2018‑09‑17:
Writers' HQ privacy policy.
- 2018‑09‑17:
Good and Mad: American women are furious; politics and culture will never be the same.
- 2018‑09‑17:
Tim Hayward's grilled cheese sandwich.
- 2018‑09‑17:
Bitslicing: an introduction.
- 2018‑09‑17:
Bring back the shadows: the case against HDR.
- 2018‑09‑17:
A summary of the draft EU directive that might abolish DST next year.
- 2018‑09‑16:
GT Zirkon: a sans-serif font with an animated website.
- 2018‑09‑16:
The next ten billion years.
- 2018‑09‑16:
The real Goldfinger: the London banker who broke the world.
- 2018‑09‑15:
The strange history of Myers-Briggs personality tests.
- 2018‑09‑15:
Most of the Daily Mail's 'commentors' don't even exist.
- 2018‑09‑15:
What most remote work companies don't tell you about remote work.
- 2018‑09‑15:
The five levels of logging.
- 2018‑09‑15:
XML, blockchains, and the strange shapes of progress.
- 2018‑09‑15:
The widely divergent life expectancy in every county in the USA.
- 2018‑09‑15:
We're measuring the economy all wrong.
- 2018‑09‑15:
Handling the iPhone notch in CSS.
- 2018‑09‑15:
Making a hash of things: changing the comment character in git commit messages.
- 2018‑09‑14:
Golang and algebraic data types.
- 2018‑09‑14:
How the Weather Channel made that awesome Hurricane Florence storm surge animation.
- 2018‑09‑14:
If you have a meeting in Ethiopia, you'd better double check the time.
- 2018‑09‑14:
A discussion of local time in Ethiopia, where 12:00 is dawn.
- 2018‑09‑13:
On recipes as software, and empathy for the user.
- 2018‑09‑13:
The factorization of RSA230.
- 2018‑09‑13:
A cartogram of world population in 2018.
- 2018‑09‑13:
YANG alarms.
- 2018‑09‑13:
UK mass surveillance ruled unlawful in landmark ECHR judgment.
- 2018‑09‑13:
European Commission proposes ending DST in March 2019.
- 2018‑09‑13:
How we found a missing Scala class.
- 2018‑09‑13:
HHVM ends PHP support; Facebook's Hack language will rapidly break compatibility.
- 2018‑09‑13:
What the GlobalFoundries retreat really means.
- 2018‑09‑12:
Adventures in Rust: DNS lookups with futures and Tokio.
- 2018‑09‑12:
Parallelizing PNG: choosing Rust for `mtpng`.
- 2018‑09‑12:
Let's Encrypt at scale, for 3000+ web sites at AutoTrader.
- 2018‑09‑12:
How to generate SSL certificates for custom domains using Let's Encrypt, OpenResty, nginx, and Lua.
- 2018‑09‑12:
Writing a simple SQL interpreter in Julia.
- 2018‑09‑12:
Brendan Eich's Brave browser files GDPR complaint against Google's adtech.
- 2018‑09‑12:
Hashicorp Vault: why we need dynamic secrets.
- 2018‑09‑12:
A single gene mutation may have helped humans become optimal long-distance runners.
- 2018‑09‑12:
The British Airways breach: how Magecart claimed 380,000 victims.
- 2018‑09‑12:
Pigeon Maps: ReactJS maps without external dependencies.
- 2018‑09‑11:
The effectiveness of publicly shaming bad security (after private reports fall on deaf ears).
- 2018‑09‑11:
The "developer experience" bait-and-switch: JavaScript is the web's greenhouse gas.
- 2018‑09‑11:
PostgreSQL 11 JIT compilation of queries.
- 2018‑09‑11:
An IPv6 update: how APNIC measures the Internet.
- 2018‑09‑11:
Measuring information in millibytes
- 2018‑09‑11:
Elegy for Larrabee: autovectorization is not a programming model.
- 2018‑09‑11:
OpenSSL-1.1.1 released.
- 2018‑09‑11:
DoT and DoH: it's DNS, Jim, but not as we know it!
- 2018‑09‑10:
Why big companies squander good ideas.
- 2018‑09‑10:
Fast, furious, and insecure: hacking passive keyless entry and start in the Tesla model S.
- 2018‑09‑10:
Spoofing DNS with IP fragments.
- 2018‑09‑10:
A23D: a 3D-printed letterpress font.
- 2018‑09‑10:
Highlights from Git 2.19.
- 2018‑09‑10:
`git log --follow` over-enthusiastically tracks empty files.
- 2018‑09‑10:
The first 15 years of PyPy: a personal retrospective.
- 2018‑09‑10:
Starting an Internet service provider, part 2: deploying fiber.
- 2018‑09‑10:
libcurl gets a URL parser API.
- 2018‑09‑10:
Why Rust closures are (somewhat) hard.
- 2018‑09‑10:
An introduction to inline classes in Kotlin.
- 2018‑09‑10:
Why can't apes talk? Considering primate speech.
- 2018‑09‑10:
UK's worst-selling map: The empty landscape charted by OS440.
- 2018‑09‑10:
Future directions for optimizing compilers.
- 2018‑09‑10:
Things you probably don't want on your [airline] website's payment pages.
- 2018‑09‑09:
On compositionality.
- 2018‑09‑09:
The two dualities of computation: negative and fractional algebraic data types.
- 2018‑09‑09:
The algebra (and calculus!) of algebraic data types.
- 2018‑09‑09:
xsv: a CSV command line toolkit written in Rust.
- 2018‑09‑09:
Java 11: Time to look beyond Oracle's JDK.
- 2018‑09‑09:
5 mistakes C/C++ devs make writing Golang.
- 2018‑09‑09:
10 physics facts you should have learned in school but probably didn't.
- 2018‑09‑09:
DNS-over-TLS: thoughts and implementation.
- 2018‑09‑09:
First-party isolation in Firefox: what breaks if you enable it?
- 2018‑09‑08:
Surprising hidden order unites prime numbers and crystal-like materials.
- 2018‑09‑08:
Quarternions: the strange numbers that birthed modern algebra.
- 2018‑09‑08:
ripgrep 0.10.0 with pcre support.
- 2018‑09‑08:
Zero overhead deterministic failure: a proposed mechanism for C and C++.
- 2018‑09‑07:
SQL style guide.
- 2018‑09‑07:
TLS session resumption allows Google and Facebook to track you without cookies.
- 2018‑09‑07:
Keybase's browser extension exposes decrypted messages to third party web sites.
- 2018‑09‑07:
Golang says WAT?
- 2018‑09‑07:
The mysterious case of Chrome's hidden URLs and Google's AMP.
- 2018‑09‑07:
The new science of seeing around corners.
- 2018‑09‑07:
The monopoly-busting case against Google, Amazon, Uber, and Facebook.
- 2018‑09‑07:
How gRPC uses HTTP/2.
- 2018‑09‑07:
How the Golang runtime implements maps efficiently (without generics).
- 2018‑09‑07:
Google AMP can go to hell.
- 2018‑09‑07:
Google wants to kill the URL.
- 2018‑09‑07:
Ancient farmers spared us from glaciers but profoundly changed Earth's climate.
- 2018‑09‑07:
How we massively reduced our AWS Lambda bill with Golang.
- 2018‑09‑07:
Best practices for mobile form design.
- 2018‑09‑07:
Stabbing yourself with a fork() in a Python multiprocessing.Pool full of sharks.
- 2018‑09‑07:
cOAlition S: a European initiative for full and immediate Open Access to research publications.
- 2018‑09‑07:
Radical open-access plan could spell end to academic journal subscriptions.
- 2018‑09‑07:
Franken-algorithms: the deadly consequences of unpredictable code.
- 2018‑09‑06:
Upgrading PostgreSQL 10 to 11 using logical replication.
- 2018‑09‑06:
Tealemetry: an IoT tea coaster and thermometer.
- 2018‑09‑06:
What drives IPv6 deployment?
- 2018‑09‑06:
Aussie ISP gets eye-watering IPv4 bill, shifts to IPv6 addresses.
- 2018‑09‑05:
Political sextant.
- 2018‑09‑05:
Electromagnetic Field hacker camp featured open source phones as badges and DIY IMSI catchers.
- 2018‑09‑05:
A Rust pattern: iterating over an Rc<Vec<T>>.
- 2018‑09‑05:
The history of a security hole in OpenBSD on i386.
- 2018‑09‑05:
Function poisoning in C++ with gcc.
- 2018‑09‑05:
On Firefox moving DNS to a third party.
- 2018‑09‑05:
Diffy: a server comparison engine for digital forensics in the cloud.
- 2018‑09‑05:
A tour of the Golang memory allocator and garbage collector.
- 2018‑09‑05:
Convergence of AIX and 4.3BSD.
- 2018‑09‑05:
uvm: a BSD virtual memory system.
- 2018‑09‑05:
Java's new Z Garbage Collector (ZGC).
- 2018‑09‑05:
Burroughs B5500 emulator.
- 2018‑09‑04:
Notes on Ousterhout's "Philosophy of Software Design".
- 2018‑09‑04:
A bug story: data alignment in C on x86.
- 2018‑09‑04:
On-site group chat alternatives to HipChat or Slack.
- 2018‑09‑04:
Hysteria was not treated with vibrators.
- 2018‑09‑03:
A critique of resizable distributed hash tables: Riak Core vs random slicing.
- 2018‑09‑03:
Doom II's final secret has been found, after 24 years.
- 2018‑09‑03:
zombodb: allow Postgres to use Elasticsearch as an index provider.
- 2018‑09‑03:
I don't want to learn your garbage query language.
- 2018‑09‑03:
BBC Horizon documentary: a week without lying, the honesty experiment.
- 2018‑09‑03:
SonarSnoop: active acoustic side-channel attacks against smartphone unlock codes.
- 2018‑09‑03:
Optical TEMPEST: progress since 2002.
- 2018‑09‑03:
Tips for making video walls using Matrox C-series graphics cards.
- 2018‑09‑03:
ParseDMARC: open source DMARC report analyzer and visualizer.
- 2018‑09‑03:
ICANN's guide on what to expect during the DNSSEC root KSK rollover.
- 2018‑09‑03:
Relativistic quantum chemistry: why gold is yellow and mercury is liquid.
- 2018‑09‑02:
Anycast TCP.
- 2018‑09‑02:
A story about tracking down TCP RSTs.
- 2018‑09‑02:
Mastodon and the challenges of abuse in a federated system.
- 2018‑09‑01:
Zero-copy deserialization in Julia.
- 2018‑08‑31:
Can Beethoven send copyright takedown requests?
- 2018‑08‑31:
Shifting solid bulk cargoes: an explanation of the process and dangers.
- 2018‑08‑31:
The abelian sandpile model.
- 2018‑08‑31:
The ships that sink due to solid bulk cargo liquefaction.
- 2018‑08‑31:
LeBron James's tattoos at issue in a copyright lawsuit.
- 2018‑08‑31:
On the worst-case complexity of TimSort.
- 2018‑08‑31:
C considered dangerous: mitigations in the Linux kernel.
- 2018‑08‑31:
The performance cost of Spectre / Meltdown / Foreshadow mitigations on Linux 4.19.
- 2018‑08‑30:
Life-size drivable LEGO Technic Bugatti Chiron.
- 2018‑08‑30:
Firefox in-page pop-up reporter.
- 2018‑08‑30:
Linux kernel developer criticizes Intel's Meltdown bug secrecy.
- 2018‑08‑30:
Firefox Nightly DNS-over-HTTPS experimental results.
- 2018‑08‑30:
In the near future, Firefox will - by default - protect users by blocking tracking.
- 2018‑08‑29:
This Tudor London map overlay is marvelous.
- 2018‑08‑29:
Miami's other water problems.
- 2018‑08‑29:
Lazy sequences in Swift and how they work.
- 2018‑08‑29:
Awesome and crazy Kotlin examples.
- 2018‑08‑29:
Surety, the world's oldest blockchain, has been hiding in the New York Times since 1995.
- 2018‑08‑29:
DarkRISCV: opensouce RISC-V implemented from scratch in one night!
- 2018‑08‑29:
Postgres 11 has fast column creation with defaults.
- 2018‑08‑29:
hardened_malloc: an experimental hardened allocator in a very early stage of development.
- 2018‑08‑28:
Tide: TypeScript interactive development environment for Emacs.
- 2018‑08‑28:
RedHat and SUSE withdraw support for OpenLDAP.
- 2018‑08‑28:
Goodbye VSCode, hello Emacs (again).
- 2018‑08‑28:
A new Linux kernel AIO polling interface.
- 2018‑08‑28:
Why U.S. corporate boards don't include workers.
- 2018‑08‑28:
GlobalFoundries stops all 7nm development, instead focuses on specialized processes.
- 2018‑08‑28:
wideNES: peeking past the edge of NES games.
- 2018‑08‑28:
The rise of dismal sf: to understand our economic system, we need speculative stories.
- 2018‑08‑28:
Spectrum of possibilities: a GUI color guide.
- 2018‑08‑28:
How Facebook, Apple, Microsoft, and others are contributing to OpenStreetMap.
- 2018‑08‑28:
Fixing slow MacBook WiFi reconnect after sleep.
- 2018‑08‑28:
From PFI to privatisation, our national accounting rules encourage daft decisions. It's time to change them.
- 2018‑08‑27:
Stop telling women how they should talk.
- 2018‑08‑27:
Why did Prolog lose steam?
- 2018‑08‑27:
Real world write loads and SSD wearout.
- 2018‑08‑27:
VSCodium: binary releases of VS Code without MS branding/telemetry/licensing.
- 2018‑08‑26:
Women's pockets are inferior.
- 2018‑08‑26:
Emoji: in the beginning.
- 2018‑08‑26:
A satellite engineer explains the challenges of space electronics.
- 2018‑08‑26:
The how and why of the design of the Lucida fonts.
- 2018‑08‑26:
The paradox of Karl Popper.
- 2018‑08‑26:
The Great Barrier Reef is headed for 'massive death'.
- 2018‑08‑26:
The illegal ramen vendors of postwar Tokyo.
- 2018‑08‑26:
Swan sanctuary says bread is good for wildfowl.
- 2018‑08‑26:
How the Netherlands feeds the world.
- 2018‑08‑26:
There's no room in the Room of My Own.
- 2018‑08‑26:
The origins of opera and the future of programming.
- 2018‑08‑26:
The worst stories from a decade-plus of Ask A Manager.
- 2018‑08‑26:
Patterns for authentication in the CDN.
- 2018‑08‑25:
The sugar conspiracy.
- 2018‑08‑25:
quicktype: generate types and converters from JSON, Schema, and GraphQL.
- 2018‑08‑25:
Lessons from JupyterCon.
- 2018‑08‑25:
Four ways that Internet ex-idealists explain where it all went wrong.
- 2018‑08‑25:
AT commands: attacking Android phones using modem control sequences over USB.
- 2018‑08‑25:
Zork: how to fit a large program in a small machine.
- 2018‑08‑24:
Firefox's :screenshot command.
- 2018‑08‑24:
The rise and rise of JSON.
- 2018‑08‑24:
Eerie skyglow called 'Steve' isn't an aurora, Is 'completely unknown' to science.
- 2018‑08‑23:
The war over supercooled water: a seven year scientific dispute caused by a coding error.
- 2018‑08‑22:
Home Assistant: open source home automation with Python.
- 2018‑08‑22:
Kubernetes anti-patterns: let's do GitOps, not CIOps!
- 2018‑08‑22:
GitOps: a path to more self-service IT.
- 2018‑08‑22:
Automatic code formatting for partially-staged files in git.
- 2018‑08‑22:
Sex, religion, and a towering treatise on anatomy.
- 2018‑08‑22:
Orkney tidal turbine generating 'phenomenal result'.
- 2018‑08‑22:
New attack recovers RSA encryption keys from EM waves within seconds.
- 2018‑08‑22:
Why are record companies dumping their Spotify stock?
- 2018‑08‑22:
The undertakers of Silicon Valley: how failure became big business.
- 2018‑08‑22:
Picycle: donate your unused Raspberry Pi for scientific research.
- 2018‑08‑22:
Many more Ghostscript security vulnerabilities.
- 2018‑08‑22:
The first million integers, represented as binary vectors of prime factors, laid out using the UMAP dimensionality reduction algorithm.
- 2018‑08‑22:
Google's voracious data collection.
- 2018‑08‑22:
The Packard Merlin: how Detroit mass-produced Britain's hand-built powerhouse.
- 2018‑08‑21:
A galactic visualization of the prime factors of the first million numbers.
- 2018‑08‑21:
On the iron law of megaprojects, the break-fix model of management, survival of the unfittest, and more.
- 2018‑08‑21:
Fast multiplication with slow additions.
- 2018‑08‑21:
Live map of London Underground trains.
- 2018‑08‑20:
Catching integer overflows in C.
- 2018‑08‑20:
High school students learning programming do better with block-based languages.
- 2018‑08‑20:
DNSSEC and DNS over TLS.
- 2018‑08‑20:
Performance of ranged accesses into arrays: modulo, multiply-shift, and masks.
- 2018‑08‑20:
Hacking a brand new Mac remotely, right out of the box, using the device enrolment program.
- 2018‑08‑20:
A visual guide to git.
- 2018‑08‑20:
Singularity of Origin: a tool to perform DNS rebinding attacks.
- 2018‑08‑20:
Propagation of error: approving citations of retracted papers.
- 2018‑08‑19:
MATLAB is a terrible programming language.
- 2018‑08‑19:
An introduction to Golang modules.
- 2018‑08‑19:
One in five genetics papers contains errors thanks to Microsoft Excel.
- 2018‑08‑19:
Pseudo constant time implementations ofTLS are only pseudo secure.
- 2018‑08‑19:
Directional freezing: a method for making clear ice.
- 2018‑08‑19:
Tobacco cocktails are a terrible idea.
- 2018‑08‑18:
Advice for data organization in spreadsheets.
- 2018‑08‑18:
John Conway's method for walking up stairs.
- 2018‑08‑18:
The T programming language: an early dialect of Scheme.
- 2018‑08‑18:
The Ramsey sweep: mark/sweep garbage collection in time proportional to the live data, not heap size.
- 2018‑08‑18:
Samba DNS problems with DNAME records and large replies.
- 2018‑08‑18:
Never patterns, exhaustive matching, and uninhabited types in Rust.
- 2018‑08‑17:
Battery breakthrough: Doubling performance with lithium metal that doesn't catch fire.
- 2018‑08‑17:
Caveat troglodytarum: how to deal with patent trolls.
- 2018‑08‑17:
Working at Superior Software in Leeds in the 1980s.
- 2018‑08‑17:
A sound card before its time.
- 2018‑08‑17:
24-core CPU and I can't type an email: Google Chrome performance debugging.
- 2018‑08‑17:
Secure Socket API: an easy-to-use TLS extension to BSD sockets.
- 2018‑08‑17:
Introducing the Windows pseudo console (ConPTY).
- 2018‑08‑17:
Who left open the cookie jar?
- 2018‑08‑17:
Who is answering my queries? Understanding and characterizing interception of the DNS resolution path.
- 2018‑08‑17:
How to alleviate the pain of Rust compile times.
- 2018‑08‑16:
BARR-C:2018 embedded C coding standard, harmonized with MISRA C 2012.
- 2018‑08‑16:
Are patent claims coming for your WS2812 Neopixels?
- 2018‑08‑16:
FastLED: an animation library for Arduino.
- 2018‑08‑16:
Pixelblaze V2: an advanced LED pattern development engine and controller.
- 2018‑08‑15:
Sequences, sequences, and sequences: Fred Sanger's academic autobiography.
- 2018‑08‑15:
Scientists discover how to make schwartzite (negatively curved carbon sheets) after decades of searching.
- 2018‑08‑15:
The "server-process-edition" branch of SQLite.
- 2018‑08‑15:
Strongly universal string hashing is fast.
- 2018‑08‑15:
Not on your life: six means of sf transportation I would not use.
- 2018‑08‑15:
Bullshit-sensitivity predicts prosocial behavior.
- 2018‑08‑15:
Meltdown strikes back: the Intel L1 terminal fault (L1TF / Foreshadow) vulnerability.
- 2018‑08‑15:
Diagnosing a weak memory ordering bug.
- 2018‑08‑15:
Passive observations of a large DNS service.
- 2018‑08‑15:
Open Journal Systems: open-source academic journal publishing software.
- 2018‑08‑15:
Fastly's response to the SegmentSmack vulnerability.
- 2018‑08‑14:
If quantum computers are not possible, why are classical computers possible?
- 2018‑08‑14:
Can you break a stick of spaghetti into just two pieces? Yes! (With a twist.)
- 2018‑08‑14:
Protecting against the new "L1TF" speculative vulnerabilities.
- 2018‑08‑14:
Foreshadow: breaking Intel's virtual memory abstraction with transient out-of-order execution.
- 2018‑08‑14:
Dijkstra's in disguise.
- 2018‑08‑14:
The 10:1 rule of work:output in writing and programming.
- 2018‑08‑14:
Faxploit: compromising a network via an all-in-one printer's POTS fax line.
- 2018‑08‑13:
The Power User Curve: The best way to understand your most engaged users.
- 2018‑08‑13:
Celebrating 10 years of BGP routing insecurity.
- 2018‑08‑13:
An overview of the BBC's work on TV over IP with optional multicast.
- 2018‑08‑13:
What do I need to know about the "SegmentSmack" TCP reassembly DoS attack?
- 2018‑08‑12:
The evolution of LED backlights for LCDs.
- 2018‑08‑12:
USA temperature charts: can I sucker you?
- 2018‑08‑12:
Dismantling the USS Enterprise: The US Navy has never disposed of a nuclear-powered aircraft carrier before.
- 2018‑08‑12:
What the fuck is the "edge"?
- 2018‑08‑10:
DNS: A look back at a look back from 1988.
- 2018‑08‑10:
Which cryptographic attack deserves to win the 2018 Pwnie?
- 2018‑08‑10:
µUBSan: a clean-room reimplementation of the Undefined Behavior Sanitizer runtime.
- 2018‑08‑10:
Smoking around the world.
- 2018‑08‑10:
Rosenbridge: a hardware backdoor in VIA C3 x86 processors.
- 2018‑08‑09:
Julia 1.0
- 2018‑08‑09:
Airtime for Hitler on BBC.
- 2018‑08‑09:
An ingenious but failed BMW theft attempt.
- 2018‑08‑09:
"What have we done?" Silicon Valley engineers fear the gig economy they have created is a monster.
- 2018‑08‑09:
Dark energy may be incompatible with string theory.
- 2018‑08‑09:
How to crash a node.js email server with a single message.
- 2018‑08‑09:
In search of a bigger boom: multi-stage thermonuclear hydrogen bombs.
- 2018‑08‑09:
On Beavers, nature's perfect analogy for Silicon Valley tech.
- 2018‑08‑09:
Systemd's DynamicUser feature is dangerous.
- 2018‑08‑09:
Bloaty McBloatface 1.0: a size profiler for binaries.
- 2018‑08‑09:
Scalable media delivery on the Web with HTTP server push and multicast QUIC to the browser.
- 2018‑08‑09:
BBC R&D scalable Internet broadcasting using multicast QUIC.
- 2018‑08‑09:
GLB: GitHub's open source layer 4 load balancer.
- 2018‑08‑08:
A collection of dataviz caveats.
- 2018‑08‑08:
Stacked Borrows: an aliasing model for Rust.
- 2018‑08‑08:
High uptime headaches due to floating point high resolution timers.
- 2018‑08‑08:
A timesyncd total failure and systemd's complete lack of debugability.
- 2018‑08‑08:
V8 JavaScript engine release v6.9
- 2018‑08‑08:
New York's Vision Zero success provides a road map for others taking aim at pedestrian deaths.
- 2018‑08‑07:
Hacking commit access to Homebrew in 30 minutes.
- 2018‑08‑07:
Meet the street artist transforming London's railway bridges into works of art.
- 2018‑08‑07:
Rust and the case of the redundant comparison.
- 2018‑08‑06:
How fast is a PS/2 keyboard?
- 2018‑08‑06:
Let's Encrypt is now directly trusted by all major X.509 root CA programs.
- 2018‑08‑06:
Facebook deploys TLS 1.3 with Fizz, a new high-performance open source TLS library.
- 2018‑08‑06:
The mythical Brown Windsor Soup.
- 2018‑08‑06:
Pollen calendar.
- 2018‑08‑06:
Polyhedra Viewer: visualize the relationships between the convex, regular-faced polyhedra.
- 2018‑08‑06:
What's going on in the Rosetta timelapse video from the surface of a comet.
- 2018‑08‑05:
Mozilla's new DNS-over-HTTPS resolution is dangerous.
- 2018‑08‑04:
On system rollback and totalised fields: An algebraic approach to system change.
- 2018‑08‑04:
What is philosophy of science, and should scientists care?
- 2018‑08‑04:
Transparency logs via append-only authenticated dictionaries.
- 2018‑08‑04:
Illuminated manuscripts, illuminating medicines: the difficult sources of old pigments.
- 2018‑08‑04:
Arxiv Vanity: read academic papers from Arxiv as web pages.
- 2018‑08‑03:
In pursuit of production minimalism at Heroku.
- 2018‑08‑03:
The oldest building in every state of the USA.
- 2018‑08‑03:
Our logo looks like underpants: a case study in internationalization.
- 2018‑08‑03:
DOCSIS time protocol: PTP over cable for 5G microcells.
- 2018‑08‑03:
History of the BASIC Engine.
- 2018‑08‑03:
A ray-tracing pioneer explains how he stumbled into global illumination.
- 2018‑08‑02:
Australian Computer Museum Society's historical collection is due to be bulldozed next week.
- 2018‑08‑02:
saltpack: a modern crypto messaging format, a NaCL-based replacement for PGP.
- 2018‑08‑02:
Why a typical home solar setup does not work without mains power, and what you can do about it.
- 2018‑08‑01:
One line of Javascript made FT.com 10 times slower.
- 2018‑08‑01:
Introduction to compute shaders.
- 2018‑08‑01:
A new HTTP security header: Feature-Policy.
- 2018‑08‑01:
Swift's "Never" type.
- 2018‑08‑01:
Cherry MX history: a German company with American roots.
- 2018‑07‑31:
A friendly guide to colours in data visualisation.
- 2018‑07‑31:
The science behind non-Newtonian noodles.
- 2018‑07‑31:
Bootable CD with retro game in a tweet.
- 2018‑07‑31:
The IPv4 address space transfer market: 2018 mid-year report.
- 2018‑07‑31:
An Empire of Stars: How Britain beat the odds to independently achieve space flight, and then abandoned it on the very same day.
- 2018‑07‑31:
18-year-old Ewin Tang proved there is no quantum computing speedup for the “recommendation problem”.
- 2018‑07‑31:
First successful test of Einstein's general relativity near a supermassive black hole.
- 2018‑07‑31:
Highlights from IETF 102.
- 2018‑07‑31:
Why the new V8 JavaScript engine is so damn fast.
- 2018‑07‑31:
How to read an RFC.
- 2018‑07‑31:
Elsevier's demands are unacceptable for the German academic community.
- 2018‑07‑31:
When you need to rip the same CD 300 times.
- 2018‑07‑31:
A collection of quotes on interesting notations as tools of thought.
- 2018‑07‑31:
Porting Coreboot to the 51NB X210.
- 2018‑07‑30:
Haskell: If monads are the solution, what is the problem?
- 2018‑07‑30:
Announcing TypeScript 3.0.
- 2018‑07‑30:
What economists still don't get about the 2008 financial crisis.
- 2018‑07‑30:
How to read a legal opinion.
- 2018‑07‑30:
When Bussard ramjets ruled sf.
- 2018‑07‑30:
Why salt was so important throughout history.
- 2018‑07‑30:
Doug McIlroy's C++ regular expression matching library.
- 2018‑07‑30:
Routinator 3000: RPKI relying party software in Rust.
- 2018‑07‑30:
Pure CSS logical styling based on the number of elements.
- 2018‑07‑30:
The evolution of writing.
- 2018‑07‑30:
Iran's Gorgan Wall, second-longest in the world, is still shrouded in mystery.
- 2018‑07‑29:
The rejected transistor at the heart of the iconic Roland TR-808.
- 2018‑07‑29:
Secure boot on Apple Mac T2 computers.
- 2018‑07‑29:
When does white space matter in HTML?
- 2018‑07‑29:
Measuring the brightest iPhone ever: iPhone X.
- 2018‑07‑29:
The 'scutoid' is geometry's newest shape, and it could be all over your body.
- 2018‑07‑29:
Ghost characters: a spectre is haunting Unicode.
- 2018‑07‑29:
Cheap FPGA development boards.
- 2018‑07‑29:
Microfilm lasts half a millennium.
- 2018‑07‑29:
Why don't more men take their wife's surname when they marry?
- 2018‑07‑29:
The troubled quest for the superconducting wind turbine.
- 2018‑07‑29:
Color or fruit? On the unlikely etymology of "orange".
- 2018‑07‑28:
Ryu: convert floating point numbers to decimal strings.
- 2018‑07‑28:
A map showing the steepness of streets.
- 2018‑07‑28:
Ryū: fast float-to-string conversion.
- 2018‑07‑28:
#ifdef considered harmful: portability experience with C News.
- 2018‑07‑28:
uBlock has been taken over by AdBlock.
- 2018‑07‑28:
Behemoth, bully, thief: how the English language is taking over the planet.
- 2018‑07‑28:
Why restaurants became so loud, and what you can do about it.
- 2018‑07‑28:
The death of a TLD.
- 2018‑07‑28:
Keep a Changelog.
- 2018‑07‑27:
RSSAC023: a history of the DNS root nameserver system.
- 2018‑07‑27:
Ride-hailing services such as Uber and Lyft are not reducing traffic in American cities.
- 2018‑07‑26:
NetSpectre: read arbitrary memory over the network.
- 2018‑07‑26:
Prefix sums and their applications.
- 2018‑07‑26:
15 years of SparkFun.
- 2018‑07‑26:
WebAssembly security model.
- 2018‑07‑26:
The Shipping Forecast.
- 2018‑07‑26:
The Finkbeiner Test: a tool for writing about women in their professions.
- 2018‑07‑26:
Testing for divisibility by 7.
- 2018‑07‑26:
Is WebAssembly the return of Java applets and Flash?
- 2018‑07‑26:
Notes on secure BGP from IETF 102.
- 2018‑07‑26:
Breaking Bluetooth pairing with an ECC fixed coordinate invalid curve attack.
- 2018‑07‑26:
Compile-time function evaluation and Rust's type system.
- 2018‑07‑26:
What's with sf's fixation on single-gendered planets?
- 2018‑07‑26:
Is it possible to make floating point calculations completely deterministic?
- 2018‑07‑26:
On impl blocks, injection and surjection in Rust.
- 2018‑07‑25:
Big tech warns of Japanese millennium bug ahead of Akihito's abdication. (Also affects Unicode!)
- 2018‑07‑24:
Getting to know Graal, the new Java JIT compiler.
- 2018‑07‑24:
In her short life, mathematician Emmy Noether changed the face of physics.
- 2018‑07‑24:
How Rust #[test] function attributes work.
- 2018‑07‑23:
Minimal DMARC.
- 2018‑07‑21:
Why mobile phones are safe.
- 2018‑07‑21:
psi: pressure stall information for CPU, memory, and IO. (Linux WIP)
- 2018‑07‑21:
Frank's compulsive guide to international postal addresses.
- 2018‑07‑21:
Inside the Windows Console.
- 2018‑07‑21:
The wrong abstraction.
- 2018‑07‑21:
Into the Borg: an SSRF vulnerability inside Google's production network.
- 2018‑07‑21:
Riving, a Viking-age woodworking technique.
- 2018‑07‑21:
Doing Windows, part 5: version 2 and Excel.
- 2018‑07‑21:
Regex character ranges and locales: a long sad story.
- 2018‑07‑21:
The octonion math that could underpin physics.
- 2018‑07‑20:
Microsoft Windows Server 2019 will include support for leap seconds.
- 2018‑07‑20:
The uncertainty of measuring the DNS.
- 2018‑07‑20:
British broadband speed map.
- 2018‑07‑19:
The Java type system is unsound.
- 2018‑07‑18:
A primer on synchronization and data races, and a bug in Rust Arc atomic reference counts.
- 2018‑07‑18:
Auditing popular Rust crates: how one line of unsafe code nearly ruined everything.
- 2018‑07‑18:
JSON isn't a good configuration language.
- 2018‑07‑18:
Looking at TDD: an academic survey.
- 2018‑07‑18:
Writing asynchronous code for Android using coroutines in Kotlin.
- 2018‑07‑18:
Don't feed the trolls, and other hideous lies.
- 2018‑07‑18:
Getting Disney's Moana island scene to render well with pbrt.
- 2018‑07‑17:
Britain's busses are in crisis, and no-one seems to care.
- 2018‑07‑17:
H2O: an optimized http/2 web server.
- 2018‑07‑17:
Lwan: a lightweight web server scriptable with Lua.
- 2018‑07‑17:
The story of Golang's garbage collector.
- 2018‑07‑17:
Alan Bagley's long and satisfying career in time, frequency, and atomic clocks at Hewlett-Packard.
- 2018‑07‑17:
Formal reasoning about the security of AWS.
- 2018‑07‑17:
The two-time pad: midwife of information theory?
- 2018‑07‑17:
Linux touchpad like a Macbook: goal worth pursuing?
- 2018‑07‑16:
LIDL cancels SAP project after spending €500M.
- 2018‑07‑16:
Google Cloud Platform: the good, the bad, and the ugly.
- 2018‑07‑16:
Lean testing: why integration tests are better than unit tests.
- 2018‑07‑15:
How the BBC lost the plot on Brexit.
- 2018‑07‑15:
The new henge of Newgrange: a once-in-a-lifetime discovery.
- 2018‑07‑15:
The hotel bathroom puzzle.
- 2018‑07‑14:
Finding and exploiting hidden features of Animal Crossing's NES emulator.
- 2018‑07‑14:
A history of the inverse-T arrow key layout.
- 2018‑07‑14:
How to port your OS to Amazon EC2.
- 2018‑07‑13:
The Spiral Language: an ML family functional language with intensional polymorphism and first-class staging.
- 2018‑07‑13:
The battle of the schedulers: FreeBSD ULE vs. Linux CFS.
- 2018‑07‑13:
Crayon the grids: maps of street layouts colored by orientation.
- 2018‑07‑13:
Street orientation of Dutch cities.
- 2018‑07‑13:
Dhall: a programmable configuration language that is not Turing-complete.
- 2018‑07‑13:
How to write a good software design doc.
- 2018‑07‑13:
City street orientations around the world.
- 2018‑07‑12:
British Rail corporate identity 1965-1994.
- 2018‑07‑12:
HeyPhone: open hardware cave rescue communication system, used in the Thai cave rescue.
- 2018‑07‑11:
Cambridge Analytica is what happens when you privatise military propaganda.
- 2018‑07‑11:
Why is there an inc bp in function prologues on 16-bit Windows? Pointer tagging!
- 2018‑07‑10:
The role of personality, authoritarianism, and cognition in Brexit.
- 2018‑07‑10:
Shutting down Bitcanal, a BGP hijack factory.
- 2018‑07‑10:
Speculative buffer overflows: attacks and defenses. (Spectre BCBS)
- 2018‑07‑10:
The CSS paint API.
- 2018‑07‑10:
Cropmarks reveal ancient sites during the drought in Wales.
- 2018‑07‑09:
Inside the paper: Build Systems a la Carte.
- 2018‑07‑09:
Worse is worse.
- 2018‑07‑09:
Literate programming: Knuth is doing it wrong.
- 2018‑07‑09:
Saving a non-profit six figures a year using Squarespace, Airtable and Glitch.com.
- 2018‑07‑08:
A resource list for domestic abuse victims targeted using Internet of Things devices.
- 2018‑07‑08:
Social and cultural aspects of drinking: drunkenness is learned behaviour.
- 2018‑07‑08:
Against academic meritocracy.
- 2018‑07‑08:
OAuth 2 simplified.
- 2018‑07‑08:
Why Mastercard doesn't use OAuth 2.0.
- 2018‑07‑08:
OAuth for the Open Web.
- 2018‑07‑08:
The rise of 'pseudo-AI': how tech firms quietly use humans to do bots' work.
- 2018‑07‑08:
PuzzleScript: an open-source HTML5 puzzle game engine.
- 2018‑07‑08:
Version control before Git with CVS.
- 2018‑07‑08:
Dark Side of the Mac: APIs for appearance, background materials, and foreground vibrancy.
- 2018‑07‑08:
Why revolutionaries love spicy food: a history of the chilli pepper.
- 2018‑07‑07:
Why and how Java developers break APIs.
- 2018‑07‑05:
In 2018, Tumblr is a joyless black hole.
- 2018‑07‑05:
A review of Gödel, Escher, Bach.
- 2018‑07‑05:
How to design frictionless APIs.
- 2018‑07‑05:
Nginx tuning tips for TLS and https.
- 2018‑07‑05:
Testing memory allocators: ptmalloc2 vs tcmalloc vs hoard vs jemalloc.
- 2018‑07‑05:
Measurements of the impact of open offices on collaboration.
- 2018‑07‑04:
Speaking in code: how to program by voice.
- 2018‑07‑04:
Evaluating the evaluation: a benchmarking checklist.
- 2018‑07‑04:
How we solved GitLab's CHANGELOG conflict crisis.
- 2018‑07‑04:
A proposal for UUID version 6, that naturally sorts in time order.
- 2018‑07‑04:
The git commit-graph file format and other optimizations.
- 2018‑07‑03:
Fake "radical feminist" group is actually a paid political front for anti-LGBT religious right organization.
- 2018‑07‑03:
Article 13 of the EU copyright directove considered harmful.
- 2018‑07‑02:
Amber Case: the argument against blue.
- 2018‑07‑02:
Fictitious route names from a neural network trained on UK Climbing logbooks.
- 2018‑07‑02:
California passes its own GDPR to stymie a data protection ballot initiative.
- 2018‑07‑02:
Sereal: Fast, compact, schema-less, binary serialization and deserialization for Perl and other dynamic languages.
- 2018‑07‑02:
Reclaiming RSS.
- 2018‑07‑02:
Extractive contributors: How open is too open?
- 2018‑07‑02:
Computational Necromancy: MOST-POSITIVE-BIGNUM on the TI Explorer.
- 2018‑07‑02:
The independent researcher.
- 2018‑07‑02:
A survey of programming language package systems.
- 2018‑07‑01:
Design case history: the Commodore 64.
- 2018‑07‑01:
On C++ random number generator quality.
- 2018‑07‑01:
Bringup is hard: some hints and tips on porting NetBSD to a new hardware platform.
- 2018‑07‑01:
Developers. Our last, best hope for ethics?
- 2018‑07‑01:
How we discovered three poisonous books in our university library.
- 2018‑07‑01:
No, you don't need ML/AI. You need SQL.
- 2018‑07‑01:
TCP small queues and WiFi aggregation: a war story.
- 2018‑07‑01:
aLTEr: breaking LTE on layer two.
- 2018‑07‑01:
Debugging with C-Reduce.
- 2018‑07‑01:
Rust pointers for C programmers.
- 2018‑07‑01:
Why you should not use Google Cloud.
- 2018‑07‑01:
A sea change coming for water cooling in datacenters.
- 2018‑06‑30:
Elsevier are corrupting open science in Europe.
- 2018‑06‑30:
American collapse is extraordinary: why it's melting down faster than anyone believed.
- 2018‑06‑29:
Sphericons.
- 2018‑06‑28:
Python 3 at Facebook.
- 2018‑06‑28:
New GPU-accelerated supercomputers change the balance of power on the TOP500.
- 2018‑06‑28:
Turbine-powered optical isolator: a spinning glass ball that rejects light from one direction.
- 2018‑06‑28:
Hannah Gadsby's 'Nanette' is a radical, transformative work of comedy.
- 2018‑06‑28:
How BuzzFeed migrated from a Perl monolith to Golang and Python microservices.
- 2018‑06‑28:
How to get away with financial fraud.
- 2018‑06‑28:
Apple engineers its own downfall with the Macbook Pro keyboard.
- 2018‑06‑28:
Supercharging the Git commit graph.
- 2018‑06‑27:
Algebraic blindness: Boolean blindness for modern type systems.
- 2018‑06‑27:
Safe API design with the ghosts of departed proofs.
- 2018‑06‑27:
Exposing the secret Office 365 detailed activity logs and forensics tool.
- 2018‑06‑27:
Making Rust Arc more atomic.
- 2018‑06‑27:
Massacring C Pointers: the worst C programming textbook ever written.
- 2018‑06‑26:
Anti-if: the missing patterns.
- 2018‑06‑26:
Another 10 years of Internet evolution.
- 2018‑06‑26:
Issues and requirements for SNI encryption in TLS.
- 2018‑06‑26:
Oh, what a fragile web we weave: third-party dependencies in modern web services, and their implications.
- 2018‑06‑26:
A prescient warning to Boeing on its 787 trouble.
- 2018‑06‑26:
Out-sourced profits: the cornerstone of successful subcontracting. (Hart-Smith / Boeing)
- 2018‑06‑26:
Java tricks with 'var' and anonymous classes (that you should never use at work).
- 2018‑06‑26:
CheckTLS secure email.
- 2018‑06‑26:
STARTTLS everywhere: how well does your mail server support TLS?
- 2018‑06‑26:
Letting neural networks be weird: The Visual Chatbot.
- 2018‑06‑25:
.gov.?? 2LDs in various European countries.
- 2018‑06‑25:
Parsing with derivatives. (Paper)
- 2018‑06‑25:
Parsing with derivatives. (Slides)
- 2018‑06‑25:
A history of CPAN.
- 2018‑06‑25:
Attacking IoT devices from the Internet with DNS rebinding.
- 2018‑06‑24:
Isaac Asimov asks, "how do people get new ideas?"
- 2018‑06‑24:
Compiler fuzzing with AFL.
- 2018‑06‑24:
Design patterns as higher order datatype-generic programs.
- 2018‑06‑24:
Rebel girls and children's books: well-behaved women make history too.
- 2018‑06‑23:
TWISTED BRAIN: This demo will twist the 6845 CRTC video chip in your BBC Master computer in new and previously untested ways.
- 2018‑06‑23:
Some of my favourite lost buildings of Cambridge.
- 2018‑06‑23:
Hasbro says it owns the Scrabble dictionary. Players beg to differ.
- 2018‑06‑23:
All the perfect pangrams in English.
- 2018‑06‑23:
Break down of a C64 demo effect.
- 2018‑06‑22:
BOLT optimizes placement of instructions in memory to reduce CPU execution time by 2 percent to 15 percent.
- 2018‑06‑22:
The ARM scalable vector extension.
- 2018‑06‑22:
Disambiguating the first computer.
- 2018‑06‑22:
Wavethrough: a web browser security bug.
- 2018‑06‑21:
Zen magnets: 6 years of litigation ends In victory.
- 2018‑06‑21:
edn: extensible data notation, a subset of Clojure.
- 2018‑06‑21:
SDLang: a simple declarative language with an XML-like structure.
- 2018‑06‑21:
Jsonnet: a data templating language.
- 2018‑06‑21:
HOCON: human-optimized config object notation.
- 2018‑06‑21:
JSON5: JSON for humans.
- 2018‑06‑21:
Hjson: a user interface for JSON.
- 2018‑06‑21:
zish: A data serialization format.
- 2018‑06‑21:
YAML: probably not so great after all.
- 2018‑06‑21:
TLS certificates for localhost.
- 2018‑06‑20:
barrier: Open-source KVM software (a fork of Synergy).
- 2018‑06‑20:
PostgreSQL features you may not have tried but should.
- 2018‑06‑20:
A broad overview of how modern Linux systems boot.
- 2018‑06‑20:
From Ruby + ActiveRecord to Rust + Diesel.
- 2018‑06‑20:
The man who saw the dangers of Cambridge Analytica years ago.
- 2018‑06‑20:
Rust MIR-based borrow check (non-lexical lifetimes) status update.
- 2018‑06‑20:
The four most expensive words in the English language: cryptocurrency-based decentralized storage network.
- 2018‑06‑20:
Holy Grails and Thameslink Fails: the timetable that went wrong.
- 2018‑06‑19:
Microsoft has ported Windows, Linux, and LLVM to E2, its homegrown processor architecture.
- 2018‑06‑18:
How long would you have before you ran into trouble if you were given a golf ball that doubled in density once an hour?
- 2018‑06‑18:
A performance cheat sheet for PostgreSQL
- 2018‑06‑18:
Patterson's cipher for Jefferson: ahallenge solved after 200 years.
- 2018‑06‑18:
Why Skylake CPUs are sometimes 50% slower at highly threaded code: higher PAUSE latency.
- 2018‑06‑18:
'Like' is an infix now, which is un-like-believably innovative.
- 2018‑06‑18:
A brief history of the Erlang BEAM compiler.
- 2018‑06‑18:
Web Prolog: Erlang-style distributed concurrency in SWI-Prolog.
- 2018‑06‑18:
Fo: an experimental language that adds generics to Golang.
- 2018‑06‑17:
zapcc: a fork of clang that caches C++ template instantiations.
- 2018‑06‑16:
Functional baby talk: analysis of code fragments from novice Haskell programmers.
- 2018‑06‑16:
A new form of matter may lie just beyond the periodic table.
- 2018‑06‑15:
Visual methods of comparison, compared.
- 2018‑06‑15:
Unlocking intersection types with `var` in Java 10.
- 2018‑06‑15:
How ScyllaDB uses control theory to keep table compaction under control.
- 2018‑06‑15:
SigSpoof: Spoofing signatures in GnuPG, Enigmail, GPGTools, and python-gnupg.
- 2018‑06‑15:
LiteBSD: 4.4BSD for microcontrollers.
- 2018‑06‑15:
RetroBSD: Unix for microcontrollers.
- 2018‑06‑15:
Where do Rust threads come from?
- 2018‑06‑14:
Making key parts of the Ordnance Survey (OS) MasterMap freely available.
- 2018‑06‑14:
A convenient excuse: tech's discrimination problem.
- 2018‑06‑13:
Let's Encrypt adds random entries to the ACME directory to avoid protocol ossification.
- 2018‑06‑13:
The land before binary.
- 2018‑06‑13:
Automatic type coercions with procedural macros in Rust.
- 2018‑06‑12:
Enforcing TLS protocol invariants by rolling versions every six weeks.
- 2018‑06‑12:
I fear Google's control of the web.
- 2018‑06‑12:
Between the coats: a sensitivity read changed my life.
- 2018‑06‑12:
DasBetterC: converting make.c to D.
- 2018‑06‑12:
The legend of Old Man Henderson.
- 2018‑06‑11:
Golang refactoring : a 23x performance hunt.
- 2018‑06‑11:
Anders Hejlsberg on modern compiler construction. (YouTube)
- 2018‑06‑10:
slaacd: userland IPv6 interface autoconfiguration in OpenBSD.
- 2018‑06‑10:
Forget reusability, aim for perfection: New lessons from mandoc in OpenBSD.
- 2018‑06‑10:
xoshiro/xoroshiro random number generators and the PRNG shootout.
- 2018‑06‑10:
PCG: a family of better random number generators.
- 2018‑06‑10:
Minimalist C libraries.
- 2018‑06‑10:
pledge() and unveil() in OpenBSD.
- 2018‑06‑09:
San Francisco's project to build an open source paper-ballot voting system.
- 2018‑06‑09:
The power of pi: design patterns for dependently-types programming.
- 2018‑06‑08:
Living APIs, and the case for GraphQL.
- 2018‑06‑08:
A complete history of the Millennium Falcon.
- 2018‑06‑07:
New payments architecture: the next big innovation in UK banking.
- 2018‑06‑06:
Juno solves the 39-year-old mystery of Jupiter's lightning.
- 2018‑06‑06:
10 things Ryan Dahl regrets about node.js.
- 2018‑06‑06:
Some notes on high speed networking on PCs.
- 2018‑06‑05:
Attacks against machine learning: an overview.
- 2018‑06‑05:
"I'll take real toilet paper over standards any day, because at least that way I won't have splinters and ink up my arse." (Linus on C99 union type punning)
- 2018‑06‑05:
Nightmare.js: A high-level browser automation library based on Electron.
- 2018‑06‑05:
Observations from running 2 million headless browser sessions.
- 2018‑06‑05:
Zip slip: widespread directory traversal vulnerabilities in archive decompressers.
- 2018‑06‑05:
How to speed up the Rust compiler some more in 2018.
- 2018‑06‑05:
The anatomy of change: what we've learned from our gender bias workshop.
- 2018‑06‑04:
Sloc, cloc, and code: what happened on the way to the faster cloc.
- 2018‑06‑04:
What will the post-journal scientific publishing world look like?
- 2018‑06‑04:
Part spider, part scorpion creature found fossilized in amber.
- 2018‑06‑04:
BitHubLab: search three open source hosting platforms simultaneously.
- 2018‑06‑04:
A scope safe universe of syntaxes with binding, their semantics and proofs.
- 2018‑06‑03:
The human scalability of DevOps.
- 2018‑06‑03:
Women used to wear huge pockets like these under their petticoats.
- 2018‑06‑03:
Inside Firefox's DNS-over-HTTPS (DoH) engine.
- 2018‑06‑03:
CVE-2018-11235 git RCE write-up.
- 2018‑06‑03:
Quick and dirty PoC for git CVE-2018-11235.
- 2018‑06‑03:
String trepanation.
- 2018‑06‑03:
One year of C.
- 2018‑06‑03:
Cuntroversy: on reclaiming the C-word.
- 2018‑06‑03:
AI4Animation: quadruped animation in Unity3D using biologically-inspired deep learning.
- 2018‑06‑03:
The secrets of a diary written under the floorboards of a French château.
- 2018‑06‑03:
How Ireland beat dark ads in their abortion referendum.
- 2018‑06‑03:
China has turned Xinjiang into a police state like no other.
- 2018‑06‑03:
Catching up with sf writers at Nebula Con.
- 2018‑06‑02:
A 280-character active transport manifesto, unpacked.
- 2018‑06‑02:
It's 2018, and that means it's DMCA exemptions time again! EFF presents John Scalzi's story in support of the right to repair.
- 2018‑06‑02:
It's 2018, and that means it's DMCA exemptions time again! EFF presents Mur Lafferty's story in support of fair use of video.
- 2018‑06‑02:
It's 2018, and that means it's DMCA exemptions time again! EFF presents Cory Doctorow's story in support of jailbreaking.
- 2018‑06‑02:
Deep learning: a critical appraisal.
- 2018‑06‑02:
The academic / ISO view of the NSA Simon/Speck encryption algorithms.
- 2018‑06‑01:
Avoid under-prepared meetings.
- 2018‑06‑01:
Improving DNS privacy in Firefox with DNS-over-HTTPS (DoH).
- 2018‑06‑01:
IETF PRECIS and i18n. (successor to stringprep)
- 2018‑05‑31:
C standard undefined behaviour vs Wittgenstein.
- 2018‑05‑31:
When the dike breaks: dissecting DNS defenses during DDoS attacks.
- 2018‑05‑31:
Signed Integers are Two's Complement.
- 2018‑05‑31:
European Data Protection Board backs ban on 'cookie walls'.
- 2018‑05‑31:
Random Slicing: efficient and scalable data placement for large-scale storage systems.
- 2018‑05‑31:
I am a computer: gorgeous gifs of marvellous micros.
- 2018‑05‑31:
Golang gotcha: when nil != nil.
- 2018‑05‑31:
Ireland shows us how to run a referendum.
- 2018‑05‑30:
The diameter of the Rubik's Cube group is 20.
- 2018‑05‑30:
Hashlife: an algorithm for compressing space and time.
- 2018‑05‑30:
GDPR, China, and data sovereignty are ultimately wins for Amazon and Google.
- 2018‑05‑30:
Typed key pattern: using PhantomData to tie a string key to the type of its associated value.
- 2018‑05‑30:
Brian Eno on genius and "scenius".
- 2018‑05‑30:
The law of "fuck yes!" or "no".
- 2018‑05‑30:
Affine subscripts: strength reduction for array indexing in early Fortran.
- 2018‑05‑30:
A large collection of links on capability theory.
- 2018‑05‑30:
Introduction to the gfortran array descriptor / dope vector.
- 2018‑05‑30:
Why picture frames tilt forward.
- 2018‑05‑30:
Post-Spectre threat model re-think for Google Chrome.
- 2018‑05‑30:
Cautioning health-care professionals: bereaved persons are misguided through the "stages" of grief.
- 2018‑05‑29:
We will never find extraterrestrial life, because we will wipe it all out in a manner that is unintentional, yet horribly unavoidable.
- 2018‑05‑29:
A map of dogs of the world and their countries of origin.
- 2018‑05‑29:
The deceptively complex world of calendar events and RRULEs.
- 2018‑05‑29:
UTC is enough for everyone, right?
- 2018‑05‑29:
From npm to yarn and back again.
- 2018‑05‑29:
Remote code execution vulnerability in git (CVE 2018-11234 and CVE 2018-11235).
- 2018‑05‑29:
A comparison of adaptive radix trees and hash tables.
- 2018‑05‑29:
Revealing Internet latency clusters in Africa.
- 2018‑05‑29:
A new fast hash table.
- 2018‑05‑29:
So your startup received a nightmare GDPR letter...
- 2018‑05‑29:
Effectiveness of anonymization in double-blind peer review.
- 2018‑05‑29:
DNS flag day: stop working around broken EDNS servers after 2019-02-01.
- 2018‑05‑29:
When FFI function calls beat native C.
- 2018‑05‑28:
Cloud computing sticker shock is now a monthly occurrence at many companies.
- 2018‑05‑28:
The birth of a new American aristocracy.
- 2018‑05‑28:
Remember the Vasa! Endangering the future of C++?
- 2018‑05‑28:
Elon Musk is a modern Henry Ford. That's bad.
- 2018‑05‑28:
A map of station pubs.
- 2018‑05‑28:
NetBSD network stack security audit.
- 2018‑05‑28:
Evaluating the cost of atomic operations on modern CPU architectures.
- 2018‑05‑28:
Infographic: operation costs in CPU clock cycles.
- 2018‑05‑28:
What the world's fascination with nüshu, a female-only Chinese script, says about cultural appropriation.
- 2018‑05‑28:
Ditch your scumbag friend: a life hack for men who want to be feminists.
- 2018‑05‑28:
Invisible asymptotes, and strategic planning at Amazon.
- 2018‑05‑28:
Oracle plans to dump risky Java serialization, a "horrible mistake" from 1997.
- 2018‑05‑27:
Iterators vs. cursors: a case study in objects vs. values in Java.
- 2018‑05‑27:
Comparing the c ffi overhead on various programming languages.
- 2018‑05‑27:
Zero-overhead tree processing with the visitor pattern.
- 2018‑05‑26:
Versions of Han Solo's blaster already exist, and they're way more powerful than lightsabers would be.
- 2018‑05‑26:
The making of TANK. (YouTube)
- 2018‑05‑26:
TANK, by Stu Maschwitz. (YouTube)
- 2018‑05‑26:
Tube heartbeat.
- 2018‑05‑26:
The DisplayPort pin 20 problem.
- 2018‑05‑26:
Scientists are more efficient at producing high-quality research when they have more academic freedom.
- 2018‑05‑26:
Why media companies fear, and photographers love, this voracious copyright lawyer.
- 2018‑05‑26:
SmoothLife: Game of Life on a continuous domain in Python with Numpy.
- 2018‑05‑25:
Can we please talk about privacy, not GDPR, now?
- 2018‑05‑25:
prettier-emacs: Minor mode to format JS code when you save.
- 2018‑05‑25:
Prettier: an opinionated code formatter for JavaScript etc.
- 2018‑05‑25:
Black: an uncompromising Python code formatter.
- 2018‑05‑25:
Chasing missing SIGINT signals down the SSH rabbit hole.
- 2018‑05‑24:
A simple mental health pain scale.
- 2018‑05‑23:
Bill Gates: A platform is when the economic value of everybody that uses it exceeds the value of the company that creates it.
- 2018‑05‑23:
Don't use Hadoop: your data isn't that big.
- 2018‑05‑23:
Today Mac OS X is as old as Classic Mac OS was.
- 2018‑05‑23:
The end of an era: Saying goodbye to search.cpan.org, to be replaced by metacpan.org.
- 2018‑05‑23:
Deconstructing Kitty.
- 2018‑05‑22:
The EM-drive is a magnetic WTF-thruster.
- 2018‑05‑22:
Hidden sheep in the original Macintosh bitmap fonts.
- 2018‑05‑22:
snpm: a proof of concept to ensure consistency between NPM packages and their source code.
- 2018‑05‑22:
Simple compile-time prevention of SQL injection in Rust.
- 2018‑05‑22:
Finding a Google App Engine RCE bug.
- 2018‑05‑22:
Playing battleships over BGP.
- 2018‑05‑22:
Various ways to disable stdio buffering from the command line.
- 2018‑05‑22:
Happy 21st Century!
- 2018‑05‑20:
Lafable: large agile framework appropriate for big lumbering enterprises.
- 2018‑05‑20:
Twitter for Academics 101.
- 2018‑05‑20:
What do we mean when we say "show the thing"?
- 2018‑05‑20:
A guide to agile communication.
- 2018‑05‑20:
Inside the 76477 Space Invaders sound effect chip: digital logic implemented with I2L.
- 2018‑05‑20:
Datalog and emerging applications: a tutorial.
- 2018‑05‑20:
Datafrog: a relatively simple Datalog engine used for Rust's borrow checker.
- 2018‑05‑19:
Hippos crap so much that sometimes all the fish die.
- 2018‑05‑19:
Five whys and the cult of the root cause.
- 2018‑05‑19:
Was early modern writing paper expensive?
- 2018‑05‑19:
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks.
- 2018‑05‑19:
GDPR hysteria: don't panic.
- 2018‑05‑19:
Seven steps to solve any dynamic programming interview problem.
- 2018‑05‑19:
NumWorks open hardware calculator teaches us about quality documentation.
- 2018‑05‑19:
Sweden cancels Elsevier contract as open-access dispute spreads.
- 2018‑05‑19:
Performance impact of removing Ruby out-of-band garbage collection at GitHub.
- 2018‑05‑19:
Introducing Git protocol version 2.
- 2018‑05‑18:
Towards built-in sharding for PostgreSQL.
- 2018‑05‑17:
Was the Efail disclosure horribly screwed up?
- 2018‑05‑17:
Reddit's redesign increases power usage of our devices by 68GW per month.
- 2018‑05‑17:
Painting by numbers: visualizing IP addressing plans.
- 2018‑05‑17:
Unique IPv6 prefix per host.
- 2018‑05‑17:
"We don't need IPv6".
- 2018‑05‑17:
IPv6 excuse bingo.
- 2018‑05‑16:
isomorphic-git: a JavaScript implementation of git for node.js and web browsers.
- 2018‑05‑16:
The spectacular power of Big Lens.
- 2018‑05‑16:
Lightweight CML-style concurrency in Lua for Snabb.
- 2018‑05‑16:
Fragmented IPv6 router advertisement handling on different operating systems.
- 2018‑05‑16:
Towards IPv6 only: A large scale RFC 7596 lw4o6 deployment for broadband users.
- 2018‑05‑16:
Lightweight 4over6: one step further for dual-stack lite networks.
- 2018‑05‑16:
Is large-scale DNS over TCP practical?
- 2018‑05‑16:
nom 4.0: faster, safer, simpler parsers in Rust.
- 2018‑05‑16:
Has wine gone bad?
- 2018‑05‑15:
Filling in PDF forms from the Linux command line.
- 2018‑05‑15:
John Regehr's software engineering course.
- 2018‑05‑15:
A job building software to kill people, but don't get distracted by that.
- 2018‑05‑15:
The collateral damage of Internet censorship by DNS injection.
- 2018‑05‑15:
Humans killed off the megafauna.
- 2018‑05‑15:
How copyright law hides work like Zora Neale Hurston's new book from the public.
- 2018‑05‑15:
apgdiff: another PostgreSQL diff tool.
- 2018‑05‑15:
pgquarrel: compare PostgreSQL database schemas, and emit SQL DDL representing the diff.
- 2018‑05‑15:
EveryRFC: an RFC search engine.
- 2018‑05‑15:
Drawables, reparenting, compositing, etc. in X11.
- 2018‑05‑14:
Joan Taylor's tilings.
- 2018‑05‑14:
The Taylor-Socolar aperiodic tile.
- 2018‑05‑14:
Is there a fix for impostor syndrome?
- 2018‑05‑14:
Why "Agile" and especially Scrum are terrible.
- 2018‑05‑14:
How a Rust upgrade more than tripled the speed of some multiprecision arithmetic.
- 2018‑05‑14:
Measuring DNS ATR, additional truncated responses.
- 2018‑05‑14:
Who invented the computer? The debate from the viewpoint of computer architecture.
- 2018‑05‑13:
Performance experiments with matrix multiplication in Rust.
- 2018‑05‑13:
GDPR will pop the adtech bubble.
- 2018‑05‑13:
Visualizing Thameslink-related changes to rail services.
- 2018‑05‑13:
The libtom projects: cryptography and multiprecision arithmetic.
- 2018‑05‑12:
Microsoft Windows command line reference manual.
- 2018‑05‑12:
Git submodules revisited.
- 2018‑05‑12:
Clang++ `[[trivial_abi]]` 101.
- 2018‑05‑12:
The PostgreSQL "shared_buffers smile" performance trough.
- 2018‑05‑12:
Tesla's giant battery in Australia reduced grid service cost by 90%.
- 2018‑05‑11:
Pyre: fast static type checking for Python.
- 2018‑05‑11:
First, let's fire all the managers.
- 2018‑05‑11:
Tech's two philosophies.
- 2018‑05‑11:
Mermaid: a Markdown-like language for generating charts from text with Javascript.
- 2018‑05‑11:
Generating SQL syntax railroad diagrams using Tcl/Tk.
- 2018‑05‑10:
Working LEGO pinball machine built from 15,000 bricks features Benny in all his Classic Space glory.
- 2018‑05‑10:
The importance of time synchronization in the FOAM proof-of-location protocol.
- 2018‑05‑10:
Scientists stuffed a crocodile Into an MRI machine to see if it likes Bach.
- 2018‑05‑09:
Modern garbage collection vs golang's GC strategy.
- 2018‑05‑08:
The Honeyman idiom: `sort | uniq -c | sort -rn`.
- 2018‑05‑08:
Choosing fonts for complex data.
- 2018‑05‑08:
As easy as 1,2,3: how the Indian decimal place system came to Europe.
- 2018‑05‑07:
Concorde 'B'.
- 2018‑05‑07:
Are you in a bullshit job? In academia, you're hardly alone.
- 2018‑05‑07:
American energy use, in one diagram.
- 2018‑05‑07:
Thermal paper Polaroid camera.
- 2018‑05‑07:
Against trendism: how to defang the social media disinformation complex.
- 2018‑05‑06:
SUE the T. Rex is a nonbinary icon.
- 2018‑05‑06:
Lessons learned from the .SE DNSSEC algorithm rollover.
- 2018‑05‑06:
The quadratic equation and low-precision arithmetic.
- 2018‑05‑06:
Grass: an esoteric programming language based on A-normalized, lambda lifted, De Bruijn indexed, untyped lambda calculus.
- 2018‑05‑06:
Denotational design: API refinement by following a denotation.
- 2018‑05‑06:
Oracle Access Manager's identity crisis. (Padding oracle attack!)
- 2018‑05‑05:
Troubled times for alternatives to Einstein's theory of gravity.
- 2018‑05‑05:
The epic mistake about manufacturing that's cost Americans millions of jobs.
- 2018‑05‑05:
Establishing identity without certification authorities. (1996)
- 2018‑05‑05:
How to be a systems thinker.
- 2018‑05‑05:
Understanding OAuth 2.0 and OpenID Connect.
- 2018‑05‑05:
6 things I've learned in my first 6 months using serverless.
- 2018‑05‑04:
Google embraces, extends, and extinguishes.
- 2018‑05‑04:
Open sourcing BBC R&D's Mellanox kernel bypass work.
- 2018‑05‑03:
Yubikey/Smartcard backed TLS servers.
- 2018‑05‑03:
7-Zip: from uninitialized memory to remote code execution.
- 2018‑05‑03:
Where does the money go when you buy a domain name?
- 2018‑05‑03:
Hominin head-scratcher: who butchered this rhino 709,000 years ago?
- 2018‑05‑02:
PostgreSQL's fsync() surprise.
- 2018‑05‑02:
Rust in production.
- 2018‑05‑02:
Surveying the new optical form factors for 400 gigabit Ethernet.
- 2018‑05‑02:
Python startup is too slow.
- 2018‑05‑02:
WS-* web services standards overview.
- 2018‑05‑02:
Morse code in the music.
- 2018‑05‑02:
Efficient float32 arithmetic in JavaScript on Firefox.
- 2018‑05‑02:
When the C compiler bites.
- 2018‑05‑02:
Into the depths of C: elaborating the de facto standards.
- 2018‑05‑02:
A Bayesian statistical solution to discrepancies in the Hubble constant.
- 2018‑05‑02:
Linux /dev/random flaws.
- 2018‑05‑02:
7 inexcusable yet common UX gaffes that make you look like a total amateur.
- 2018‑05‑01:
C is not a low-level language.
- 2018‑05‑01:
KRust: a formal executable semantics of Rust.
- 2018‑04‑30:
A history of what we do in the dark.
- 2018‑04‑30:
The Scylla DB I/O scheduler: better latencies under any circumstance.
- 2018‑04‑30:
How to speed up the Rust compiler in 2018.
- 2018‑04‑28:
How to refactor a monolithic codebase.
- 2018‑04‑28:
Scaling a high-traffic rate limiting service with Redis Cluster.
- 2018‑04‑26:
Titus: the Netflix container management platform.
- 2018‑04‑26:
On incomplete HTTP reads and the requests library in Python.
- 2018‑04‑25:
Notes on structured concurrency, or: Go statement considered harmful.
- 2018‑04‑25:
One giant leap for SQL: MySQL 8.0 released.
- 2018‑04‑25:
Magna charta universitatum: the Bologna declaration.
- 2018‑04‑25:
GLib/GIO async operations and Rust futures + async/await.
- 2018‑04‑24:
Delta pointers: buffer overflow checks without the checks.
- 2018‑04‑24:
What you get is what you C: Controlling side effects in mainstream C compilers.
- 2018‑04‑24:
Statically typed PostgreSQL queries and TypeScript schemats.
- 2018‑04‑24:
Web security for single page applications: great impact with little effort.
- 2018‑04‑23:
Union types in Facebook's Flow and Reason programming languages.
- 2018‑04‑23:
Computer science faces an ethics crisis. The Cambridge Analytica scandal proves it.
- 2018‑04‑23:
On user interface development: appending to the event log. (React/Redux)
- 2018‑04‑23:
Ask me first: What self-assessments can tell us about autism.
- 2018‑04‑23:
A look at JWT vulnerabilities and mitigations.
- 2018‑04‑22:
Why is the Linux kernel replacing iptables with BPF?
- 2018‑04‑22:
Error handling advice for node.js programmers.
- 2018‑04‑21:
Untangling Khan Academy's Python code.
- 2018‑04‑20:
Statically typed data validation with JSON Schema and TypeScript.
- 2018‑04‑19:
io-ts: both static and dynamic type checking for JSON API data in TypeScript.
- 2018‑04‑19:
The quest for the next billion-dollar colour.
- 2018‑04‑19:
A lesson in wifi antenna engineering from the Raspberry Pi.
- 2018‑04‑19:
Important flatland research: day and night on the Dymaxion map.
- 2018‑04‑19:
What's the length of shortest bit sequence that's never been sent over the Internet?
- 2018‑04‑18:
San Francisco's big seismic gamble.
- 2018‑04‑18:
Mitigating data movement bottlenecks by processing in memory, for a 50% performance boost.
- 2018‑04‑17:
The C++ committee has taken off its backwards-compatibility ball and chain.
- 2018‑04‑17:
For mathematicians, = does not mean equality.
- 2018‑04‑17:
Parsing: a timeline.
- 2018‑04‑17:
Roman numerals: A familiar set with an unexpected order type.
- 2018‑04‑17:
D3.js in depth.
- 2018‑04‑16:
The long, incredibly tortuous, and fascinating process of creating a Chinese font.
- 2018‑04‑16:
DNS timeline.
- 2018‑04‑16:
Zuckerberg can't blame Cambridge University for Facebook's privacy violations.
- 2018‑04‑16:
Jupyter, Mathematica, and the future of the research paper.
- 2018‑04‑16:
Programming languages and empiricism.
- 2018‑04‑16:
How could we tell if there was a civilization on Earth before Humans?
- 2018‑04‑13:
tdns: a teaching authoritative DNS server, written from scratch in 1100 lines of code.
- 2018‑04‑13:
An introduction to PostgreSQL materialized views.
- 2018‑04‑13:
Post-quantum confidentiality for TLS.
- 2018‑04‑13:
A taxonomy of technical debt.
- 2018‑04‑12:
lua-protobuf: Lua support for Google's protocol buffers.
- 2018‑04‑12:
protobuf-lua: Lua protobuf library and proton output plugin.
- 2018‑04‑12:
lua-protobuf: A Lua module to work with Google protobuf.
- 2018‑04‑11:
protozero: minimalist protobuf decoder and encoder in C++.
- 2018‑04‑11:
prototool: a Swiss army knife for protobufs.
- 2018‑04‑11:
Do you have too many microservices? Five design attributes that can help.
- 2018‑04‑10:
Sequoia: OpenPGP implemented in Rust.
- 2018‑04‑10:
Construction begins on new "lowboom" quiet supersonic NASA X-Plane.
- 2018‑04‑09:
fadvise(DONTNEED): another reason why your Docker containers may be slow
- 2018‑04‑09:
Next generation video codec: introducing AV1.
- 2018‑04‑09:
Consistent hashing: algorithmic tradeoffs:
- 2018‑04‑09:
Preliminary analysis of a Site Reliability Engineer (SRE) survey.
- 2018‑04‑08:
Hash-based signatures: an illustrated primer.
- 2018‑04‑08:
TDOP / Pratt parser in pictures.
- 2018‑04‑08:
Turning a MacBook into a touchscreen with $1 of hardware.
- 2018‑04‑08:
A list of command line tools for manipulating structured text: json, xml, yaml, ini, etc.
- 2018‑04‑07:
Looking back at ten years of availability zone compartmentalization at AWS.
- 2018‑04‑07:
AlterEgo: a personalized wearable silent speech interface.
- 2018‑04‑07:
The role of cellular networks in the Internet.
- 2018‑04‑06:
PubGrub: a version solving algorithm for Dart's package manager.
- 2018‑04‑06:
How did we end up with containers?
- 2018‑04‑06:
The secret life of NaN: an intro to a boxed value hack for dynamic languages.
- 2018‑04‑06:
The scientific paper is obsolete. Jupyter is what's next.
- 2018‑04‑06:
Several cool features in git 2.17.
- 2018‑04‑04:
Fifty or sixty years of processor development and the end of performance scaling.
- 2018‑04‑04:
DNSSD roadmap: an overview of DNS-based service discovery.
- 2018‑04‑04:
Intersecting polygons: A geometric Rust adventure.
- 2018‑04‑03:
Reliable setproctitle() for Linux containers.
- 2018‑04‑03:
"I'm a female chef. Here's how my restaurant dealt with harassment from customers."
- 2018‑04‑03:
"If the Financial Times were a person, it would be a man." Here's how the paper is trying to change that.
- 2018‑04‑03:
The end-to-end back-pressure mechanism inside Wallaroo and Ponylang.
- 2018‑04‑03:
A Linux kernel memory model!
- 2018‑04‑03:
Swedes turn against cashlessness: a fully digital system is vulnerable to fraud and attack.
- 2018‑04‑03:
It is weirdly hard to steal Mark Zuckerberg's trash.
- 2018‑04‑03:
MesaLink: a memory-safe and OpenSSL-compatible TLS library.
- 2018‑04‑03:
On the hunt for the lost wonders of medieval Britain.
- 2018‑04‑03:
How 'Oumuamua got shredded.
- 2018‑04‑02:
Techniques of Twitter trolls that support the Kremlin: "dismiss, distort, distract, dismay."
- 2018‑04‑01:
tinydoh: minimal Golang DNS-over-HTTPS server.
- 2018‑04‑01:
You can't Rust that.
- 2018‑04‑01:
The joy of max(): Linux C macro hackery.
- 2018‑03‑31:
Seventy maxims of maximally effective mercenaries.
- 2018‑03‑31:
Antisemitism matters: Jews are the canary in the coalmine.
- 2018‑03‑31:
A walk round the Festival of Britain.
- 2018‑03‑31:
DNS RFC dependency graph.
- 2018‑03‑30:
De-Google-ify the Internet.
- 2018‑03‑30:
How not to make claims about genetic differences between races.
- 2018‑03‑30:
Amethyst: a tiling window manager for Mac OS X.
- 2018‑03‑30:
IETF 101 highlights.
- 2018‑03‑30:
Ferrofluid 'font' produces trippy, one-of-a-kind art.
- 2018‑03‑30:
The evolution of 15,596 documented unix facilities.
- 2018‑03‑30:
Cassina: the forgotten drink that caffeinated North America for centuries.
- 2018‑03‑29:
CHIVES: an old DNS server.
- 2018‑03‑29:
Jeeves: the first DNS server.
- 2018‑03‑29:
Golang proposal: non-cooperative goroutine preemption.
- 2018‑03‑29:
Hello, and welcome to DNS!
- 2018‑03‑29:
Junk traffic to 1.0.0.0/8.
- 2018‑03‑29:
Dragonfly: an optical telescope built from an array of off-the-shelf Canon lenses.
- 2018‑03‑29:
Hubble finds first galaxy in the local Universe without dark matter.
- 2018‑03‑29:
Detecting integer constant expressions in C macros.
- 2018‑03‑29:
Securing the Kubernetes dashboard.
- 2018‑03‑29:
How I erased 5000+ Facebook comments and likes.
- 2018‑03‑28:
Total Meltdown? Windows "fix" opens read/write access to all memory.
- 2018‑03‑28:
Crowdfunding the Mitogen Ansible accelerator: day 23.
- 2018‑03‑28:
Making IXFR small again.
- 2018‑03‑28:
Finding alternative music scales.
- 2018‑03‑28:
Just one QUIC bit.
- 2018‑03‑27:
Security keys, web authentication, U2F, and CTAP.
- 2018‑03‑27:
"It all made sense when we found out we were autistic".
- 2018‑03‑27:
Ditching a bunch of stuff and moving to Emacs and org-mode.
- 2018‑03‑27:
How to disable all of Windows 10's built-in advertising.
- 2018‑03‑26:
Job's BGP camel RFC metrics viewer.
- 2018‑03‑26:
The Isle of Wight's railway is having trouble replacing its ex-tube rolling stock.
- 2018‑03‑26:
Mapping OpenSSL cipher suite names to RFC names.
- 2018‑03‑26:
Tracing stolen bitcoin, using a precedent from 1816.
- 2018‑03‑26:
We need to go deeper: Meltdown and Spectre flaws will force security further down the stack.
- 2018‑03‑26:
Privacy International's history with web site security and what they do now.
- 2018‑03‑26:
Numbers and strings in JSON and Perl.
- 2018‑03‑25:
What men need to know (and women need to tell them) about working together.
- 2018‑03‑25:
Queen Mary's dollhouse and the lost Vita Sackville-West children's story that may have inspired Virginia Woolf's 'Orlando'.
- 2018‑03‑25:
The rebel bank, printing its own notes and buying back people's debts.
- 2018‑03‑25:
You could have invented monads! (And maybe you already have.)
- 2018‑03‑25:
Fredkin's Paradox.
- 2018‑03‑25:
Non-Google searchable Usenet archives.
- 2018‑03‑25:
A quick guide to federated social networks.
- 2018‑03‑24:
Bert's DNS camel RFC metrics viewer.
- 2018‑03‑24:
Recounting the rationals: twice!
- 2018‑03‑24:
Managing db schema changes without downtime in Rails.
- 2018‑03‑24:
New research suggests new ways to nurture gifted children.
- 2018‑03‑24:
Latrines: how Bangladesh vanquished diarrhoea.
- 2018‑03‑24:
Chernoff faces: how do we kill bad ideas in visualization?
- 2018‑03‑24:
Facebook's surveillance machine.
- 2018‑03‑24:
How genetics is changing our understanding of race.
- 2018‑03‑24:
How the chili spread from its South American home and spiced up world cuisine.
- 2018‑03‑24:
A cheap, brief "growth mindset" intervention shifted struggling students onto a more successful trajectory.
- 2018‑03‑24:
The myth of the male bumbler.
- 2018‑03‑24:
Lara Croft lives dangerously in this amazing animated Tomb Raider LEGO diorama! (video)
- 2018‑03‑24:
How to find things to work on? Look for the duct tape.
- 2018‑03‑23:
Shkreli vs. Holmes: two frauds, two divergent outcomes. Were they fair?
- 2018‑03‑23:
What roots do DNS resolvers use? // Top NXDOMAINs to the IANA root.
- 2018‑03‑23:
A wild IPv6 attack appears! Open DNS resolvers on IPv6.
- 2018‑03‑23:
Recommendations for engineering authoritative DNS servers.
- 2018‑03‑23:
Whither deprecating TCP-MD5?
- 2018‑03‑23:
Developing DNS-over-HTTPS clients and servers at the IETF101 hackathon.
- 2018‑03‑23:
A "tamper-proof" cryptocurrency wallet just got backdoored by a 15-year-old.
- 2018‑03‑23:
AssembleAR: a mock-up Ikea manual of the future looks amazing.
- 2018‑03‑23:
The machine learning reproducibility crisis.
- 2018‑03‑22:
The DNS camel: the relentless rise in protocol complexity.
- 2018‑03‑22:
How to write seemingly unhygienic and referentially opaque Scheme macros with syntax-rules.
- 2018‑03‑22:
Arbitrarily reorderable items in PostgreSQL.
- 2018‑03‑22:
Fractions in The Farey Sequences and the Stern-Brocot Tree.
- 2018‑03‑22:
Peer review: the end of an error?
- 2018‑03‑22:
How hard is it to get a cartoon Into the New Yorker?
- 2018‑03‑22:
How US nuclear force modernization is undermining strategic stability: The burst-height compensating super-fuze.
- 2018‑03‑21:
Project Nimble: faster AWS region evacuation.
- 2018‑03‑21:
Ten reasons why not to like Golang.
- 2018‑03‑21:
Network Architecture Tester: a gift for outgoing IAB members based on a Raspberry Pi running open source software.
- 2018‑03‑21:
ISC Kea and NETCONF in 2018: towards automated configurability.
- 2018‑03‑21:
A guide to writing a DNS server from scratch in Rust (complete with classic name decompression DOS vulnerability).
- 2018‑03‑21:
Type-directed metaprogramming in Rust.
- 2018‑03‑21:
Child abuse imagery found within bitcoin's blockchain.
- 2018‑03‑21:
Pre-publication peer review subtracts value.
- 2018‑03‑20:
Mediaeval helpdesk.
- 2018‑03‑20:
Breaking a wine glass in Python by detecting the resonant frequency.
- 2018‑03‑20:
Exercises in Programming Style.
- 2018‑03‑20:
ABA: always be automating, because manual work is a bug.
- 2018‑03‑19:
Real world DNSSEC+DANE for secure inter-domain mail transport.
- 2018‑03‑19:
Level 3 technician's misstep causes largest telephone outage ever reported.
- 2018‑03‑18:
The Northern Lights as seen from a U-2 at 70,000 feet.
- 2018‑03‑18:
Booting Windows NT 4 on a DEC Multia.
- 2018‑03‑18:
Why inheritance never made any sense.
- 2018‑03‑16:
WebKit's protection against HSTS supercookie abuse.
- 2018‑03‑16:
I watched all 629 episodes of The Simpsons in a month. Here's what I learned.
- 2018‑03‑16:
Usability improvements in GCC 8.
- 2018‑03‑16:
How PostgreSQL just might replace your Oracle database.
- 2018‑03‑15:
The surprising creativity of digital evolution: anecdotes from evolutionary computation and artificial life research.
- 2018‑03‑15:
Kickstarting free software: getting financial support for the Mitogen Ansible accelerator.
- 2018‑03‑15:
Ephemeris time vs universal time: two kinds of time, two kinds of time scale. (1954)
- 2018‑03‑15:
Physicists still don't know what puts the curl in curling.
- 2018‑03‑15:
Intel's Spectre and Meltdown mitigation plans.
- 2018‑03‑15:
Evaluation and consideration of multiple answers in one DNS response.
- 2018‑03‑15:
The German Society of Auto-Correction.
- 2018‑03‑15:
All tease, no tale: Hollywood's misplaced lady lands.
- 2018‑03‑15:
A look at a comic that touched on everything that makes Batman great.
- 2018‑03‑15:
Poetic License: 3-clause BSD in rhyme.
- 2018‑03‑15:
Why is OOF an OOF and not an OOO?
- 2018‑03‑15:
Decoding the Signals in the Prime Minister's speech on the Russian poisoning of Sergei Skripal.
- 2018‑03‑15:
Canopy: Facebook's end-to-end performance tracing and analysis system.
- 2018‑03‑14:
All disk galaxies rotate once every billion years.
- 2018‑03‑14:
What PostgreSQL full-text search has to do with VACUUM.
- 2018‑03‑14:
Why the UCU strike matters.
- 2018‑03‑14:
The 'Badass Army' is training revenge porn victims to fight back.
- 2018‑03‑14:
The chemicals used to make bacon do cause cancer. So how did the meat industry convince us it was safe?
- 2018‑03‑13:
Scaling up with Google Kubernetes Engine: a review after 6 months in production.
- 2018‑03‑13:
Building Windows: 4 million commits, 10 million work items.
- 2018‑03‑13:
What's left to do after your open source project is done.
- 2018‑03‑13:
Siccar Point: the cliff that changed our understanding of time.
- 2018‑03‑13:
A recreation of late 13th - 14th c. unhopped English ales.
- 2018‑03‑13:
Attacking Merkle trees with a second preimage attack.
- 2018‑03‑13:
How we built our PostgreSQL cluster in a box using Patroni.
- 2018‑03‑12:
How a book warehouse is changing Columbia's library system.
- 2018‑03‑12:
Migrating from MariaDB Galera to PostgreSQL and Patroni.
- 2018‑03‑12:
The magic (and maths) of skating on thin ice without falling in.
- 2018‑03‑12:
API versioning and evolution with proxies.
- 2018‑03‑12:
OMG-WTF-8: optimized matching generalized wobbly transformation format (8-bit).
- 2018‑03‑12:
Why museum professionals need to talk about Black Panther.
- 2018‑03‑12:
Transgender men see sexism from both sides.
- 2018‑03‑12:
Virtual private networks with WireGuard.
- 2018‑03‑12:
Enduring file references in macOS.
- 2018‑03‑12:
The KK Computer: a radical 6502 extension.
- 2018‑03‑12:
Slack's bait-and-switch.
- 2018‑03‑12:
Rogue GPL enforcement: Linux beats legal threat from one of its own developers.
- 2018‑03‑12:
Saturated fat does not clog the arteries: coronary heart disease is a chronic inflammatory condition.
- 2018‑03‑11:
Secure access to 100 AWS accounts.
- 2018‑03‑11:
Avoid nonreferential this.
- 2018‑03‑11:
Rainbow deploys with Kubernetes.
- 2018‑03‑11:
How to change the course of human history (at least, the part that's already happened).
- 2018‑03‑11:
Secret management design decisions: theory plus an AWS example.
- 2018‑03‑11:
A huge WhatsApp leak reveals the full fury of the Tories' Brexit split.
- 2018‑03‑11:
The enemy within: Gut bacteria drive autoimmune disease.
- 2018‑03‑11:
Fountain pen inks: the good, the bad, and the ugly.
- 2018‑03‑11:
The three mistakes of centrism.
- 2018‑03‑11:
How Wikipedia chose the image for the 'Human' entry.
- 2018‑03‑11:
Literate DevOps with Emacs org-mode.
- 2018‑03‑11:
Master password in Firefox or Thunderbird uses a very weak KDF.
- 2018‑03‑11:
Will the quantum nature of gravity finally be measured?
- 2018‑03‑10:
This CPU instruction set architecture tastes like microarchitecture.
- 2018‑03‑10:
Analyzing and mitigating privacy with the DNS root service.
- 2018‑03‑10:
How well does DNS ATR (additional truncated responses) work around dropped UDP fragments?
- 2018‑03‑10:
Is vitamin D really a cure-all? And how should we get our fix?
- 2018‑03‑10:
Staying awake: the surprisingly effective way to treat depression.
- 2018‑03‑10:
Tell me everything about that guy who died on your show.
- 2018‑03‑10:
Britain's Serious Fraud Office is getting too good at its job.
- 2018‑03‑09:
The quantum thermodynamics revolution.
- 2018‑03‑09:
Are the IETF unreasonable cryptography zealots?
- 2018‑03‑09:
UK faces €2 billion EU tab for China customs fraud.
- 2018‑03‑09:
Tex-Mex is the most important, least understood regional cuisine in America.
- 2018‑03‑09:
Year-round daylight saving time? Florida says yes, but It's not so simple.
- 2018‑03‑08:
The curious case of the crippling DS record.
- 2018‑03‑08:
Measuring efficiency of DNSSEC negative answer synthesis (RFC 8198).
- 2018‑03‑08:
DNSSEC for a large enterprise.
- 2018‑03‑08:
Why DNSFilter replaced InfluxDB with TimescaleDB.
- 2018‑03‑08:
The Rubik's contraption solves a cube in 0.38 seconds.
- 2018‑03‑08:
Elementary knightship found in Conway's Life: a travelling pattern with a new slope.
- 2018‑03‑08:
The uniquely versatile stinkbug is decimating crops and infiltrating houses all across the USA.
- 2018‑03‑08:
3D lightning calculated from two simultaneous photographs.
- 2018‑03‑08:
Accidentally two photographs of the same scene taken at the same millisecond.
- 2018‑03‑08:
The left hand of equals: object oriented equality in the Grace programming language.
- 2018‑03‑07:
Let's Encrypt: securing the automation of ACME DNS challenge validation.
- 2018‑03‑07:
Much ado about latency: Mitogen and the BFG9000 of import hooks.
- 2018‑03‑07:
Quadrupling Ansible performance with Mitogen.
- 2018‑03‑07:
Why Rust has macros.
- 2018‑03‑07:
Supermassive black holes or their galaxies: which came first?
- 2018‑03‑07:
Prototype to production: Building your first PCB prototype.
- 2018‑03‑07:
bsdnt: a BSD licensed bignum library.
- 2018‑03‑07:
BFG repo-cleaner: a faster `git filter-branch`, written in Scala.
- 2018‑03‑07:
The male glance: how we approach male vs. female work is ruining our ability to see good art.
- 2018‑03‑07:
How self-aware are people, really, according to science?
- 2018‑03‑07:
Dayton Miller's experiment to "prove" the theory of relativity incorrect.
- 2018‑03‑07:
Tiangong-1 reentry updates / latest predictions.
- 2018‑03‑07:
Tiangong-1 destructive re-entry frequently asked questions.
- 2018‑03‑07:
A malicious vehicle can block "smart" intersections in the USA.
- 2018‑03‑07:
Ten zombie statistics.
- 2018‑03‑07:
I'm a Sinn Féin MP. This is why I won't go to Westminster, even over Brexit.
- 2018‑03‑07:
Surprise graphene discovery could unlock secrets of superconductivity.
- 2018‑03‑07:
Exploiting Exim CVE-2018-6789: one byte buffer overflow leads to remote code execution.
- 2018‑03‑07:
Exploiting hash collisions, by Ange Albertini.
- 2018‑03‑06:
libbf: Fabrice Bellard's big float library.
- 2018‑03‑06:
The default TV settings aren't necessarily the best.
- 2018‑03‑06:
The evolution of distributed systems management.
- 2018‑03‑06:
How generics were added to .NET and C#.
- 2018‑03‑06:
The mystery of the slow downloads.
- 2018‑03‑06:
Why the investor class hates pensions.
- 2018‑03‑06:
ebtree: elastic binary trees. (Like embedded crit-bit trees.)
- 2018‑03‑06:
Progressive locks: fast, upgradable read/write locks.
- 2018‑03‑06:
The great lightbulb conspiracy.
- 2018‑03‑06:
World-first firing of air-breathing electric thruster for very low orbit satellites.
- 2018‑03‑06:
zheap: a new storage engine for PostgreSQL to provide better control over bloat.
- 2018‑03‑06:
git-sizer: is your Git repository bursting at the seams?
- 2018‑03‑05:
A RocksDB backend for Apache Cassandra, with a 10x reduction in tail latency.
- 2018‑03‑05:
Rendering in camera space(ish), to avoid floating point precision problems.
- 2018‑03‑05:
The result of placing a camera lens 300 feet from a rocket launch.
- 2018‑03‑05:
Understanding and overcoming coder's block.
- 2018‑03‑05:
Practical tips for cheating at design: improving your designs with tactics instead of talent.
- 2018‑03‑05:
Representing impractical and impossible types with Java 10 "var".
- 2018‑03‑05:
Spooky action at a distance: how an AWS outage broke a service that's not hosted in AWS.
- 2018‑03‑04:
How will "Enterprise Blockchain" change the way future enterprise applications are architected?
- 2018‑03‑04:
Italy's present is the future of politics.
- 2018‑03‑04:
Constructing human-grade parsers.
- 2018‑03‑04:
March is endometriosis awareness month.
- 2018‑03‑04:
Exploring the Chomsky hierarchy, the linguistics behind regular expressions.
- 2018‑03‑04:
Updated PostgreSQL Meltdown benchmarks.
- 2018‑03‑04:
Three girls, a dead raccoon, and a crockpot: how to clean up a skeleton.
- 2018‑03‑04:
Scotland's floating wind farm is showing how powerful offshore wind can be.
- 2018‑03‑04:
How not to be a crank: ten rules for not being a science-dick.
- 2018‑03‑04:
SlimerJS: a replacement for PhantomJS using recent Firefox.
- 2018‑03‑04:
The world of Linux handhelds in 2018.
- 2018‑03‑03:
The first unified calendar and the invention of world history.
- 2018‑03‑03:
GDPR: a practical guide for developers.
- 2018‑03‑03:
Postmortem: performance issues and failures in Microsoft Visual Studio Team Services.
- 2018‑03‑03:
Experience designing and building gRPC services.
- 2018‑03‑03:
50 shades of Go: traps, gotchas, and common mistakes for new Golang devs.
- 2018‑03‑03:
Let's make the Emacs GC safe and iterative.
- 2018‑03‑03:
Sortix: a small self-hosting operating-system aiming to be a clean and modern POSIX implementation.
- 2018‑03‑03:
Joy veh! What makes Jewish comedy Jewish?
- 2018‑03‑03:
khwasan: kernel hardware assisted address sanitizer for arm64.
- 2018‑03‑03:
10 years ago, the Internet gave us "mansplain". A woman explains why it still matters.
- 2018‑03‑02:
Firefox configuration guide for privacy freaks and performance buffs.
- 2018‑03‑02:
Mac OS versus FreeBSD: a comparative evaluation.
- 2018‑03‑02:
Billions of birds migrate. Where do they go?
- 2018‑03‑02:
What happens to us does not happen to most of you.
- 2018‑03‑02:
What to expect when you decide to migrate from Javascript to Typescript.
- 2018‑03‑01:
Nominet's proposed GDPR whois policy.
- 2018‑03‑01:
Clay codes: moulding MDS codes to yield an MSR code; optimal erasure coding for Ceph.
- 2018‑03‑01:
Review: Coding Freedom by E. Gabriella Coleman.
- 2018‑03‑01:
gitleaks: search full repo history for secrets and keys.
- 2018‑02‑28:
Peace for Triple Piano.
- 2018‑02‑28:
SIDN says DNSSEC validation errors can be eliminated.
- 2018‑02‑28:
Do TLS X.509 certificate warranties protect you? As much as rocks keep tigers away...
- 2018‑02‑28:
Rust status on Debian on various CPU architectures.
- 2018‑02‑28:
Typestates in Rust.
- 2018‑02‑28:
Most images of black holes are illustrations. Here's what our telescopes actually capture.
- 2018‑02‑28:
On the nature of wine.
- 2018‑02‑27:
SAML vulnerabilities affecting multiple implementations, due to inconsistent XML canonicalization.
- 2018‑02‑27:
Beautiful folds in Haskell.
- 2018‑02‑27:
Carte complète du SNCF réseau ferré français en 2017.
- 2018‑02‑27:
Typescript : class vs interface.
- 2018‑02‑27:
Why enterprise agile teams fail.
- 2018‑02‑27:
The unavailable Linux server: when TLS certificate validation fails.
- 2018‑02‑27:
O API: an alternative to REST.
- 2018‑02‑27:
Usenet, authentication, and engineering: early design decisions for Usenet.
- 2018‑02‑27:
PostgreSQL internals: avoid error context stack corruption.
- 2018‑02‑27:
Vulkan is coming to macOS and iOS, but no thanks to Apple.
- 2018‑02‑27:
The lost art of bending over: how other cultures spare their spines.
- 2018‑02‑27:
The struggles of women who mask their autism.
- 2018‑02‑27:
Peak DNSSEC?
- 2018‑02‑26:
Life as a woman with colour blindness, and Enchroma glasses.
- 2018‑02‑26:
Golang laws of reflection.
- 2018‑02‑26:
Golang 2017 survey results.
- 2018‑02‑26:
Safely load untrusted YAML in Perl.
- 2018‑02‑26:
New features for sequences in PostgreSQL 10.
- 2018‑02‑26:
The Hypothesis continuous release process.
- 2018‑02‑26:
Compiler bug? Linker bug? Windows kernel bug.
- 2018‑02‑26:
Scientists aim to pull peer review out of the 17th century.
- 2018‑02‑25:
CTTK: constant-time toolkit.
- 2018‑02‑25:
How Black Panther asks us to examine who we are to one another.
- 2018‑02‑25:
'Black Panther': choose your weapons.
- 2018‑02‑25:
The UK will block online porn from April. Here's what we know.
- 2018‑02‑25:
A long two months working on Spectre/Meltdown mitigations in Illumos.
- 2018‑02‑25:
Google AMP's speed comes from preloading, and other controversies.
- 2018‑02‑24:
Backlogs! Backlogs everywhere: how Wikipedia deals with spam and bad actors.
- 2018‑02‑23:
The US experience with the phasedown of lead in gasoline.
- 2018‑02‑23:
10,000 year Clock of the Long Now gets lowered into Texas mountain.
- 2018‑02‑23:
Words for "yes" in Romance languages.
- 2018‑02‑23:
Pwned Passwords V2: half a billion passwords for download, and a k-anonymity query service.
- 2018‑02‑23:
Mysterious origin of domesticated horses 'turned upside down' by DNA analysis.
- 2018‑02‑23:
A python development environment for 2018.
- 2018‑02‑23:
The quest for the missing DNSSEC keytags.
- 2018‑02‑23:
Escaping hell with monads.
- 2018‑02‑21:
When whisper networks let us down: how communities struggle — and sometimes fail — to stop sexual assault.
- 2018‑02‑21:
fugit: *really* lightweight git access control.
- 2018‑02‑21:
Three ways to open up closed code.
- 2018‑02‑21:
Black Panther: the tale of two different viewing experiences.
- 2018‑02‑21:
Prestigious science journals struggle to reach even average reliability.
- 2018‑02‑21:
vgo: golang += package versioning.
- 2018‑02‑21:
Package management for Golang: thoughts on vgo and dep.
- 2018‑02‑21:
Ruby's new JIT.
- 2018‑02‑21:
Adventures with memory barriers and Seastar on Linux.
- 2018‑02‑20:
Two x86 instruction sequences usually resynchronize after a few instructions because of the Kruskal Count.
- 2018‑02‑20:
Kruskal Count and Kangaroo Method.
- 2018‑02‑20:
Superset disassembly: statically rewriting x86 binaries without heuristics.
- 2018‑02‑20:
The dark money driving the Scottish Tory surge.
- 2018‑02‑20:
Lärmkarte Berlin: so laut ist es vor Ihrer Haustür.
- 2018‑02‑20:
The wall is the wall: why fortresses fail.
- 2018‑02‑20:
Python async simplified.
- 2018‑02‑19:
Risks of TLS/1.3 0RTT data.
- 2018‑02‑19:
Fabric linear motor.
- 2018‑02‑19:
Existential crisis: heterogeneous collections in Haskell.
- 2018‑02‑19:
ZGC: a low-latency garbage collector for Java / HotSpot / Linux / amd64.
- 2018‑02‑19:
Norris numbers: walls programmers hit as programs scale up.
- 2018‑02‑19:
DeepState augments C/C++ test-driven development with symbolic execution.
- 2018‑02‑18:
IPv4 route lookup on Linux: level compressed trie.
- 2018‑02‑18:
What is Debian all about, really? Or: friction, packaging complex applications, language-specific tooling.
- 2018‑02‑18:
How not to replace email: lessons from Google Wave.
- 2018‑02‑18:
Container patterns.
- 2018‑02‑18:
Someone is sending sex toys to strangers. Amazon has no idea how to stop it.
- 2018‑02‑18:
The cabinet files: second-hand filing cabinets turned out to be full of classified Australian documents.
- 2018‑02‑18:
Ghost in the DCL shell: OpenVMS, touted as ultra reliable, had a local root hole for 30 years.
- 2018‑02‑18:
'Black Panther' is not the movie we deserve.
- 2018‑02‑17:
Google AMP is an anticompetitive attempt to fork the web.
- 2018‑02‑17:
Guy spends almost a year gluing 42,000 matches to make a giant sphere, then sets it on fire.
- 2018‑02‑16:
Choosing a perl templating system.
- 2018‑02‑16:
Travis encrypted variables and external contributions.
- 2018‑02‑16:
Replacing jQuery with Vue.js: no build step necessary.
- 2018‑02‑16:
The Kautz graph.
- 2018‑02‑16:
Making propellor safer with GADTs and type families.
- 2018‑02‑16:
Indic scripts and Unicode: picking apart the crashing iOS string.
- 2018‑02‑16:
Hed, dek, lede, graf, tk: live with it.
- 2018‑02‑16:
(HED) Folo My Lede (UNHED)
- 2018‑02‑16:
'Lede' vs. 'Lead'.
- 2018‑02‑16:
Jim Roskind's C/C++ grammar.
- 2018‑02‑16:
The entirely unnecessary demise of Barnes & Noble.
- 2018‑02‑16:
The Bishop Fox cybersecurity style guide.
- 2018‑02‑15:
DMCA lawsuit between Cox and BMG: redirecting abuse@ to /dev/null can be expensive.
- 2018‑02‑15:
Evolution of CSS layout: 1990s to the future.
- 2018‑02‑14:
Dtrace for Linux: Oracle does the right thing.
- 2018‑02‑14:
IRS clutches its modernization holy grail: converting their 50yo assembler codebase to Java.
- 2018‑02‑14:
CSS grid for UI layouts.
- 2018‑02‑14:
The SCRAM SASL authentication mechanism.
- 2018‑02‑14:
LLVM's garbage collection facilities and SBCL's generational GC.
- 2018‑02‑14:
PDP-7 Unix: building a development environment from scratch.
- 2018‑02‑14:
Picture of a single strontium atom in an ion trap wins science photo contest.
- 2018‑02‑14:
A detailed timeline of the IMAGE satellite recovery.
- 2018‑02‑13:
Drawing better-looking Bézier curves.
- 2018‑02‑13:
Developers on call.
- 2018‑02‑13:
The Big Switch: a view of the advent of cloud computing, ten years on.
- 2018‑02‑13:
Lessons from optics, the other deep learning.
- 2018‑02‑13:
Metacrap: putting the torch to seven straw-men of the meta-utopia.
- 2018‑02‑13:
What's wrong with Metcalfe's Law?
- 2018‑02‑13:
QQ Browser's textbook RSA fails to protect the privacy of hundreds of millions of users.
- 2018‑02‑13:
DNS RFC dependency graph.
- 2018‑02‑12:
Moomin noir.
- 2018‑02‑12:
SafeYAML
- 2018‑02‑12:
Let's talk about usernames.
- 2018‑02‑12:
The songs that bind: musical tastes are formed at puberty.
- 2018‑02‑11:
A sampled virtual music box.
- 2018‑02‑10:
GDPR: sorting the fact from the fiction.
- 2018‑02‑10:
The incomplete vision of John Perry Barlow.
- 2018‑02‑10:
An opinionated guide to Haskell in 2018.
- 2018‑02‑10:
The configuration complexity clock.
- 2018‑02‑10:
Anatomy of a Ceph meltdown.
- 2018‑02‑09:
KPTI/Meltdown initial performance regressions.
- 2018‑02‑09:
FreeBSD Broadcom WiFi improvements.
- 2018‑02‑09:
When will the world reach 'peak child'?
- 2018‑02‑09:
PostgreSQL on a VAX.
- 2018‑02‑09:
The special data device SpaceX's Falcon Heavy sent to orbit.
- 2018‑02‑09:
People notice there's something wrong with The Rock's new movie poster, and things escalate quickly.
- 2018‑02‑09:
Interstellar communication. IX. Message decontamination is impossible.
- 2018‑02‑09:
Computer manpower: is there a crisis? (1982)
- 2018‑02‑09:
A history of capacity challenges in computer science education.
- 2018‑02‑08:
Paris flooding harks back to one of the great breakthroughs in hydrology.
- 2018‑02‑08:
The many faces of the Petersen graph.
- 2018‑02‑08:
How many Amazon Mechanical Turk workers are there?
- 2018‑02‑07:
Design notes on inline caches in Guile.
- 2018‑02‑07:
The EM2S 60kHz radio receiver module and the MSF time signal.
- 2018‑02‑07:
Googlebot's Javascript random() function is deterministic.
- 2018‑02‑07:
Why paper jams persist.
- 2018‑02‑07:
In Rust, ordinary vectors are values.
- 2018‑02‑07:
From telegram to tweet: a history of laws against malicious communications.
- 2018‑02‑07:
PostgreSQL and compressed documents.
- 2018‑02‑07:
Keyboard dissolves in acetone. (YouTube)
- 2018‑02‑07:
Data retention, national security, and the ECJ: the continuing saga.
- 2018‑02‑06:
Two years trying to fix the gender imbalance in a science writer's stories.
- 2018‑02‑06:
Why the tz database should not record sub-second offsets.
- 2018‑02‑06:
Is Brexit the maddest thing England has ever done? Not quite.
- 2018‑02‑06:
A tale of two moons: Peter Lik's photographs called out by science.
- 2018‑02‑06:
SRFI 110: sweet-expressions, an indentation-based syntax for Scheme.
- 2018‑02‑06:
The marbled crayfish clones itself, and it's taking over Europe.
- 2018‑02‑06:
Confessions of a typewriter addict.
- 2018‑02‑06:
MITRE CVE numbering authorities.
- 2018‑02‑06:
DWF CNA registry: distributed weakness filing CVE numbering authorities.
- 2018‑02‑05:
Ignoring the domain when authenticating your Dovecot users.
- 2018‑02‑05:
Modern CSS explained for dinosaurs.
- 2018‑02‑05:
Almost-classics: sf concepts and settings that deserve better execution.
- 2018‑02‑05:
Wales is leading the way on democratic reform.
- 2018‑02‑05:
Using Git for Debian packaging.
- 2018‑02‑05:
DragonFFI: foreign function interface and JIT for calling C using Clang/LLVM.
- 2018‑02‑05:
How and why to write a Rude Q&A.
- 2018‑02‑05:
How the Super Bowl halftime show gets set up in just six minutes.
- 2018‑02‑04:
Make your own make, with Cargo and Rust.
- 2018‑02‑04:
Why dolphins are deep thinkers.
- 2018‑02‑04:
Standard SQL features where PostgreSQL beats its competitors.
- 2018‑02‑04:
JITing PostgreSQL using LLVM.
- 2018‑02‑03:
Amazon Aurora Postgres: first thoughts.
- 2018‑02‑03:
Combine pgreplay with pgBadger.
- 2018‑02‑03:
ECMAScript 2018: the final feature set.
- 2018‑02‑03:
How Google Chrome's new ad blocker works.
- 2018‑02‑03:
Faux Shu follies: cheating at magic squares.
- 2018‑02‑03:
Why would I care about Mikhail Bongard's problems?
- 2018‑02‑03:
What is going to happen with WHOIS and GDPR?
- 2018‑02‑03:
git .mailmap: fix up deadnames in old commits.
- 2018‑02‑02:
The full-time job of keeping up with Kubernetes.
- 2018‑02‑02:
Measuring QUIC vs TCP on desktop and mobile.
- 2018‑02‑02:
NIS Directive: EU directive on security of network and information systems.
- 2018‑02‑02:
How Christine Peterson coined the term 'open source'.
- 2018‑02‑01:
Monitoring with Prometheus 2.0.
- 2018‑02‑01:
OpenPnP: open source SMT pick and place.
- 2018‑02‑01:
Unboxing a cheap desktop pick and place machine.
- 2018‑02‑01:
Postgres hidden gems.
- 2018‑02‑01:
Spying on a Ruby process's memory allocations with eBPF.
- 2018‑01‑31:
Making network authentication simple in a Bring Your Own Device environment.
- 2018‑01‑31:
GRV: a terminal/curses interface for viewing git repositories.
- 2018‑01‑31:
The cult of Mary Beard.
- 2018‑01‑31:
The peculiar case of NSEC processing using expanded wildcard records.
- 2018‑01‑31:
The Jaffer-Humphreys test: A Bechdel test for museums.
- 2018‑01‑30:
DO or UNDO, there is no VACUUM: what if PostgreSQL didn't need VACUUM at all?
- 2018‑01‑30:
Ten days in Shenzhen.
- 2018‑01‑30:
A techie's rough guide to GDPR.
- 2018‑01‑30:
GDPR and Google Analytics.
- 2018‑01‑30:
The view from the TOP500.
- 2018‑01‑30:
MPEG: a crisis, the causes, and a solution.
- 2018‑01‑29:
Git signed commits are a bad idea.
- 2018‑01‑29:
Table partitioning for storing logs in PostgreSQL.
- 2018‑01‑29:
Debug tools for generating crafted DNS responses.
- 2018‑01‑29:
When Perl isn't fast enough.
- 2018‑01‑29:
An overview of the Perl 5 engine.
- 2018‑01‑29:
Gray failure: the Achilles' heel of cloud-scale systems.
- 2018‑01‑28:
Your instant Kubernetes cluster.
- 2018‑01‑28:
Taking a pubsub message broker approach to logging.
- 2018‑01‑28:
The setenv fiasco.
- 2018‑01‑28:
Do compilers take inline as a hint?
- 2018‑01‑28:
How to build your own AlphaZero AI using Python and Keras.
- 2018‑01‑27:
Moving 1Password from CloudFormation to Terraform.
- 2018‑01‑27:
My Delorean runs Perl.
- 2018‑01‑26:
How to prepare a talk.
- 2018‑01‑26:
Some obscure C features you might not know about.
- 2018‑01‑26:
Why Tesla's autopilot can't see a stopped firetruck.
- 2018‑01‑26:
NASA's long dead 'IMAGE' satellite is alive!
- 2018‑01‑26:
A practitioner's guide to reading programming languages papers.
- 2018‑01‑25:
Why apt should use https.
- 2018‑01‑25:
Bike-share schemes improve safety; helmet laws do not.
- 2018‑01‑25:
STGi: spineless tagless G-machine interpreter.
- 2018‑01‑25:
dns2doh: test DNS over HTTP.
- 2018‑01‑25:
Sweden's gender-balanced snow-clearing as a template for adjusting Canadian budgets.
- 2018‑01‑25:
Typed capability-based APIs in Rust.
- 2018‑01‑25:
Bringing DNS security and privacy to the end user.
- 2018‑01‑25:
Railway station traffic statistics visualized.
- 2018‑01‑25:
Ref patterns, destructuring, and invisible borrows in Rust.
- 2018‑01‑24:
The new anti-Spectre microcode from Intel and AMD adds three new features.
- 2018‑01‑24:
How to chroot to a Raspberry Pi SD card on an Ubuntu box.
- 2018‑01‑24:
How to emulate a Raspberry Pi (Raspbian Jessie) on Mac OSX (El Capitan).
- 2018‑01‑24:
Abolished in Scotland, it's time the feudal leftover of leasehold ownership expired in the rest of Britain.
- 2018‑01‑24:
Think your country is crowded? These maps reveal the truth about population density across Europe.
- 2018‑01‑23:
How a fix in Golang 1.9 sped up GitLab's Gitaly service by 30x.
- 2018‑01‑23:
An introduction to algebraic data types and structural pattern matching in TypeScript.
- 2018‑01‑23:
Why is Jepsen-style random testing effective for partition tolerance bugs?
- 2018‑01‑22:
The good operation: an induction tool and reference guide for policy professionals within MOD.
- 2018‑01‑22:
In search of 0xffffffffff600400: troubleshooting containers, system calls, and performance.
- 2018‑01‑22:
The policy hack.
- 2018‑01‑22:
Nighttime long exposures of rotating helicopter blades.
- 2018‑01‑22:
In defence of swap: common misconceptions.
- 2018‑01‑22:
The limitations of chaos engineering.
- 2018‑01‑21:
Network latencies and speed of light.
- 2018‑01‑21:
Code alignment and microbenchmark performance.
- 2018‑01‑21:
A brief YAML reference.
- 2018‑01‑21:
How to talk to angry people: the CLARA method of de-escalation.
- 2018‑01‑21:
The difference between liberalism and centrism.
- 2018‑01‑21:
What is XML good at?
- 2018‑01‑21:
Brave new I/O for embedded Rust.
- 2018‑01‑21:
Why is only half of Mars magnetized?
- 2018‑01‑21:
The London Time Machine.
- 2018‑01‑20:
The Carillion whitewash: insolvent, not illiquid.
- 2018‑01‑20:
Testing microservices, the sane way.
- 2018‑01‑20:
JavaScript things I never knew existed.
- 2018‑01‑20:
Fuzzing TCP servers.
- 2018‑01‑19:
A brief overview of the 1893 overthrow of the Kingdom of Hawaiʻi's Queen Liliʻuokalani.
- 2018‑01‑19:
Who the hell uses onion juice?
- 2018‑01‑19:
Cornell barbecue chicken sauce.
- 2018‑01‑19:
Nominet abandons its charitable trust.
- 2018‑01‑19:
Ridiculously fast base64 encoding and decoding.
- 2018‑01‑19:
Oxidizing JavaScript source maps with Rust and WebAssembly.
- 2018‑01‑19:
Rust and Qt/QML: a timely example
- 2018‑01‑18:
Trackball history: Canada's earliest gift to computing.
- 2018‑01‑18:
How to measure the working set size on Linux.
- 2018‑01‑18:
The 1969 Easter Mass incident.
- 2018‑01‑17:
Followup attacks based on Spectre and Meltdown to look forward to.
- 2018‑01‑16:
Finding a CPU design bug in the Xbox 360.
- 2018‑01‑15:
Antineutrino Global Map 2015 chatacterizes Earth's radioactivity.
- 2018‑01‑15:
Firefox will require TLS for all new web features.
- 2018‑01‑15:
Amdahl's law, the universal scalability law, and coherence penalty.
- 2018‑01‑15:
The death of microservice madness.
- 2018‑01‑15:
The secret history of the Russian consulate in San Francisco.
- 2018‑01‑15:
stm-containers: concurrent HAMT for Haskell.
- 2018‑01‑15:
Cherry's new low-profile switches may help bring mechanical keyboards to more laptops.
- 2018‑01‑14:
Benchmarking crimes: an emerging threat in systems security.
- 2018‑01‑13:
Firefox bullshit removal via about:config.
- 2018‑01‑13:
Cuckoo hashing can outperform learned indexes.
- 2018‑01‑13:
Mechanical computing systems using only links and rotary joints.
- 2018‑01‑13:
Isn't it obvious? Avoiding just-so stories about visualizations.
- 2018‑01‑13:
The Bestiary: scaly-foot gastropod / iron snail.
- 2018‑01‑13:
fluxcapacitor: how to sleep a million years.
- 2018‑01‑12:
What it's like being a creative professional and a mother.
- 2018‑01‑12:
Let's Encrypt update regarding ACME TLS-SNI and shared hosting infrastructure.
- 2018‑01‑12:
The "Clarke Gap" of a technology is the degree to which it is distinguishable from magic.
- 2018‑01‑12:
Down the "shithole": why lexicographers need your profanity.
- 2018‑01‑12:
Fast strong hash functions: SipHash and HighwayHash.
- 2018‑01‑11:
Fundamental physics is frustrating physicists.
- 2018‑01‑11:
IPv6 flow label: misuse in hashing.
- 2018‑01‑11:
Report on the npm operations incident of 6th Jan.
- 2018‑01‑11:
Detecting Spectre and Meltdown using hardware performance counters.
- 2018‑01‑11:
Making the pizza cinnamon rolls from Mario Batali's sexual misconduct apology letter.
- 2018‑01‑10:
PiTubeDirect: a Raspberry Pi as a BBC Micro second processor.
- 2018‑01‑10:
The fight for patent-unencumbered media codecs Is nearly won.
- 2018‑01‑10:
Let's Encrypt issue with TLS-SNI-01 and shared hosting infrastructure.
- 2018‑01‑09:
Xerox Alto's 3 Mb/s Ethernet: Building a gateway with a BeagleBone.
- 2018‑01‑09:
What Spectre and Meltdown mean for WebKit.
- 2018‑01‑09:
Legends of the ancient web.
- 2018‑01‑09:
Control-C handling in Python and Trio.
- 2018‑01‑09:
Birth order effects exist and are very strong.
- 2018‑01‑09:
Pepper: the spice of life.
- 2018‑01‑09:
A vast 430-year-old world map, full of places and creatures, real and imagined.
- 2018‑01‑08:
Meltdown and Spectre information update for DragonflyBSD.
- 2018‑01‑08:
Feature comparison of ack, ag, git-grep, GNU grep and ripgrep.
- 2018‑01‑08:
Golang's hidden #pragmas.
- 2018‑01‑08:
Why Brigade doesn't do YAML: scripting for Kubernetes clusters.
- 2018‑01‑08:
NSEC3 hash performance in NSD and Unbound.
- 2018‑01‑08:
The bad neighbor: out-of-order execution and its applications.
- 2018‑01‑08:
The Python decorators they won't tell you about
- 2018‑01‑08:
Four groups of researchers independently found Meltdown and Spectre within mere months of each other.
- 2018‑01‑08:
PCID is now a critical performance/security feature on x86.
- 2018‑01‑07:
Ancient browser wars history: MD5-hashed posts declassified.
- 2018‑01‑07:
From 200K lines of CoffeeScript to zero: making decaffeinate super-stable.
- 2018‑01‑07:
Full-text search in Django with PostgreSQL.
- 2018‑01‑07:
An 8-tube module from a 1954 IBM 705 mainframe: it's a key debouncer.
- 2018‑01‑06:
I'm harvesting credit card numbers and passwords from your site. Here's how.
- 2018‑01‑06:
Meltdown and Spectre Linux kernel status.
- 2018‑01‑06:
Meltdown fix impact on Redis performances in virtualized environments.
- 2018‑01‑06:
A type system for the Nix purely functional package manager.
- 2018‑01‑06:
Racket-on-Chez status, January 2018.
- 2018‑01‑05:
Spectre/Meltdown security holes will devastate Intel's marketshare.
- 2018‑01‑05:
Intel analysis of speculative execution side channels.
- 2018‑01‑05:
Random with care.
- 2018‑01‑05:
The fresh prints of 'bell-end'.
- 2018‑01‑05:
Apple's notice aboit speculative execution vulnerabilities in ARM-based and Intel CPUs.
- 2018‑01‑05:
Announcing the OpenWrt/LEDE merge.
- 2018‑01‑05:
Xen Project Spectre/Meltdown FAQ.
- 2018‑01‑05:
How Wendy Carlos changed music forever.
- 2018‑01‑04:
The "retpoline" x86 mitigation technique for the Spectre branch target injection attack.
- 2018‑01‑04:
Notes from the Intelpocalypse.
- 2018‑01‑04:
What I learned in 2017 writing Golang.
- 2018‑01‑04:
Decrypting PgBouncer's diagnostic information.
- 2018‑01‑03:
Google Project Zero: Reading privileged memory with a side-channel. (Meltdown/Spectre)
- 2018‑01‑03:
Life as a New York Times reporter on the national security beat.
- 2018‑01‑03:
What does it mean for code to be "explicit"?
- 2018‑01‑03:
Making TRust-DNS faster than BIND9.
- 2018‑01‑03:
Initial benchmarks of the performance impact of page table isolation.
- 2018‑01‑03:
How the Å came to be.
- 2018‑01‑03:
Genetic study supports carbohydrate-insulin model of obesity.
- 2018‑01‑03:
We saw some really bad Intel CPU bugs in 2015, and we should expect to see more in the future.
- 2018‑01‑03:
PostgreSQL benchmarks showing performance regressions due to page table isolation.
- 2018‑01‑03:
The Golang type system for newcomers.
- 2018‑01‑02:
'Kernel memory leaking' Intel processor design flaw forces Linux and Windows redesign.
- 2018‑01‑02:
NeoPG: a cleaned-up fork of GnuPG 2.
- 2018‑01‑02:
Star Wars: Regency.
- 2018‑01‑02:
SQL keys in depth.
- 2018‑01‑02:
Negative result: reading kernel memory from user mode via speculative execution.
- 2018‑01‑02:
Water's odd behavior stems from its ability to exist in two liquid states.
- 2018‑01‑02:
Oumuamua pursued: the path of an interstellar asteroid.
- 2018‑01‑02:
The fat in a perfect croissant.
- 2018‑01‑02:
The death and life of the 13-month calendar.
- 2018‑01‑02:
Warnsdorff's rule for finding knight's tours.
- 2018‑01‑01:
Linux page table isolation is not needed on AMD processors.
- 2018‑01‑01:
Esperanto exits stealth mode, aiming at AI with a 4,096-core 7nm RISC-V monster.
- 2018‑01‑01:
How Hotmail changed Microsoft (and email) forever.
- 2018‑01‑01:
The story of the Gömböc.
- 2018‑01‑01:
The mysterious case of the Linux page table isolation patches.
- 2018‑01‑01:
In-place editing gets safer in perl 5.28.
- 2017‑12‑31:
Tracking down the roots of "supercalifragilisticexpialidocious".
- 2017‑12‑31:
Alan Kay on how to fund research.
- 2017‑12‑31:
The orgin and constraints of "shitgibbon" compounds.
- 2017‑12‑30:
The 2017 Tucker Awards for excellence in swearing.
- 2017‑12‑30:
Dead store elimination (still) considered harmful.
- 2017‑12‑30:
A history of S_IFMT file types in Unix.
- 2017‑12‑30:
What were the worst Nobel Prize snubs is science history?
- 2017‑12‑30:
Programming in the Wild West.
- 2017‑12‑29:
ECSV: a format for astronomical tables (in CSV) with metadata (in YAML).
- 2017‑12‑29:
Vim on a mechanical typewriter.
- 2017‑12‑29:
New Zealand study provides more support for the lead-crime hypothesis.
- 2017‑12‑29:
Re-examining the scrypt() parameter values.
- 2017‑12‑29:
PostgreSQL + ZFS best practices.
- 2017‑12‑29:
The sorry state of OpenSSL usability.
- 2017‑12‑29:
Legal cannabis isn't the boon small businesses thought it would be.
- 2017‑12‑29:
Willrow Hood's ice cream machine in Star Wars: The Empire Strikes Back.
- 2017‑12‑29:
SSL Labs grading overhaul preview.
- 2017‑12‑28:
The day zero was banned from British roulette.
- 2017‑12‑28:
FaCT aka ConstanC: a constant-time programming language.
- 2017‑12‑28:
FaCT: A flexible and constant-time programming language.
- 2017‑12‑28:
pg_squeeze: A PostgreSQL extension for automatic bloat cleanup.
- 2017‑12‑27:
BT InLink in London: building a privatised "smart city" by stealth.
- 2017‑12‑27:
How to hack a turned-off computer, or, running unsigned code in Intel ME.
- 2017‑12‑27:
Macaroons: cookies with contextual caveats for decentralized authorization in the cloud.
- 2017‑12‑26:
Why TLS 1.3 isn't in browsers yet.
- 2017‑12‑26:
Scientists have found a drug that can repair cavities and regrow teeth.
- 2017‑12‑26:
Tom Weller's "Science Made Stupid" and "Cvltvre Made Stvpid".
- 2017‑12‑26:
Evil coding incantations.
- 2017‑12‑26:
The state of netbooting Raspberry Pis.
- 2017‑12‑26:
Untangling Jenkins (with Summon and Conjur).
- 2017‑12‑26:
Reviving the Apple 410 Color Plotter.
- 2017‑12‑25:
Undefined vs unsafe in Rust.
- 2017‑12‑25:
Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply.
- 2017‑12‑25:
An algorithmic approach to dealing with insomnia.
- 2017‑12‑25:
Weird machines, exploitability, and provable unexploitability.
- 2017‑12‑25:
The current state of kernel page-table isolation.
- 2017‑12‑24:
Formal verification: the gap between perfect code and reality.
- 2017‑12‑24:
"A simple makefile" is a unicorn.
- 2017‑12‑24:
A list of software that turns your database into a REST or GraphQL API.
- 2017‑12‑24:
NRT:IT refurbished Dell.
- 2017‑12‑24:
Eleven Linux syscalls that suck.
- 2017‑12‑23:
Star Wars: The Last Jedi, reviewed by Adam Roberts.
- 2017‑12‑23:
Vulnerabilities and exploits: What happened when the infosec community outed its own sexual predators.
- 2017‑12‑23:
Division by invariant integers using multiplication.
- 2017‑12‑23:
Why nothing matters: the impact of zero initialization on programming language performance.
- 2017‑12‑23:
JSON in MongoDB, MySQL, and PostgreSQL: few more stories about performance.
- 2017‑12‑23:
AVX-512: what's useful for us.
- 2017‑12‑23:
Dropbox releases PyAnnotate: auto-generate type annotations for mypy.
- 2017‑12‑23:
Let your Python code type-hint itself: introducing open source MonkeyType.
- 2017‑12‑23:
Why IBM DB2 is four different DBMS code bases.
- 2017‑12‑22:
Ten lessons a mathematician wished he had been taught.
- 2017‑12‑22:
Copy-on-write friendly Python garbage collection for forking processes.
- 2017‑12‑21:
Start your open-source career.
- 2017‑12‑21:
Learning to operate Kubernetes reliably.
- 2017‑12‑21:
Implementing malloc(): an exercise to teach students systems programming.
- 2017‑12‑21:
systemd-resolved is broken.
- 2017‑12‑20:
Tokio internals: Understanding Rust's asynchronous I/O framework from the bottom up.
- 2017‑12‑20:
Salesforce's problems on the way to a near perfect log pipeline.
- 2017‑12‑19:
Tune ssh settings to speed up Ansible.
- 2017‑12‑18:
Let it go: the Arctic will never be frozen again.
- 2017‑12‑18:
Silicon Valley is turning into its own worst fear: unchecked capitalism vs superintelligent AI.
- 2017‑12‑18:
Update on the DNSSEC root KSK rollover project for December 2017.
- 2017‑12‑18:
What ORMs have taught me: just learn SQL.
- 2017‑12‑18:
Overture JS: FastMail's web app library.
- 2017‑12‑18:
A modulino is a file that is both script and module in Perl.
- 2017‑12‑18:
The first Unix port, to the Interdata 7/32.
- 2017‑12‑17:
A cheat-sheet for mathematical notation with translations to JavaScript.
- 2017‑12‑17:
Butch, femme, and the history of lesbian identity.
- 2017‑12‑17:
Silicon Valley techies still think they're the good guys. They're not.
- 2017‑12‑17:
Modes, medians, means: a unifying perspective.
- 2017‑12‑17:
Which lines of longitude and latitude pass through the most countries?
- 2017‑12‑17:
A thorough introduction to Apache Kafka.
- 2017‑12‑17:
Tips for in-house teams in a free market software culture, from an infrastructure tooling team at the FT.
- 2017‑12‑17:
Dance Dance Convolution: automatically generating steps for a rhythm-based video game.
- 2017‑12‑16:
Dive into BPF: a list of reading material.
- 2017‑12‑16:
白左 (baizuo): The curious rise of the 'white left' as a Chinese internet insult.
- 2017‑12‑16:
The Emacs calculator: a computer algebra system in your editor.
- 2017‑12‑16:
RFC 8259: the last JSON spec.
- 2017‑12‑16:
Introducing the GoodWatch: A neighborly watch for radio engineers.
- 2017‑12‑16:
REST is the new SOAP.
- 2017‑12‑16:
Introducing stapbpf: SystemTap's new BPF backend.
- 2017‑12‑15:
Lessons learned from a DNS registrar account compromise and man-in-the-middle attack.
- 2017‑12‑14:
Why is giving birth so hard? Revisiting the 'obstetrical dilemma'.
- 2017‑12‑14:
A Volvo factory in China is car production heaven.
- 2017‑12‑14:
W3C vs WHATWG. Which gives the most authoritative HTML spec?
- 2017‑12‑14:
What is the relationship between the W3C and the WHATWG?
- 2017‑12‑14:
Results of New Zealand FOI query about academic journal subscription costs.
- 2017‑12‑14:
BGP security in partial deployment: is the juice worth the squeeze? (2013)
- 2017‑12‑13:
XSS vulnerabilities in web sites that display x.509 TLS certificate details.
- 2017‑12‑13:
London Underground map translated into German / Londoner U-Bahn-Plan ins Deutsche übersetzt.
- 2017‑12‑13:
TP-Link repeater firmware squanders 715 MB/month of DNS and NTP traffic.
- 2017‑12‑13:
Monitoring PostgreSQL replication lag.
- 2017‑12‑12:
Why old-school PostgreSQL is so hip again.
- 2017‑12‑12:
Software compatibility and lld's autoconf "User-Agent" problem.
- 2017‑12‑12:
The ROBOT attack on RSA in TLS: return of Bleichenbacher's oracle threat.
- 2017‑12‑12:
Internet protocols are changing: HTTP/2, TLS/1.3, QUIC, DoH.
- 2017‑12‑12:
Barbed wire telephone lines brought isolated homesteaders together in 1800s America.
- 2017‑12‑12:
100baseT Ethernet: so good, it works over barbed wire.
- 2017‑12‑12:
It's official: ADSL works over wet string.
- 2017‑12‑12:
AMD is at last releasing its open source Vulkan driver.
- 2017‑12‑12:
High-level problems with Git and how to fix them.
- 2017‑12‑12:
Why do asteroids explode high in the atmosphere?
- 2017‑12‑12:
The GoodWatch: a Casio calculator watch containing hex editor, disassembler, and ham radio.
- 2017‑12‑11:
On the value of EV x.509 TLS certificates.
- 2017‑12‑11:
An intellectual property rights (IPR) policy and governance structure for the WHATWG.
- 2017‑12‑11:
The numbers of women in tech rise and fall, but sexual harassment is ever present.
- 2017‑12‑11:
The case for machine learning index structures instead of B-trees or hash tables.
- 2017‑12‑11:
Half of Kenya's electricity comes from geothermal energy.
- 2017‑12‑11:
NASA to test prototype Kilopower nuclear reactor intended for missions to Mars.
- 2017‑12‑11:
When did Italian become the language of Italy?
- 2017‑12‑11:
Thinking about hardware support for virtualization.
- 2017‑12‑11:
How to make an atomic clock from N@C60, a nitrogen atom in a carbon fullerene cage.
- 2017‑12‑11:
Design Principles.
- 2017‑12‑11:
A collection of magic "nothing up my sleeve" numbers in cryptographic algorithms.
- 2017‑12‑10:
Alaskan North Slope climate change just outran one of our tools to measure it.
- 2017‑12‑10:
Golang tooling essentials: useful flags and options.
- 2017‑12‑10:
How a CogSci undergrad invented PageRank three years before Google.
- 2017‑12‑10:
AWS DNS services break qname minimization.
- 2017‑12‑10:
About 34% of legitimate E-Passports have flaws preventing verification.
- 2017‑12‑10:
Falsehoods programmers believe about programming.
- 2017‑12‑10:
Measuring asymmetric DOCSIS latency via NTP.
- 2017‑12‑10:
Global powers lobby to stop special Brexit deal for UK.
- 2017‑12‑10:
Line Rider in the Hall of the Mountain King. (YouTube)
- 2017‑12‑10:
The Freiburg cup: a solution to single-use coffee cups.
- 2017‑12‑10:
iPhone slow? Try replacing your battery!
- 2017‑12‑10:
Notes on postmodern programming.
- 2017‑12‑10:
Kerberos: why the world moved on.
- 2017‑12‑09:
1.4 billion clear text credentials discovered in a single database.
- 2017‑12‑09:
The remarkable "curvature blindness" illusion.
- 2017‑12‑09:
An interview with Xavier Leroy.
- 2017‑12‑09:
This is just to say we have explained the plum jokes in your Twitter feed.
- 2017‑12‑08:
Make it Simple: a tale about Robert Dewar, Ada, and gnat.
- 2017‑12‑08:
Rust-inspired safe pointers in SPARK Ada 2014.
- 2017‑12‑08:
Sending infrared commands from a Raspberry Pi without LIRC.
- 2017‑12‑08:
Decoding an air conditioner remote control's checksum with differential cryptanalysis.
- 2017‑12‑08:
What have we learned from the PDP-11?
- 2017‑12‑08:
Google is likely to have its LIDAR patents invalidated, hindering its lawsuit against Uber.
- 2017‑12‑08:
A PostgreSQL / Pacemaker outage report.
- 2017‑12‑07:
3D printed objects that can connect to WiFi without electronics.
- 2017‑12‑07:
Portugal's radical drugs policy is working. Why hasn't the world copied it?
- 2017‑12‑07:
Neurotypical peers are less willing to interact with those with Autism based on thin slice judgments.
- 2017‑12‑07:
Rust code organization: modules, crates, etc.
- 2017‑12‑07:
Google's AlphaZero beats Stockfish in 100-game match after spending 4 hours teaching itself chess.
- 2017‑12‑06:
The story of the crookneck / handled ancient American watermelon.
- 2017‑12‑06:
Denial by DNS: Uber learns painfully and laboriously how not to write an asynchronous resolver.
- 2017‑12‑06:
Introducing "British Economic Time" aka "Sunrise Time", the ultimate astronomy geek timezone.
- 2017‑12‑06:
Replacing Elasticsearch with Rust and SQLite.
- 2017‑12‑06:
AlphaZero achieves in 24 hours a superhuman level of play in the games of chess, shogi, and Go.
- 2017‑12‑06:
How Diesel autogenerates a Rust API from a database schema.
- 2017‑12‑06:
Are X.509 EV certificates worth the paper they're written on?
- 2017‑12‑06:
Electronic Arts is addicted to Wilson loot boxes.
- 2017‑12‑05:
Announcing cni-ipvlan-vpc-k8s: IPvlan overlay-free Kubernetes networking in AWS.
- 2017‑12‑05:
The mystery of the blend: the blender file format explained.
- 2017‑12‑05:
AWS EC2 virtualization 2017: introducing Nitro.
- 2017‑12‑04:
Connected toys: France serves formal notice to cease serious breach of privacy because of a lack of security.
- 2017‑12‑04:
Debugging an evil Golang runtime bug.
- 2017‑12‑04:
Hands-on with the PocketBeagle: a $25 Linux computer with lots of I/O pins.
- 2017‑12‑04:
How to use Git hooks to version control your Excel VBA code.
- 2017‑12‑04:
Planning to rewrite parts of Mercurial in Rust.
- 2017‑12‑04:
How Google manages 250,000 desktop/laptop computers securely and efficiently.
- 2017‑12‑04:
The Stretcher Railing Society: preserving WWII artifacts hidden in plain sight around London.
- 2017‑12‑04:
Choose your words carefully and you can get someone to change their mind, and turn a conversation around.
- 2017‑12‑04:
End of privacy rights in the UK public sector?
- 2017‑12‑04:
DNS resolver latency (cache hit rate) vs query rate.
- 2017‑12‑04:
"Metalenses" created with photolithography could change the nature of imaging and optical processing.
- 2017‑12‑04:
ffwd: delegation to another thread instead of locking is (much) faster than you think.
- 2017‑12‑04:
Metro map colour-coding: effect on usability in route tracing.
- 2017‑12‑04:
Psychological safety in operations teams.
- 2017‑12‑03:
Dice become ordered when stirred, not shaken.
- 2017‑12‑03:
How I convinced my 1987 Canon Cat to talk to my 2017 MacBook Pro.
- 2017‑12‑03:
Fool Britannia: the future of the UK has never looked so grim.
- 2017‑12‑03:
Criterion: statistics-driven micro-benchmarking for Rust.
- 2017‑12‑03:
DNS for Tor exit nodes.
- 2017‑12‑02:
Homeowners trapped by 'fleecehold', the new cash cow for property developers.
- 2017‑12‑02:
Blockchain graveyard.
- 2017‑12‑02:
Not your parent's analog computer.
- 2017‑12‑02:
Sex isn't chromosomes: the story of a century of misconceptions about X and Y.
- 2017‑12‑02:
A faster way to make Bose-Einstein condensates.
- 2017‑12‑02:
Hisako Koyama: an amateur astronomer who was one of the greatest solar observers.
- 2017‑12‑02:
The Icelandic translation of Dracula is actually a different book.
- 2017‑12‑02:
Python library API checklist.
- 2017‑12‑02:
Creating a range in JavaScript, cleverly.
- 2017‑12‑02:
A clever line of JavaScript.
- 2017‑12‑01:
How Etsy caches: consistent hashing, Ketama, and cache smearing.
- 2017‑12‑01:
DNS TTL violations in the wild, measured with RIPE Atlas.
- 2017‑12‑01:
The LEGO storage guide.
- 2017‑12‑01:
Write your next Ethereum contract in Pyramid Scheme.
- 2017‑12‑01:
Git PSA: git-rev-parse.
- 2017‑11‑30:
Twenty Toes: juggling with hands and feet. (Vimeo)
- 2017‑11‑30:
Life expectancy in Britain has fallen so much that a million years of life could disappear by 2058.
- 2017‑11‑29:
Drawing fractal Droste images: spirals inside Mandelbrots!
- 2017‑11‑29:
Object models in Python 3, Lua, JavaScript, and Perl 5.
- 2017‑11‑29:
Why an empty password gets you root on macOS High Sierra.
- 2017‑11‑29:
ISPS: hardware decription languages before VHDL.
- 2017‑11‑29:
Exploring the BBC micro:bit software stack.
- 2017‑11‑29:
The numbers that show SNCF, France's proud rail service is struggling.
- 2017‑11‑29:
The Irish and Belgian approaches to Brexit.
- 2017‑11‑28:
DNS-over-TLS at SURFnet.
- 2017‑11‑28:
tenta-dns: Recursive and authoritative DNS server in golang, with DNSSEC, DNS-over-TLS, and BGP anycast.
- 2017‑11‑28:
PostgreSQL auto_explain: analyzing the performance of millions of unique SQL queries.
- 2017‑11‑28:
pgDoctor: PostgreSQL healthchecks for load balancers.
- 2017‑11‑28:
Bitcoin and that 1929 vibe.
- 2017‑11‑28:
A sense of units and scale for electrical energy production and consumption.
- 2017‑11‑28:
Format oracle attacks against OpenPGP and GnuPG.
- 2017‑11‑28:
Photovoltaic growth: reality versus projections of the International Energy Agency.
- 2017‑11‑28:
... Then you win.
- 2017‑11‑27:
Drawing from noise with Processing, and making animated loopy GIFs.
- 2017‑11‑27:
Horwood's plan of London, 1792 - 1799.
- 2017‑11‑27:
SPIFFE: standards for securely identifying software systems in dynamic and heterogeneous production environments .
- 2017‑11‑27:
VPN DNS leak test.
- 2017‑11‑27:
What Bikini Atoll looks like today.
- 2017‑11‑27:
Inside Docker's "FROM scratch" empty container.
- 2017‑11‑27:
A minimalist guide to tmux.
- 2017‑11‑26:
Why Amazon DynamoDB isn't for everyone.
- 2017‑11‑26:
Unit testing doesn't affect codebases the way you might expect.
- 2017‑11‑26:
Legatum: who are the Brexiteers' favourite think tank and who is behind them?
- 2017‑11‑26:
A review of some Amazon HQ2 bids shows that democracy itself is a bargaining chip.
- 2017‑11‑26:
LIL: the little implementation language (and other mid-level languages).
- 2017‑11‑26:
Lively Linear Lisp: 'Look Ma, no garbage!'
- 2017‑11‑26:
Carp: a Lisp with Rust-like memory management.
- 2017‑11‑25:
Asbestos and the great Aussie DIY obsession: the impending killer 'third wave'.
- 2017‑11‑25:
Rob Pike's 5 rules of programming.
- 2017‑11‑25:
No end in sight to the Brexit madness.
- 2017‑11‑25:
Using a logbook to improve your programming.
- 2017‑11‑25:
Quantum theory rebuilt from simple physical principles.
- 2017‑11‑25:
In search of the perfect writing font.
- 2017‑11‑25:
SOLID principles made easy.
- 2017‑11‑25:
Incremental data capture for Oracle databases at LinkedIn.
- 2017‑11‑25:
Hexagonal Architecture: a mobile app case study.
- 2017‑11‑25:
VoxelSpace: Terrain rendering in less than 20 lines of code.
- 2017‑11‑24:
Return of the Obra Dinn: spherical mapped dithering for a 1bpp 1st-person game.
- 2017‑11‑24:
No boundaries: key logging and exfiltration of personal data by web site session-replay scripts.
- 2017‑11‑24:
How the sandwich consumed Britain.
- 2017‑11‑24:
Our computer systems are not good enough. (YouTube)
- 2017‑11‑24:
MySQL performance tuning and Linux context switches.
- 2017‑11‑24:
In the Jungle: inside the long hidden genealogy of 'The Lion Sleeps Tonight'.
- 2017‑11‑24:
Observations of an ex pat: the Middle East explained.
- 2017‑11‑24:
Saudi Arabia's Arab Spring, at last.
- 2017‑11‑24:
Make: shows how to apologise properly.
- 2017‑11‑24:
The financial realities of going viral.
- 2017‑11‑24:
Ada: There's a mini-RTOS in my language.
- 2017‑11‑24:
Why the world has so many Guineas.
- 2017‑11‑23:
Common issues with PostgreSQL planner statistics.
- 2017‑11‑23:
Draft revision of ISO 8601-201x with EDTF extended date/time formats.
- 2017‑11‑23:
PostgreSQL configuration tuning for humans.
- 2017‑11‑23:
How tuning PostgreSQL for SSDs can improve slow query performance by 50x.
- 2017‑11‑23:
Road design: sustainable safety vs shared space.
- 2017‑11‑23:
WIPEONFORK in Linux 4.14.
- 2017‑11‑23:
Better random number generation for OpenSSL, glibc, and Linux.
- 2017‑11‑22:
Why git is worse than Fossil.
- 2017‑11‑22:
breezy: a fork of bzr for Python 3 support.
- 2017‑11‑22:
Thoughts on Fossil-NG.
- 2017‑11‑22:
Beauty shots of (moderately) retro computers.
- 2017‑11‑22:
Do no harm: Linus on the tension between kernel security and system reliability.
- 2017‑11‑22:
I can send an IP packet to Europe faster than I can send a pixel to the screen. How f'd up is that?
- 2017‑11‑22:
Replacing x86 firmware with Linux and Golang.
- 2017‑11‑22:
Milksnake: ship Python wheels written in Rust without linking to libpython.
- 2017‑11‑22:
Announcing failure: error handling for Rust.
- 2017‑11‑22:
True Kilts: debunking myths about highlanders and clan tartans.
- 2017‑11‑22:
What happens when a woman translates Homer's Odyssey.
- 2017‑11‑21:
ESO observations show first known interstellar asteroid is like nothing seen before.
- 2017‑11‑21:
Development progress of Language Server Protocol compatible editors and language servers.
- 2017‑11‑21:
How many colours were there in a medieval rainbow?
- 2017‑11‑21:
When a Phillips is not a Phillips! A zoo of screwdrivers.
- 2017‑11‑21:
Has web advertising jumped the shark?
- 2017‑11‑21:
EU Horizon Prize: seamless IoT/cloud authentication for all.
- 2017‑11‑21:
OpenSSI: single system image distributed clusters for Linux.
- 2017‑11‑21:
cquery: a highly-scalable, low-latency VS Code language server for C/C++.
- 2017‑11‑21:
Shaping the World. (PyCon UK keynote)
- 2017‑11‑21:
Understanding `git filter-branch` and the git storage model.
- 2017‑11‑20:
Leapseconds and earthquakes: 2018 predicted to be a year of big quakes as Earth rotation slows.
- 2017‑11‑20:
Why clocks run clockwise, and some watches and clocks that don't.
- 2017‑11‑19:
Typesetting the 1973 4th edition Unix programmer's manual.
- 2017‑11‑19:
From War to Worboys: the redesign of British road signs in the early 1960s.
- 2017‑11‑19:
Dark matter does not form a disk.
- 2017‑11‑19:
Span types for raw memory slices in C#.
- 2017‑11‑19:
Some birds use discarded cigarettes to fumigate their nests.
- 2017‑11‑19:
Orcas vs great white sharks: in a battle of the apex predators who wins?
- 2017‑11‑19:
Security things in Linux v4.14.
- 2017‑11‑18:
Everything you need to know about Lexit in five minutes.
- 2017‑11‑18:
20 feet vs 178000 miles: a stupidly long network route.
- 2017‑11‑18:
The mystery of the phantom scientific journal reference.
- 2017‑11‑18:
The rise and fall of the complex sentence.
- 2017‑11‑18:
Bufferbloat on the Internet backbone.
- 2017‑11‑17:
Formula 1 race car aerofoils keep cold air inside supermarket chillers.
- 2017‑11‑17:
Graphing the Analytics Package at Amazon: Remove the legend to become one.
- 2017‑11‑17:
FreeBSD/EC2 on AWS C5 instances.
- 2017‑11‑17:
Christopher Tolkien has resigned as director of the Tolkien estate.
- 2017‑11‑16:
KAISER: hiding the Linux kernel from user space.
- 2017‑11‑16:
Experience with viruses on UNIX systems. (1989)
- 2017‑11‑16:
Plan 28 Autumn 2017 report on progress analysing Babbage's analytical engine manuscripts.
- 2017‑11‑16:
Puffs: a domain-specific language and library for parsing untrusted file formats safely.
- 2017‑11‑15:
Keeping a lab notebook: basic principles and best practices.
- 2017‑11‑15:
Oberon: the overlooked jewel.
- 2017‑11‑15:
Fairchild F9445 MicroFlame: a clone of the Data General Nova.
- 2017‑11‑15:
All of the world's top 500 supercomputers are running Linux.
- 2017‑11‑15:
NumPy's plan for dropping Python 2.7 support by 2020.
- 2017‑11‑15:
Datasette: instantly create and publish an API for your SQLite databases.
- 2017‑11‑15:
What did 17th century food taste like?
- 2017‑11‑14:
Report from the SNAFUcatchers workshop on coping with complexity.
- 2017‑11‑14:
Finding the right color palettes for data visualizations.
- 2017‑11‑13:
The post-Weinstein reckoning.
- 2017‑11‑13:
uPyPhone: a GSM phone using MicroPython, PyBoard, and SIM800L.
- 2017‑11‑13:
Against brilliant jerks.
- 2017‑11‑13:
Verfploeter: broad and load-aware anycast mapping.
- 2017‑11‑13:
Physics has demoted mass.
- 2017‑11‑13:
Long-term coffee consumption and risk of cardiovascular disease.
- 2017‑11‑13:
Vitamin D and cancer prevention.
- 2017‑11‑13:
Time zones, daylight saving, and cancer risk.
- 2017‑11‑13:
Not the comp.text.sgml FAQ.
- 2017‑11‑13:
Trip report: Fall 2017 ISO C++ standards meeting (Albuquerque).
- 2017‑11‑13:
RISC-V processor research at IIT-Madras.
- 2017‑11‑13:
target="_blank": an underestimated vulnerability.
- 2017‑11‑12:
Inside a low budget consumer hardware espionage implant: a GSM device hidden in a USB cable.
- 2017‑11‑12:
Google's approach to observability across microservices.
- 2017‑11‑12:
Medieval price list.
- 2017‑11‑12:
Homeland Security team remotely hacked a Boeing 757.
- 2017‑11‑12:
Shadow Brokers security breaches and spilled secrets have shaken the NSA to its core.
- 2017‑11‑12:
Gallery of missing data visualisations.
- 2017‑11‑11:
Take it from the Swiss: the Brexit referendum wasn't legitimate.
- 2017‑11‑11:
Fire and ice: Mapping the magma flow to Antarctica's most active volcano.
- 2017‑11‑11:
A computer scientist who prefers voting on paper.
- 2017‑11‑11:
Why conservatives are more susceptible to believing in lies.
- 2017‑11‑11:
Real-time GPU texture-mapped vector glyphs.
- 2017‑11‑11:
The shape of Rome.
- 2017‑11‑11:
Explanation of the OVH Strasbourg outage.
- 2017‑11‑11:
Burn the programmer!
- 2017‑11‑11:
How can liberalism be to blame for everything when we can't even agree what it is?
- 2017‑11‑10:
Cursive handwriting and other education myths.
- 2017‑11‑10:
All you need to know about whiteboard markers.
- 2017‑11‑10:
CEOs don't steer.
- 2017‑11‑10:
An evening with Berferd, in which a cracker is lured, endured, and studied.
- 2017‑11‑10:
The fungus that turns ants into zombies is more diabolical than we realized.
- 2017‑11‑09:
FastNetMon DDoS detection tool.
- 2017‑11‑09:
America's "retail apocalypse" is really just beginning.
- 2017‑11‑09:
.NET/C# generics history: some photos from Feb 1999.
- 2017‑11‑09:
Exponential generic type expansion in the C# compiler.
- 2017‑11‑09:
Curiouser and curiouser: recursive generic types in C#.
- 2017‑11‑09:
Scientists on new supernova: WTF have we been looking at?
- 2017‑11‑08:
This fungus has over 20,000 sexes.
- 2017‑11‑08:
ARM takes wing: benchmarking Qualcomm vs. Intel CPUs.
- 2017‑11‑08:
Perfect locality for listening sockets, and three epic SystemTap scripts.
- 2017‑11‑08:
Andrew S Tanenbaum on the use of Minix in the Intel ME.
- 2017‑11‑08:
The 10 top recommendations for the AI/ML field in 2017.
- 2017‑11‑08:
CSS Flexbox and Grids, your layout's best friends.
- 2017‑11‑08:
Jargon from the functional programming world in simple terms!
- 2017‑11‑08:
Some problems of URLs.
- 2017‑11‑08:
HotPlug: remove a running computer without shutting it down.
- 2017‑11‑08:
Get up to speed with JANET's faster DDoS protection services.
- 2017‑11‑07:
Update on the DNSSEC root KSK rollover project.
- 2017‑11‑07:
Against ORMs.
- 2017‑11‑06:
subjack: hostile subdomain takeover vulnerability scanning tool written in Golang.
- 2017‑11‑06:
Beyond Horizons: 443km world record of distant landscape photography.
- 2017‑11‑06:
Configure / metaconfig at the 2017 Perl 5 core hackathon.
- 2017‑11‑05:
Visiting Lord's Bridge: the Mullard Radio Astronomy Observatory near Cambridge.
- 2017‑11‑05:
Contributor Covenant: a code of conduct for open source projects.
- 2017‑11‑05:
Reconstructing ROCA.
- 2017‑11‑04:
Collapsing towers of interpreters.
- 2017‑11‑04:
Logstalgia: replay or stream website access logs as a retro arcade game.
- 2017‑11‑04:
Playing with Wolfram playing cards.
- 2017‑11‑04:
"The warhead is no longer on top of the missile." A nuclear accident in 1964.
- 2017‑11‑04:
CT Advisor: Certificate Transparency monitoring and alerts.
- 2017‑11‑04:
CERTSTREAM: see certificate transparency list updates as X.509 certs are issued in real time.
- 2017‑11‑04:
Identifying the "Early IBM Computer" in a Twitter photo: a 405 Accounting Machine.
- 2017‑11‑03:
DNS performance metrics: the logarithmic percentile histogram.
- 2017‑11‑03:
FOSSology: open source license compliance toolkit.
- 2017‑11‑03:
Software matters in the world: work on fixing the big bugs.
- 2017‑11‑03:
Strava's global heatmap, now 6x hotter.
- 2017‑11‑02:
The return of Coppersmith's attack: practical factorization of widely used RSA moduli.
- 2017‑11‑02:
Data classes for Java.
- 2017‑11‑02:
What's new in HAProxy 1.8.
- 2017‑11‑02:
How the Guardian found 800,000 paying readers.
- 2017‑11‑02:
A minimalist guide to SQLite.
- 2017‑11‑02:
The new thermodynamics: how quantum physics is bending the rules.
- 2017‑11‑02:
Linux containers in 500 lines of code.
- 2017‑11‑02:
m.css math: a Pelican plugin to render TeX to SVG on the server.
- 2017‑11‑02:
95 theses about technology.
- 2017‑11‑01:
Coders of the world, unite: can Silicon Valley workers curb the power of Big Tech?
- 2017‑11‑01:
Git delta amplification.
- 2017‑11‑01:
My VM is lighter (and safer) than your container.
- 2017‑10‑31:
Sequent calculus and linear logic: The Blind Spot and the cut rule.
- 2017‑10‑31:
The habitat of hardware bugs.
- 2017‑10‑31:
Perl is the most disliked programming language.
- 2017‑10‑31:
State of the OpenVMS port to x86-64.
- 2017‑10‑31:
fixie tries: a popcount trie implemented in Rust.
- 2017‑10‑31:
Christine Ladd-Franklin (1847-1930): A lady logician.
- 2017‑10‑31:
Debug information is huge and what to do about it.
- 2017‑10‑31:
Why are so many new and expectant mothers dying in the US?
- 2017‑10‑31:
How the monstrous Weierstrass function paved the way for modern math.
- 2017‑10‑31:
Cray: how to program a supercomputer.
- 2017‑10‑31:
Dataviz project: a collection of data visualizations to get inspired and find the right type.
- 2017‑10‑31:
Most websites don't need to vibrate: a cost-benefit approach to improving browser security.
- 2017‑10‑31:
Same stats, different graphs: manipulating datasets through simulated annealing.
- 2017‑10‑31:
Approximate frequency counts over data streams.
- 2017‑10‑30:
Near future of programming languages.
- 2017‑10‑30:
Scaling the GitLab PostgreSQL database.
- 2017‑10‑30:
Oldest recorded solar eclipse helps date the Egyptian pharaohs.
- 2017‑10‑30:
Colliding neutron stars are "standard sirens" that tell us how fast the universe is expanding.
- 2017‑10‑30:
Investigation: WannaCry cyber attack and the NHS.
- 2017‑10‑29:
The meaning of Google AMP.
- 2017‑10‑29:
The Internet Worm of 1988.
- 2017‑10‑29:
Stealing Amazon EC2 keys via an XSS vulnerability.
- 2017‑10‑29:
Some of the world's biggest energy storage schemes.
- 2017‑10‑29:
The cubehelix colour scheme.
- 2017‑10‑29:
Better than rainbows: matplotlib alternative colourblind-aware colourmaps.
- 2017‑10‑29:
How to monkey-patch the Linux kernel with systemtap.
- 2017‑10‑29:
Replace your exploit-ridden Intel x86 firmware with a Linux kernel
- 2017‑10‑29:
Antarctica's illicit Ingress scene
- 2017‑10‑28:
Slack SAML authentication bypass vulnerability.
- 2017‑10‑28:
I watched all of the Chrome Dev Summit 2017 videos so you don't have to.
- 2017‑10‑27:
It's getting clearer: the diet-cancer connection points to sugar and carbs.
- 2017‑10‑27:
Implementing Stripe-like idempotency keys in PostgreSQL.
- 2017‑10‑27:
TLS-N: non-repudiation of data served over TLS.
- 2017‑10‑27:
Disk|Crypt|Net: rethinking the stack for high-performance video streaming.
- 2017‑10‑27:
Titan: the poor man's Atlas?
- 2017‑10‑27:
Automatically submitting your Internet-Draft from GitHub.
- 2017‑10‑27:
Who guards the guards? Formal validation of the ARM v8-M architecture specification.
- 2017‑10‑26:
High-performance GPU computing in the Julia programming language.
- 2017‑10‑25:
ZFSin: OpenZFS ported to Windows.
- 2017‑10‑25:
Don't use a pencil: a key to Brexit's Russian bots.
- 2017‑10‑25:
Testing DNSSEC public keys for the ROCA vulnerability.
- 2017‑10‑25:
Barbarian: a sword font.
- 2017‑10‑25:
One-level storage system: virtual memory on the Manchester Ferranti Atlas.
- 2017‑10‑25:
Papers on virtual memory and working sets.
- 2017‑10‑25:
Why do so few black students go to Oxbridge?
- 2017‑10‑25:
More taste, less greed? or, sending UNIX to the fat farm.
- 2017‑10‑25:
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask).
- 2017‑10‑25:
IP addresses considered harmful.
- 2017‑10‑25:
A software-based approach to identify heavy hitters in 10Gbit/s DNS traffic.
- 2017‑10‑25:
One Debian developer's preferred packaging setup.
- 2017‑10‑25:
I deb, you deb, everybody debs: Debian packaging for beginners and experts alike.
- 2017‑10‑25:
TimescaleDB: PostgreSQL made scalable for time-series data.
- 2017‑10‑25:
Amazon Aurora: design considerations for high throughput cloud-native relational databases.
- 2017‑10‑25:
Short-lived certificates at Netflix.
- 2017‑10‑24:
Executive function impairment in high-IQ adults with ADHD.
- 2017‑10‑24:
Infineon ROCA: Welp, there go my Git signatures.
- 2017‑10‑24:
First Timers Only: friendly open source projects reserve specific issues for new contributors.
- 2017‑10‑24:
The mathematics of 2048: counting states with combinatorics.
- 2017‑10‑24:
Buffer overflow in musl-libc DNS response parser.
- 2017‑10‑24:
Surviving IPv6 fragmentation.
- 2017‑10‑24:
On the passive measurability of RTT/loss of QUIC traffic.
- 2017‑10‑24:
How to write a stunt server using raw sockets in IPv6.
- 2017‑10‑24:
A history of the ampersand.
- 2017‑10‑24:
How Merkle trees enable the decentralized web.
- 2017‑10‑24:
What everybody gets wrong about Jekyll and Hyde.
- 2017‑10‑24:
The future of DNSSEC at the RIPE NCC.
- 2017‑10‑24:
Why does one NGINX worker take all the load?
- 2017‑10‑24:
Introduction to the Zig programming language: "more pragmatic than C".
- 2017‑10‑24:
Recent IETF BGP work addressing operational challenges.
- 2017‑10‑24:
IPv6 prefix assignment for end-users: persistent vs non-persistent, and what size to choose.
- 2017‑10‑24:
cronic: a cure for chronic cron spam.
- 2017‑10‑23:
This is what the no-deal Brexit cliff edge looks like.
- 2017‑10‑23:
The DUHK attack: don't use hard-coded keys for RNG seeds.
- 2017‑10‑23:
.Amsterdam refuses to publish Whois records as ICANN whois GDPR row escalates.
- 2017‑10‑23:
DéjàVu: a map of code duplication on GitHub.
- 2017‑10‑23:
Manipulating Maintainers: how to persuade members of an open source community to help you.
- 2017‑10‑23:
UCAS statistics: Is there bias in university admissions?
- 2017‑10‑23:
Filesystem error handling / improving error checking in C / funding robustness research.
- 2017‑10‑23:
The Atlas of the Underworld shows Earth's interior is teeming with dead plates.
- 2017‑10‑23:
Best trackballs 2017.
- 2017‑10‑23:
Danish numbers are obscurely 20-based.
- 2017‑10‑23:
ChrysaLisp: TAOS-flavoured parallel OS, with GUI, terminal, OO assembler, class libraries, C-Script, and more...
- 2017‑10‑23:
Genode: a capability-oriented microkernel OS.
- 2017‑10‑22:
Ghostwatch: the Halloween hoax that changed the language of television.
- 2017‑10‑22:
Android getting support for DNS over TLS.
- 2017‑10‑22:
A README maturity model.
- 2017‑10‑22:
How did Arron Banks afford to bankroll Brexit?
- 2017‑10‑22:
MENACE: machine educable noughts and crosses engine, a matchboxes-and-beads computer.
- 2017‑10‑22:
Reusable and type-safe functional options for Golang APIs.
- 2017‑10‑22:
The self-referential functional option pattern in Golang.
- 2017‑10‑22:
Successful hotfire test of Blue Origin BE-4 reusable high-thrust rocket engine.
- 2017‑10‑22:
Sugar is a toxic agent that creates conditions for disease.
- 2017‑10‑22:
zsync: download files over http using the rsync algorithm.
- 2017‑10‑21:
The rise and fall of the Lyons' Cornerhouses and their Nippy waitresses.
- 2017‑10‑21:
The largest left truncatable prime.
- 2017‑10‑21:
Autodesk Recap360: turn photos into 3D models.
- 2017‑10‑21:
Nationalisation of Carlisle pubs during the First World War.
- 2017‑10‑21:
Some examples of historical music notation.
- 2017‑10‑21:
Battle with a phantom PostgreSQL WAL segment.
- 2017‑10‑21:
IPv6 Buddy: a keyboard for typing hex.
- 2017‑10‑21:
co2: an object system for C.
- 2017‑10‑21:
Object oriented programming in C.
- 2017‑10‑21:
Object-oriented programming in ANSI C.
- 2017‑10‑21:
Google's quantum computing plans upended by IBM's 56 qubit classical computing simulation.
- 2017‑10‑21:
Vikings razed the forests. Can Iceland regrow them?
- 2017‑10‑21:
Don't style your marketing emails.
- 2017‑10‑20:
Female homicide rate dropped 17% after Craigslist launched its erotic services platform.
- 2017‑10‑20:
How I socially engineer myself into high security facilities.
- 2017‑10‑20:
Pointer free programming and the future of Nim.
- 2017‑10‑19:
Over 30,000 published studies could be wrong due to contaminated cells.
- 2017‑10‑19:
Objective-C and fork() in macOS 10.13.
- 2017‑10‑19:
Why Ruby app servers break on macOS High Sierra: fork safety in Objective C frameworks.
- 2017‑10‑19:
X.org server for Android.
- 2017‑10‑19:
Termux: terminal emulator and Debian-style userland as an Android app.
- 2017‑10‑19:
Linux on Samsung Galaxy smartphones.
- 2017‑10‑19:
Ad industry insiders profited from ad fraud scheme that stole $millions.
- 2017‑10‑19:
Hey Siri: an on-device DNN-powered voice trigger for Apple's personal assistant.
- 2017‑10‑19:
Browser security beyond sandboxing: Microsoft exploits Google Chrome.
- 2017‑10‑18:
ML modules and Haskell type classes: a constructive comparison.
- 2017‑10‑18:
AlphaGo Zero: Learning from scratch.
- 2017‑10‑18:
mod_md: ACME support for the Apache httpd.
- 2017‑10‑18:
The mathematical genius of Auto-Tunea.
- 2017‑10‑18:
Exploring lock-free Rust: from locks, via atomics, to Crossbeam.
- 2017‑10‑17:
Fact check markup: explain to Google what claims are true or false.
- 2017‑10‑17:
End all immigration controls: they're a sign we value money more than people.
- 2017‑10‑17:
ROCA: critical vulnerability in Infineon security chips.
- 2017‑10‑17:
TAOS Operating System.
- 2017‑10‑15:
How the oligarchy wins: lessons from ancient Greece .
- 2017‑10‑15:
Help test out ThinLTO! Another feature aiming to reduce Rust's compile times.
- 2017‑10‑15:
Beyond XX and XY: the extraordinary complexity of sex determination.
- 2017‑10‑15:
Switching from Common Lisp to Julia.
- 2017‑10‑15:
The Journal of Open Source Software: a developer friendly journal for research software packages
- 2017‑10‑15:
Boiling lead and black art: a history of mathematical typography.
- 2017‑10‑14:
The impossible dream of USB-C.
- 2017‑10‑14:
Interactive scientific computing, Goldilocks languages, and Julia.
- 2017‑10‑14:
Some insights from a Julia developer.
- 2017‑10‑14:
5 things we learned from Google Waymo's self-driving car NTSB report.
- 2017‑10‑14:
I'm an environmental journalist, but I never write about overpopulation. Here's why.
- 2017‑10‑14:
Why the assholes are winning: money trumps all.
- 2017‑10‑14:
Is the inflationary universe a scientific theory?
- 2017‑10‑14:
By analysing hundreds of police interviews, two scientists have revolutionised interrogation.
- 2017‑10‑13:
freno: mitigating MySQL replication lag and reducing read load at GitHub.
- 2017‑10‑13:
Reverse proxy grapher.
- 2017‑10‑13:
Exploding Git repository: a billion blobs.
- 2017‑10‑12:
Notable features in C++17.
- 2017‑10‑11:
ADHD: a lifelong struggle.
- 2017‑10‑11:
Reasons Kubernetes is cool.
- 2017‑10‑11:
Block comments considered harmful.
- 2017‑10‑11:
A template for a run book / system operation manual.
- 2017‑10‑11:
Disabling the Intel Management Engine.
- 2017‑10‑11:
PACELC, Hazelcast, and the mythical PA/EC system.
- 2017‑10‑10:
Fake crypto: Microsoft Outlook S/MIME cleartext disclosure.
- 2017‑10‑10:
A bug has no name: multiple heap buffer overflows in the Windows DNS client.
- 2017‑10‑10:
Coding style as a failure of language design.
- 2017‑10‑10:
Macro-less code execution with DDE in Microsoft Word.
- 2017‑10‑10:
The asynchronous computability theorem: applying topology to distributed systems.
- 2017‑10‑10:
The absurdly underestimated dangers of spreadsheet compromise via CSV injection.
- 2017‑10‑10:
A decade of Amazon Dynamo.
- 2017‑10‑09:
Breaking Ed25519 in WolfSSL using differential power analysis.
- 2017‑10‑09:
"Peer review" is younger than you might think. Does that mean it can go away?
- 2017‑10‑08:
Thoughts on Microsoft's time-travel debugger.
- 2017‑10‑08:
Fairchild Semiconductor: the 60th anniversary of a Silicon Valley legend.
- 2017‑10‑08:
The story behind the photo of the Lightning crash at Hatfield in 1962.
- 2017‑10‑08:
How to avoid unwanted wakeups when killing lots of processes.
- 2017‑10‑07:
A branchless UTF-8 decoder.
- 2017‑10‑07:
What even is compiler correctness?
- 2017‑10‑07:
iOS 11's misleading "off-ish" setting for Bluetooth and Wi-Fi is bad for security and battery life.
- 2017‑10‑06:
Fast JVM startup with JDK 9.
- 2017‑10‑05:
The magic phrase, "we don't do that here."
- 2017‑10‑05:
HoTTSQL: proving query rewrites with univalent SQL semantics.
- 2017‑10‑04:
The undercover story of the Chicago newspaper that bought a bar.
- 2017‑10‑04:
The story behind ICANN's decision to delay the DNSSEC root KSK rollover.
- 2017‑10‑04:
Brexit will hit Britain's overseas territories hard. Why is no one talking about it?
- 2017‑10‑04:
Useful GCC warning options not enabled by -Wall -Wextra.
- 2017‑10‑04:
Using an iPad Pro instead of a desktop computer.
- 2017‑10‑04:
Sequent NUMA-Q: a new commercial parallel-processing architecture. (1999)
- 2017‑10‑04:
8th: a gentle introduction to a modern Forth.
- 2017‑10‑04:
Cashing in on ATM malware: a comprehensive look at various attack types.
- 2017‑10‑04:
Random cyclic curves in the complex plane.
- 2017‑10‑04:
Times tables, Mandelbrot, and the heart of mathematics. (YouTube)
- 2017‑10‑04:
Beauty in mathematics: modular multiplication tables.
- 2017‑10‑04:
Common Lisp vs Racket vs Gerbil.
- 2017‑10‑04:
Gerbil Scheme has a state of the art macro and module system on top of the Gambit runtime.
- 2017‑10‑04:
Compiling switch/case: Are jump tables always fastest?
- 2017‑10‑03:
In 1973, I invented a 'girly drink' called Baileys.
- 2017‑10‑03:
What Tesla's big battery in South Australia is for.
- 2017‑10‑03:
Not all disagreements are opportunities to change your own mind.
- 2017‑10‑02:
Probot: GitHub apps to automate and improve your workflow.
- 2017‑10‑02:
Mitogen: an infrastructure code baseline that sucks less, or, why Ansible is slow.
- 2017‑10‑02:
Troubleshooting: a journey through Bird, HAProxy, cURL, and the Linux dentry cache.
- 2017‑10‑02:
RELAY: past, present, and future. (1987)
- 2017‑10‑02:
Toward a predictive-processing theory of depression.
- 2017‑10‑02:
Advanced secondary DNS for the technically inclined.
- 2017‑10‑02:
No brogrammers: Practical tips for writing inclusive job ads.
- 2017‑10‑02:
What a nerdy debate about p-values shows about science, and how to fix it.
- 2017‑10‑01:
Haxl: a big hammer for concurrency. (YouTube)
- 2017‑10‑01:
How deeply are STEM students learning? They often guess and merely manipulate symbols without insight.
- 2017‑10‑01:
DNA from old skeleton suggests humanity's been here longer than we thought.
- 2017‑10‑01:
How science saved me from pretending to love wine.
- 2017‑09‑30:
What's In the Cache? DNS cache hit rates.
- 2017‑09‑30:
Cache effect of shared DNS resolver.
- 2017‑09‑30:
BotDigger: Detecting DGA bots in a single network using DNS traffic.
- 2017‑09‑30:
Bad autoconf tests with nested functions are incompatible with clang.
- 2017‑09‑30:
Why are Nazis so afraid of clowns?
- 2017‑09‑30:
BIND 9.12 refactoring and performance improvements.
- 2017‑09‑30:
A look at RFC 8145 DNSSEC trust anchor signalling.
- 2017‑09‑30:
RFC 7706 vs RFC 8198 for root DNS zone performance and resilience.
- 2017‑09‑29:
The pragmatic case for moving Britain's capital to Manchester.
- 2017‑09‑29:
Serving 100 Gbps from a Netflix FreeBSD Open Connect Appliance.
- 2017‑09‑29:
What happened to the folding UK plug?
- 2017‑09‑28:
DNS for service discovery in HAProxy.
- 2017‑09‑28:
Identifying satellite interference due to GSM rebroadcast.
- 2017‑09‑28:
We need to talk about TLS session tickets.
- 2017‑09‑28:
Background information on the DNSSEC root key rollover postponement.
- 2017‑09‑28:
How Crossrail is using 3D-printing to build its stations.
- 2017‑09‑28:
When filters fail: These cases show we can't trust algorithms to clean up the internet.
- 2017‑09‑28:
DNSSEC KSK rollover postponed.
- 2017‑09‑28:
Languages don't all have the same number of terms for colors. Here's a new theory why.
- 2017‑09‑28:
detect.location: getting iOS location data via photo EXIF access.
- 2017‑09‑28:
Software is a long con.
- 2017‑09‑28:
HAProxy vs nginx: Why you should NEVER use nginx for load balancing!
- 2017‑09‑28:
ntpd won't save you from one particular rogue bit.
- 2017‑09‑27:
Ed25519 for DNSSEC.
- 2017‑09‑27:
git git git git git
- 2017‑09‑27:
BOOMv2: an open-source out-of-order RISC V core.
- 2017‑09‑27:
Feminism, equality, chattels, and judgement.
- 2017‑09‑27:
Flags are not languages.
- 2017‑09‑27:
The history of Sears predicts almost everything Amazon is doing.
- 2017‑09‑26:
Comparing differential equation solvers in C, Fortran, Julia, Maple, Mathematica, MATLAB, Python, and R.
- 2017‑09‑26:
cloudflare/bn256 implements a particular bilinear group at the 128-bit security level, ~10x or ~20x faster.
- 2017‑09‑26:
Cloudflare Geo Key Manager: identity-based encryption for private keys in a TLS CDN.
- 2017‑09‑25:
Mathematics and the state of being stuck.
- 2017‑09‑25:
Org-mode is one of the most reasonable lightweight markup languages.
- 2017‑09‑25:
A quick introduction to Graphviz.
- 2017‑09‑25:
Antifragility 101.
- 2017‑09‑24:
The Canpaign for North Africa: a notorious board game that takes 1,500 hours to complete.
- 2017‑09‑24:
Branded in memory: how well can people draw a logo from memory?
- 2017‑09‑23:
APFS: a backup software developer's perspective.
- 2017‑09‑23:
GPS without COCOM limits.
- 2017‑09‑23:
Super-accurate GPS chips coming to smartphones in 2018.
- 2017‑09‑23:
Franchise: an open source in-browser SQL notebook.
- 2017‑09‑23:
lnav: a log file navigator.
- 2017‑09‑22:
How Portugal is winning the War on Drugs that the USA is losing.
- 2017‑09‑22:
Time to speak up for Article 15 of the E-commerce Directive.
- 2017‑09‑22:
API Monitor: spy on Windows API calls and COM interfaces.
- 2017‑09‑22:
Implementing Berkeley sockets in System V release 4.
- 2017‑09‑22:
How I hacked hundreds of companies through their helpdesk.
- 2017‑09‑22:
Seveneves and the Roche limit.
- 2017‑09‑22:
"The moon blew up without warning and for no apparent reason": a simulation.
- 2017‑09‑22:
Golang: Ten years and climbing.
- 2017‑09‑21:
Weather forecasting is better than it's ever been.
- 2017‑09‑21:
The extraordinary case of the Guevedoces, whose penises do not grow until puberty.
- 2017‑09‑21:
Parents, children, CDS/CDNSKEY records, and dnssec-cds.
- 2017‑09‑21:
Measuring the security of closed DNS resolvers by probing via SMTP.
- 2017‑09‑21:
Locks, Little's Law, and the universal scalability law.
- 2017‑09‑21:
Effects without monads: non-determinism.
- 2017‑09‑21:
CLKSCREW: attacking ARM TrustZone using security-oblivious energy management.
- 2017‑09‑21:
Booleans and enums.
- 2017‑09‑21:
Turning off Wi-Fi and Bluetooth in iOS 11's control center doesn't actually turn them off.
- 2017‑09‑21:
Inception drive: a compact, infinitely variable transmission for robotics.
- 2017‑09‑20:
jwz: "HTML email, was that your fault?"
- 2017‑09‑20:
Clocks and hardware design for software engineers.
- 2017‑09‑20:
A rare peek inside a 400Gbit/s Cisco network processor.
- 2017‑09‑20:
Brexit negotiations: how is the UK doing?
- 2017‑09‑20:
A longitudinal, end-to-end view of the DNSSEC ecosystem.
- 2017‑09‑20:
Allocation efficiency in high-performance Golang services.
- 2017‑09‑20:
Evolution of data structures in Yandex.Metrica.
- 2017‑09‑19:
Why Keccak is not ARX.
- 2017‑09‑19:
Fuzzing Tales 0x01: Yadifa DNS.
- 2017‑09‑19:
Offshoring roulette: lessons from outsourcing to India, China, and the Philippines.
- 2017‑09‑19:
Undercover police operation to catch close-pass overtaking reduced cyclist casualties by 20%.
- 2017‑09‑19:
An efficient academic journal.
- 2017‑09‑19:
Simple Set game proof stuns mathematicians, leading to advances in combinatorics.
- 2017‑09‑19:
To type or not to type: 15% of JavaScript bugs detectable by TypeScript or Flow.
- 2017‑09‑18:
Unix for TOPS-20 users. (1987)
- 2017‑09‑18:
Optionsbleed: HTTP OPTIONS method can leak a misconfigured Apache server's memory.
- 2017‑09‑18:
The future of HHVM, Facebook's fast PHPish runtime.
- 2017‑09‑17:
Fuchsia: Google's modular, capability-based, non-Unix operating system.
- 2017‑09‑17:
ptexplore: Linux process page table explorer.
- 2017‑09‑17:
Pirate black open access is trumping green and gold and we must change our approach to academic journals.
- 2017‑09‑17:
Root causes of TLS certificate errors for Google Chrome users.
- 2017‑09‑16:
Interview with Martha Wells about the second Murderbot book.
- 2017‑09‑16:
The week my husband left and my house was burgled I secured a grant to begin the BRCA1 project.
- 2017‑09‑16:
The Minskytron: early graphics demos on an in-browser PDP-1 emulator.
- 2017‑09‑16:
The Minsky circle algorithm.
- 2017‑09‑16:
proptest: Hypothesis-style property testing for Rust.
- 2017‑09‑16:
ZARM: the Bremen microgravity drop tower.
- 2017‑09‑16:
How not to land a SpaceX orbital rocket booster. (YouTube)
- 2017‑09‑16:
A working game of Tetris implemented in Conway's Game of Life.
- 2017‑09‑16:
LoRa backscatter: data transmission over >400m using <10μW.
- 2017‑09‑16:
A translation of the Polari in "Putting on the Dish".
- 2017‑09‑16:
A brief history of Polari: the curious after-life of the dead language for gay men.
- 2017‑09‑16:
e-dumper: the world's largest electric vehicle.
- 2017‑09‑15:
Where are you on the IPv6 adoption curve?
- 2017‑09‑15:
Rising CO2 and the great nutrient collapse.
- 2017‑09‑15:
Rich's B compiler
- 2017‑09‑15:
RFC 8187: the first RFC containing non-ASCII characters.
- 2017‑09‑15:
Building the DOM faster: speculative parsing, async, defer and preload.
- 2017‑09‑15:
Google's influence over its network of influencers.
- 2017‑09‑15:
Meet the font detectives who ferret out fakery.
- 2017‑09‑14:
migra: like diff for PostgreSQL schemas; migrations made almost painless.
- 2017‑09‑14:
The origins of malloc().
- 2017‑09‑14:
Compile-time Mandelbrot set in Rust.
- 2017‑09‑14:
Understanding the prevalence of web traffic interception.
- 2017‑09‑14:
Proporti.onl: gender distribution of people you follow and your followers on Twitter.
- 2017‑09‑13:
Formally verified cryptography for Firefox 57.
- 2017‑09‑13:
Flying economy class is so cramped it could be a death trap.
- 2017‑09‑13:
Here's what happens when you try to replicate climate contrarian papers.
- 2017‑09‑13:
Reconstruction of a train wreck: how priming research went off the rails. (Daniel Kahneman, Thinking Fast and Slow)
- 2017‑09‑12:
Announcing Topicbox: FastMail's new product for teams.
- 2017‑09‑11:
Nearby houses with "twin" street addresses.
- 2017‑09‑11:
White shark kayak: the origin of the fake picture of the shark in the flooded road.
- 2017‑09‑11:
A copyright vote that could change the EU's Internet.
- 2017‑09‑11:
The proposed European copyright directive's effects on open source software development.
- 2017‑09‑11:
How to find out if/why a server is dropping packets.
- 2017‑09‑10:
How f.root-servers.net has performed since Cloudflare joined its anycast cloud.
- 2017‑09‑10:
How Brexit will affect your human rights.
- 2017‑09‑10:
Louis C.K. would rather ignore those assault rumours, but at this point, he can't just let his art do the talking.
- 2017‑09‑10:
The problem with calling women 'females'.
- 2017‑09‑10:
Has the Voynich manuscript really been solved?
- 2017‑09‑10:
The Network and Information Systems Directive's effect on Internet companies in the UK.
- 2017‑09‑10:
Wren: a small, fast, class-based concurrent scripting language.
- 2017‑09‑10:
.uk domain transfers are scary.
- 2017‑09‑09:
The Corpus Christi prime.
- 2017‑09‑09:
Identity fraud, credit reports, and you.
- 2017‑09‑09:
Things found on GitHub: shell history.
- 2017‑09‑09:
A guide to filtered permeability.
- 2017‑09‑09:
On the discussion of security vulnerabilities. (1853)
- 2017‑09‑09:
Download 67,000 historic maps from Stanford's David Rumsey map collection.
- 2017‑09‑09:
The "premium mediocre" life of Maya Millennial.
- 2017‑09‑09:
A first look at CoreDNS.
- 2017‑09‑07:
The solution to the Voynich manuscript.
- 2017‑09‑07:
The Uncomfortable: a collection of deliberately inconvenient objects.
- 2017‑09‑07:
serve-stale in BIND: Akamai's contribution to DNS / Internet resiliency.
- 2017‑09‑07:
Infosec incident response: protecting individual rights under the GDPR.
- 2017‑09‑07:
In defence of NAT.
- 2017‑09‑07:
Optimizing nginx on Linux for high throughput and low latency at Dropbox.
- 2017‑09‑07:
Librsvg's build infrastructure: autotools and Rust.
- 2017‑09‑07:
5 tips for writing small CLI tools in Rust.
- 2017‑09‑07:
Mison: a fast non-FSM-based JSON parser.
- 2017‑09‑07:
Performance evaluation of elfmalloc, a general-purpose malloc() replacement written in Rust.
- 2017‑09‑06:
Surfing uncertainty: the predictive processing model of human cognition.
- 2017‑09‑06:
British antifa before and after World War II.
- 2017‑09‑06:
Wind farms are not the bird slayers they're made out to be.
- 2017‑09‑06:
How to recognize burnout before you're burned out.
- 2017‑09‑06:
A serf on Google's farm.
- 2017‑09‑06:
Google: time to return to not being evil.
- 2017‑09‑06:
Wind is one of the cheapest sources of electricity, and it's getting cheaper.
- 2017‑09‑05:
Some were meant for C: the endurance of an unmanageable language.
- 2017‑09‑05:
Efficient air-conditioning beams heat into space.
- 2017‑09‑05:
Solaris to Linux migration 2017.
- 2017‑09‑05:
Is systemd's hand-rolled dbus-over-ssh tunnel a security worry?
- 2017‑09‑05:
Game of registrars: an empirical analysis of post-expiration domain name takeovers.
- 2017‑09‑05:
ansible-lint: Best practices checker for Ansible.
- 2017‑09‑05:
Invisible Manipulation: 10 ways our data is being used against us.
- 2017‑09‑05:
Zero-confirmation .uk domain hijacking with eNom.
- 2017‑09‑05:
SharknAT&To: grievous vulnerabilities in AT&T U-verse modems.
- 2017‑09‑04:
Clear Containers and CRI-O: a VM per Kubernetes container, without Docker.
- 2017‑09‑04:
Claude Shannon: mathematician, engineer, genius... and juggler?
- 2017‑09‑04:
The vacuity of postmodernist methodology.
- 2017‑09‑04:
Six year old PDF loop bug affects most major implementations.
- 2017‑09‑04:
Quantum reconstruction: rewriting the axioms of quantum theory from scratch, to understand what it all means.
- 2017‑09‑04:
Outlawing war? The Kellogg-Briand pact actually worked.
- 2017‑09‑04:
Multiple perspectives on technical problems and solutions: architecture review at Etsy.
- 2017‑09‑04:
Google cloud load balancer outage postmortem.
- 2017‑09‑04:
The Netherlands: an agricultural giant showing what the future of farming could look like.
- 2017‑09‑03:
Is there a winning strategy in Tetris? (For modern versions, yes.)
- 2017‑09‑03:
Is there winning strategy in Tetris? (In general, no.)
- 2017‑09‑03:
Perl as PID 1 under Docker.
- 2017‑09‑03:
An introduction to managing secrets safely with version control systems.
- 2017‑09‑02:
Brexit talks cannot succeed.
- 2017‑09‑02:
LuaTeX comes of age.
- 2017‑09‑01:
Barriers to equality in academia: women in computer science at MIT. (1983)
- 2017‑09‑01:
F*: an ML-like functional programming language aimed at program verification.
- 2017‑08‑31:
Following Hurricane Katrina, an amazing decade of climate research.
- 2017‑08‑31:
Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames?
- 2017‑08‑31:
Reducing Python's startup time.
- 2017‑08‑31:
Concurrent JavaScript: It can work!
- 2017‑08‑30:
Gifpop: turn your GIFs into lenticular prints.
- 2017‑08‑30:
A Polaroid-style Raspberry Pi camera that prints a GIF instantly.
- 2017‑08‑30:
"Torrential": a cruelly ironic etymology.
- 2017‑08‑30:
Relaxed-memory concurrency synchronization patterns.
- 2017‑08‑30:
Fully automatic DNSSEC delegation updates at CZ.NIC with FRED and Knot.
- 2017‑08‑30:
Urban maths: tipping point, or, what is the bias of perfect dice?
- 2017‑08‑30:
Eyes change over time, thwarting iris scanners.
- 2017‑08‑30:
How to use `dig` to find details of the Google Public DNS cluster you are using.
- 2017‑08‑30:
Hurricane Harvey didn't come out of the blue. Now is the time to talk about climate change.
- 2017‑08‑30:
Don't fall for Babylonian trigonometry hype.
- 2017‑08‑29:
Fascinating experiments that show what happens when mercury and aluminium are combined. (video)
- 2017‑08‑29:
Hurricane Harvey is what climate change looks like.
- 2017‑08‑29:
How to make Python run as fast as Julia.
- 2017‑08‑28:
What makes a good REPL?
- 2017‑08‑28:
Disabling Intel ME 11 via undocumented US Government High Assurance Platform mode.
- 2017‑08‑28:
AWS Parameter Store: the right way to manage secrets with AWS.
- 2017‑08‑28:
6 months of working remotely taught me a thing or ten.
- 2017‑08‑28:
Akira Miyagawa live orchestral mashup: Beethoven's Symphony No. 5 vs Mambo No. 5. (YouTube)
- 2017‑08‑28:
On (respect for) children as autonomous human beings.
- 2017‑08‑28:
Attack of the 50 foot blockchain! Bitcoin, Ethereum, and smart contracts.
- 2017‑08‑27:
Where in Europe does an electric car reduce CO2 emissions?
- 2017‑08‑26:
Two spirits, one heart, five genders: how Europeans tried to extinguish Native American views on gender.
- 2017‑08‑26:
How the music of Rogue One links to A New Hope.
- 2017‑08‑25:
Better letterer: comic lettering tips.
- 2017‑08‑25:
How to piss off a failed super-soldier.
- 2017‑08‑25:
Threading the celestial needle: catching the Great American Eclipse at 35,000 feet.
- 2017‑08‑25:
VW's strike in Slovakia exposes a European divide.
- 2017‑08‑25:
Same day ACH: moving payments faster in the USA.
- 2017‑08‑25:
How American bank payments (ACH) work: A developer perspective.
- 2017‑08‑25:
Rules for new FPGA designers.
- 2017‑08‑25:
On crimes and punishments, torture and retribution, deterrence and Beccaria.
- 2017‑08‑25:
Enlightenment technology; A culture of growth: the origins of the modern economy.
- 2017‑08‑25:
On progress and historical change.
- 2017‑08‑24:
Here at the end of all things: on losing oneself in maps of fantasy worlds:
- 2017‑08‑24:
Got Phish: how/where to report malicious web sites.
- 2017‑08‑24:
What made the Moon? New ideas try to rescue a troubled theory.
- 2017‑08‑24:
We're racing towards another private debt crisis, so why did no one see it coming?
- 2017‑08‑24:
Rethinking the dbus message bus.
- 2017‑08‑24:
D as a better C.
- 2017‑08‑23:
The only 4 spaghetti recipes you'll ever need.
- 2017‑08‑23:
The beauty of Bresenham's algorithm.
- 2017‑08‑23:
Mathematicians tame rogue waves, illuminating future of LED lighting.
- 2017‑08‑22:
Hackers are the real obstacle for self-driving vehicles.
- 2017‑08‑22:
IPv6, large UDP packets, and the DNS.
- 2017‑08‑22:
Reverse engineering a 1970s DTMF dialler chip.
- 2017‑08‑22:
Typing with pleasure, and low latency.
- 2017‑08‑22:
Four MLs (and a Python).
- 2017‑08‑21:
Starting Star Wars: How George Lucas came to create a galaxy.
- 2017‑08‑21:
Inequality in the USA: understanding the historic divergence between productivity and a typical worker's pay.
- 2017‑08‑20:
Poland's oldest university denies Google's right to patent ANS compression.
- 2017‑08‑20:
How do I improve my storytelling?
- 2017‑08‑20:
"I teach dirty tricks": the explosives expert who shows armies how to deal with terrorists.
- 2017‑08‑20:
Everything you always wanted to know about optical fibre networking, but were afraid to ask.
- 2017‑08‑20:
BothanSpy and Gyrfalcon: CIA SSH hacking tools.
- 2017‑08‑19:
Why PS4 downloads are so slow.
- 2017‑08‑19:
A crash course on ML modules.
- 2017‑08‑19:
Linguistic antipatterns: what they are and how developers perceive them.
- 2017‑08‑19:
Towards a JavaScript binary AST.
- 2017‑08‑19:
Vue.js vs React.
- 2017‑08‑19:
What next in programming languages?
- 2017‑08‑19:
What a border collie taught a linguist about language.
- 2017‑08‑18:
NASA's sound suppression water system.
- 2017‑08‑18:
How Postgres makes transactions atomic.
- 2017‑08‑17:
Hands on with the SHACamp 2017 badge.
- 2017‑08‑17:
At last, a big, successful trial of probiotics.
- 2017‑08‑17:
Dilution of whisky and flavour: a molecular perspective.
- 2017‑08‑17:
The origin of complex life on Earth just got a little less mysterious.
- 2017‑08‑17:
Peanut allergy cured in majority of children in immunotherapy trial.
- 2017‑08‑16:
The dwarfs of our vocabulary: etymologies of small words.
- 2017‑08‑16:
APIs as infrastructure: future-proofing Stripe with versioning.
- 2017‑08‑15:
Iris: a scalable, accurate, and ethical method to measure global manipulation of DNS resolution.
- 2017‑08‑15:
The Meson build system, used by GTK/Gnome.
- 2017‑08‑15:
rustgo: calling Rust from Golang with near-zero overhead.
- 2017‑08‑14:
German universities take on Elsevier.
- 2017‑08‑14:
The reasons HMS Queen Elizabeth has two islands.
- 2017‑08‑14:
Consistent hashing with bounded loads.
- 2017‑08‑13:
A theory of jerks: Are you surrounded by fools? Are you the only reasonable person around?
- 2017‑08‑12:
Hyperscan: a high-performance PCRE-compatible multiple regex matching library.
- 2017‑08‑11:
OpenGeofiction: a map of an imaginary world, created by a community of worldbuilders.
- 2017‑08‑11:
The end of Libor.
- 2017‑08‑11:
British bank regulators are abandoning LIBOR, the benchmark for hundreds of trillions of dollars in financial transactions.
- 2017‑08‑11:
UX brutalism.
- 2017‑08‑11:
Small functions considered harmful.
- 2017‑08‑11:
Compromise on checkout: vulnerabilities in gIt and other SCM tools.
- 2017‑08‑11:
Crafting plausible fantasy maps.
- 2017‑08‑11:
Font-size: an unexpectedly complex CSS property.
- 2017‑08‑11:
Why Github can't host the Linux kernel.
- 2017‑08‑10:
Scrapmetal: scrap your boilerplate in Rust.
- 2017‑08‑10:
Why does Sattolo's algorithm produce a permutation with exactly one cycle?
- 2017‑08‑10:
For fans of the movie WARGAMES: a list of all the nuclear war scenarios stored in the W.O.P.R. computer.
- 2017‑08‑09:
IETF 99 DNS activity.
- 2017‑08‑08:
Approaching the physical limits of storage technology.
- 2017‑08‑08:
Counting quotient filter: making every bit count. (Better than Bloom filters!)
- 2017‑08‑08:
Localhost entries in DNS zones can lead to "same site" scripting web vulnerabilities.
- 2017‑08‑07:
Tolkien's map and the messed-up mountains of Middle-Earth.
- 2017‑08‑07:
"Not even wrong!" Why does nobody like pilot-wave theory?
- 2017‑08‑07:
Why don't more quantum physicists subscribe to pilot wave theory?
- 2017‑08‑07:
Pilot-wave quantum theory gains experimental support.
- 2017‑08‑07:
A brief history of quantum alternatives.
- 2017‑08‑07:
An 18th-century horse that Eclipsed all the others.
- 2017‑08‑07:
How do you find integer solutions to x/(y + z) + y/(x + z) + z/(x + y) = 4?
- 2017‑08‑07:
Why many smart contract use cases are simply impossible.
- 2017‑08‑07:
Prostitution decriminalized: Rhode Island's experiment.
- 2017‑08‑07:
Can a living creature be as big as a galaxy?
- 2017‑08‑05:
Optimizing HAMT (hash array mapped tries) for fast and lean immutable JVM collections.
- 2017‑08‑05:
What the ctenophore says about the evolution of intelligence.
- 2017‑08‑05:
Which DNS registries offer the best protection for domain owners?
- 2017‑08‑04:
The slow currentTimeMillis().
- 2017‑08‑04:
The languages which almost became CSS.
- 2017‑08‑04:
The development of Chez Scheme.
- 2017‑08‑03:
306 million freely downloadable pwned passwords.
- 2017‑08‑03:
Elsevier acquires bepress, increasing its hold on open access and institution repositories.
- 2017‑08‑03:
Users, clients, and servers: the robustness principle and the web.
- 2017‑08‑02:
TypeScript's type system is Turing complete.
- 2017‑08‑02:
IBM and Sony cram up to 330 terabytes into tiny tape cartridge.
- 2017‑08‑02:
A practical guide to SQL transaction isolation levels.
- 2017‑08‑02:
RTFM v2: real-time for the masses on a Cortex-M with Rust.
- 2017‑08‑02:
Parsing NES ROM headers with nom and Rust.
- 2017‑08‑02:
Grokking Diesel, Rust's ORM.
- 2017‑08‑01:
Brexiteers using Ireland.
- 2017‑08‑01:
New evidence of British torture could overturn Northern Ireland ruling that became a blueprint for US torture.
- 2017‑08‑01:
Review: Nabokov's favorite word is mauve: what the numbers reveal about [] writing.
- 2017‑08‑01:
US DoD encyclopedia of ethical failure.
- 2017‑08‑01:
see-phit: A C++ HTML template engine that uses compile time HTML parsing.
- 2017‑08‑01:
Recursives in the wild: engineering authoritative DNS servers.
- 2017‑07‑31:
Ending the anomaly: achieving low latency and airtime fairness in WiFi.
- 2017‑07‑31:
Dolphin Nintendo emulator ubershaders: a ridiculous solution to an impossible problem
- 2017‑07‑30:
Medicine's women problem.
- 2017‑07‑30:
A rant on usable security: run-time sandboxes from static analysis?
- 2017‑07‑29:
No Dunkirk spirit can save Britain from Brexit defeat.
- 2017‑07‑29:
An effective attack against the Argon2i hash function.
- 2017‑07‑29:
The Evolution of Trust: a game to teach game theory.
- 2017‑07‑29:
sandsifter: the x86 processor fuzzer.
- 2017‑07‑28:
Confession of a C/C++ programmer.
- 2017‑07‑28:
How to remove systemd from a Debian installation.
- 2017‑07‑28:
Farewell to systemd.
- 2017‑07‑28:
Sci-Hub's cache of pirated papers is so big, subscription journals are doomed, data analyst suggests.
- 2017‑07‑28:
Project Snowflake: non-blocking safe manual memory management in .NET.
- 2017‑07‑27:
Bodging: making chair legs around High Wycombe.
- 2017‑07‑27:
How to set up a cheap Chromebook for software development when travelling.
- 2017‑07‑26:
Why Is the Internet Archive painstakingly preserving Ted Nelson's junk mail?
- 2017‑07‑26:
Using BGP to acquire bogus TLS certificates.
- 2017‑07‑26:
Defining the undefinedness of C.
- 2017‑07‑25:
Why we rewrote Lua in JavaScript, to run in the browser.
- 2017‑07‑25:
Karn: an admin-friendly tool for creating seccomp and apparmor profiles.
- 2017‑07‑25:
A homemade robot that can crack a safe in 15 minutes. (video)
- 2017‑07‑25:
Esperanto: european or asiatic language?
- 2017‑07‑25:
gocmdpev: A command-line PostgreSQL query visualizer in Golang.
- 2017‑07‑25:
Snopes faces an ugly legal battle.
- 2017‑07‑24:
Fingerprint-based detection of DNS hijacks using RIPE Atlas.
- 2017‑07‑24:
Burglary, robbery, kidnapping and a shoot-out over... a domain name?!
- 2017‑07‑24:
Anthony Burgess' lost dictionary of slang.
- 2017‑07‑23:
Fast-key-erasure random-number generators.
- 2017‑07‑23:
How economists rode maths to become our era's astrologers.
- 2017‑07‑23:
mod_md: built-in Let's Encrypt (ACME) support for Apache httpd.
- 2017‑07‑23:
The future of education is plain text.
- 2017‑07‑22:
The incredible shitness of Solidity, the Ethereum progamming language.
- 2017‑07‑22:
SQLCipher: encrypted SQLite database store.
- 2017‑07‑22:
Free-libre / open source software (FLOSS) is commercial software.
- 2017‑07‑22:
colorForth replaces punctuation with colours.
- 2017‑07‑22:
Monospaced programming fonts with ligatures.
- 2017‑07‑21:
Long term data storage will be much less free than it used to be.
- 2017‑07‑21:
Is "information is physical" contentful?
- 2017‑07‑21:
Custom dynamically sized types are super annoying in Rust at the moment. (qp)
- 2017‑07‑21:
How to trick Symantec to revoke a cert with a fake private key, and how to check keys properly.
- 2017‑07‑20:
A FPGA friendly 32 bit RISC-V CPU implementation in SpinalHDL.
- 2017‑07‑20:
How devastating was the Black Death?
- 2017‑07‑20:
How Checkers was solved.
- 2017‑07‑20:
The hidden dungeons of the London Underground.
- 2017‑07‑20:
The mystery of the hanging S3 downloads: a TCP debugging tale.
- 2017‑07‑20:
Faces of open source software.
- 2017‑07‑20:
LeoCAD: LEGO model designer.
- 2017‑07‑20:
Undefined behavior and unsafe code guidelines for Rust.
- 2017‑07‑19:
Certified malice: phishing sites and TLS certs.
- 2017‑07‑19:
On the (perceived) value of EV TLS certs.
- 2017‑07‑19:
Fast complex arithmetic is complicated in C and C++.
- 2017‑07‑19:
Every place we used to think was a planet (until we knew better).
- 2017‑07‑19:
Playing for third place: the media vs database marketing.
- 2017‑07‑19:
Digital towbars for autonomous vehicles.
- 2017‑07‑18:
Bugs Everywhere: a distributed bugtracker with which code and bugs are tracked together.
- 2017‑07‑18:
A Mind at Play: how Claude Shannon invented the information age. (book review)
- 2017‑07‑17:
Introducing Log::ger, a low-overhead Perl logging module.
- 2017‑07‑17:
OVH 24h outage due to SAN failure following sudden power loss.
- 2017‑07‑17:
A deep dive into Multicore OCaml garbage collector.
- 2017‑07‑17:
Bangra: an LLVM-based programming infrastructure for high performance with multi-stage compilation at runtime.
- 2017‑07‑17:
Koka: a functional programming language with effect inference.
- 2017‑07‑17:
What are OCamlers' critiques of Haskell?
- 2017‑07‑17:
What are Haskellers' critiques of F# and OCaml?
- 2017‑07‑17:
Modular type classes.
- 2017‑07‑17:
Modular implicits for O'Caml.
- 2017‑07‑17:
Poly/ML: a multiprocessor implementation of Standard ML.
- 2017‑07‑17:
owl: an OCaml numerical library.
- 2017‑07‑16:
hobbes: Morgan Stanley's Haskell-like programming language.
- 2017‑07‑16:
git-dit: a decentralized issue tracker for git.
- 2017‑07‑16:
Do you know what a stinkpipe is?
- 2017‑07‑15:
Beginner-friendly Vulkan graphics API tutorials.
- 2017‑07‑15:
Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized.
- 2017‑07‑15:
Password Store aka pass: the standard Unix password manager.
- 2017‑07‑15:
rax: A radix tree implementation in ANSI C for Redis.
- 2017‑07‑15:
Real system failures at NASA.
- 2017‑07‑14:
Life in a universe with 2 time dimensions.
- 2017‑07‑14:
Why 1Password is no longer recommended by security experts.
- 2017‑07‑13:
Towards Golang 2.
- 2017‑07‑13:
Understanding the .io TLD's DNS configuration vulnerability.
- 2017‑07‑13:
binctr: getting towards real sandbox containers.
- 2017‑07‑13:
Orpheus's Lyre puts Kerberos to sleep!
- 2017‑07‑13:
The Facebook algorithm mom problem.
- 2017‑07‑13:
Superconducting quantum levitation on a 3π Möbius strip. (YouTube)
- 2017‑07‑13:
How Discord scaled Erlang/Elixir to 5,000,000 concurrent users.
- 2017‑07‑12:
The cost of hard drives in recent years.
- 2017‑07‑12:
A French mathematician has proved that we know all kinds of convex pentagons that tile the plane.
- 2017‑07‑12:
Renaming of the University of Cambridge Computer Laboratory.
- 2017‑07‑12:
Life is about to get a whole lot harder for websites without HTTPS.
- 2017‑07‑12:
Rewriting Zopfli from C to Rust.
- 2017‑07‑12:
The semver trick: how to avoid complicated coordinated library API upgrades in Rust.
- 2017‑07‑12:
Looking at DNS traces: What do we know about resolvers?
- 2017‑07‑12:
Antarctic ice shelf Larsen C calves trillion ton iceberg.
- 2017‑07‑12:
ES6 In Depth: Symbols.
- 2017‑07‑12:
Linux and GPL defense: "once the lawyers are involved, you have lost".
- 2017‑07‑12:
Vector packet processing (VPP): one terabit software router.
- 2017‑07‑12:
Is decentralized storage sustainable?
- 2017‑07‑12:
Unjust, unreasonable, and unduly discriminatory: electric utility rates and the campaign against rooftop solar.
- 2017‑07‑11:
Office and residential buildings use more energy per square metre of floor area the taller they are.
- 2017‑07‑11:
Turning tweets into vector images.
- 2017‑07‑11:
The .io error: a problem with bad optics, but little substance.
- 2017‑07‑11:
Evolution of the LEGO logo.
- 2017‑07‑11:
LLVM x86 backend can introduce branches that depend on uninitialized values, upsetting valgrind.
- 2017‑07‑11:
How Rust is tested.
- 2017‑07‑11:
A more detailed report of the Gandi domain hijacking incident.
- 2017‑07‑10:
Smooth as butter: achieving 60 FPS animations with CSS3.
- 2017‑07‑10:
The .io error: don't make your TLD name servers available for others to register.
- 2017‑07‑10:
aRrgh: a newcomer's (angry) guide to R.
- 2017‑07‑10:
Next-generation Subversion unveiled.
- 2017‑07‑10:
Hello, United Kingdom, it's the United States of America here, and we need to talk.
- 2017‑07‑10:
Security improvements in Linux v4.12.
- 2017‑07‑10:
Dynamic tracing in Linux user and kernel space.
- 2017‑07‑10:
Linux tracing systems and how they fit together.
- 2017‑07‑10:
Windows 10 process exit performance regression: 24-core CPU and I can't move my mouse.
- 2017‑07‑10:
"I no longer feel like I can trust `init` to do the sane thing." - Linus.
- 2017‑07‑09:
Why people from Manchester are Mancunians, and other demonyms.
- 2017‑07‑09:
Postgres job queues and failure by MVCC.
- 2017‑07‑09:
The language server protocol (LSP/RLS) and IDEs.
- 2017‑07‑09:
Minimal PDF.
- 2017‑07‑09:
Stop using JWT for sessions.
- 2017‑07‑09:
Benchmarking nftables vs iptables.
- 2017‑07‑09:
Dos and don'ts on designing for accessibility.
- 2017‑07‑08:
PyData 101: everything you need to know to get started in data science in Python.
- 2017‑07‑08:
Yours or mine? Making personal pronouns consistent in user interface design.
- 2017‑07‑08:
DJI is locking down its drones against a growing army of DIY hackers.
- 2017‑07‑08:
Zoomable map of greenbelt in England.
- 2017‑07‑07:
35 practical steps men can take to support feminism.
- 2017‑07‑07:
Report on 7 July 2017 Gandi domain hijacking incident.
- 2017‑07‑07:
Pragmatic Debian packaging.
- 2017‑07‑07:
Right To Know: the long path to Rights of Way data for Cambridgeshire.
- 2017‑07‑07:
GitLab: 2/3 of the self-hosted git market, next-generation CI system, and Auto DevOps.
- 2017‑07‑07:
TSIG authentication bypass through signature forgery in ISC BIND.
- 2017‑07‑07:
TSIG authentication bypass for zone transfer operations in ISC BIND.
- 2017‑07‑07:
TSIG authentication bypass through signature forgery in Knot DNS.
- 2017‑07‑06:
An Internet Archive hidden service attacked over Tor.
- 2017‑07‑06:
MySQL infrastructure testing automation at GitHub.
- 2017‑07‑06:
Let's Encrypt will start issuing DNS-validated wildcard TLS certificates from January 2018.
- 2017‑07‑06:
The new TRust-DNS resolver.
- 2017‑07‑06:
Why undefined behavior for infinite loops?
- 2017‑07‑06:
The third thumb.
- 2017‑07‑06:
ARIA: markup for accessible rich internet applications.
- 2017‑07‑06:
Web accessibility according to actual people with disabilities.
- 2017‑07‑06:
Rust's 2017 roadmap, six months in.
- 2017‑07‑06:
Language server protocol (lsp), Rust RLS, and Emacs.
- 2017‑07‑05:
Dart gets a type system.
- 2017‑07‑05:
A brief history of the O'Reilly animals.
- 2017‑07‑05:
Refining expression evaluation order for idiomatic C++.
- 2017‑07‑05:
Undefined behavior in 2017.
- 2017‑07‑05:
A bug story: undefined behaviour and pointer (mis)alignment on x86.
- 2017‑07‑04:
WiFi232: an Internet Hayes modem for your retro computer.
- 2017‑07‑04:
Sliding right into disaster: side-channel leak leads to complete break of RSA-1024 in libgcrypt.
- 2017‑07‑04:
Let's Encrypt numbers to know.
- 2017‑07‑04:
fzf: A command-line fuzzy finder written in Golang.
- 2017‑07‑03:
Your revolution was dumb and it filled us with refugees: A Canadian take on the American Revolutionary War.
- 2017‑07‑03:
The capital sharp S is now part of the official German orthography.
- 2017‑07‑03:
Wibbly-wobbly magnetic fusion stuff: The return of the stellarator.
- 2017‑07‑03:
That is not dead which can eternal lie: the aestivation hypothesis for resolving Fermi's paradox. (FAQ)
- 2017‑07‑03:
Dissolving the Fermi paradox: the Drake equation as a probability density function.
- 2017‑07‑03:
Galois theory for beginners, through the unsolvability of the quintic.
- 2017‑07‑03:
Why is the quintic unsolvable?
- 2017‑07‑02:
New measurement will help redefine international unit of mass.
- 2017‑07‑02:
Memory use in CPython and MicroPython.
- 2017‑07‑02:
Pony: deny capabilities for safe, fast actors.
- 2017‑07‑02:
Beyond public key encryption.
- 2017‑07‑02:
"I have no idea what I'm doing": on the difficulty of deploying HTTPS.
- 2017‑07‑02:
Dexter: automatic indexer for PostgreSQL.
- 2017‑07‑02:
Hypothetical indexes for PostgreSQL.
- 2017‑07‑02:
The 5 best punctuation marks in literature.
- 2017‑07‑02:
Starfish Prime: a 1.4 megaton nuclear test in space.
- 2017‑07‑01:
Skylake bug: a detective story.
- 2017‑07‑01:
That terrifying photo from Los Alamos nuclear weapons laboratory took a hidden toll on America's arsenal.
- 2017‑07‑01:
QuickselectAdaptive: fast deterministic selection.
- 2017‑07‑01:
ska_sort: a fast radix sort.
- 2017‑07‑01:
Fun with branch (mis-)prediction and imbalanced quicksort pivots.
- 2017‑07‑01:
In-place merge sort.
- 2017‑07‑01:
pdqsort: Pattern-defeating quicksort.
- 2017‑07‑01:
Effectively using Matplotlib.
- 2017‑07‑01:
SKIP LOCKED in PostgreSQL 9.5: Most work queue implementations in SQL are wrong.
- 2017‑07‑01:
Rotate the Mercator projection.
- 2017‑06‑30:
How do whales and dolphins sleep without drowning?
- 2017‑06‑30:
This is how sperm whales sleep.
- 2017‑06‑30:
100 million certificates issued by Let's Encrypt.
- 2017‑06‑30:
A new Concurrent ML for Guile Scheme.
- 2017‑06‑30:
Morton order matrices deserve support from compilers.
- 2017‑06‑30:
How do you cut a monolith in half? Not with a message broker.
- 2017‑06‑29:
Why is NumPy only now getting funded?
- 2017‑06‑29:
Frinkiac: Simpsons full text search.
- 2017‑06‑29:
Simpsons full text search.
- 2017‑06‑28:
Writing parsers like it's 2017, with Rust and nom.
- 2017‑06‑28:
Designing Kerberos: a dialogue in four scenes.
- 2017‑06‑28:
Never use DNS TTL of zero.
- 2017‑06‑28:
About ELF auxiliary vectors.
- 2017‑06‑28:
EBL: a block list of spam reply-to email addresses.
- 2017‑06‑28:
A whirlwind tour of rustdoc.
- 2017‑06‑28:
How `for` and `while` differ wrt the borrow checker in Rust.
- 2017‑06‑28:
CAP: Don't settle for eventual consistency.
- 2017‑06‑28:
Kill sticky web page headers.
- 2017‑06‑28:
The three projections of Doctor Futamura.
- 2017‑06‑27:
Why have all 95 of England's high-rise towers tested so far failed fire safety tests?
- 2017‑06‑27:
Growing fibers from delimited continuations in Guile.
- 2017‑06‑27:
How not to do things with words: The BBC sub-committee for the invention of new words (1935-1937).
- 2017‑06‑27:
Microsoft explains how (not) to encrypt and decrypt a file with Visual C#.
- 2017‑06‑27:
The average number of ops to quicksort n items is approximately 10 times the nth prime number.
- 2017‑06‑27:
The sad story of the vCard format and its lack of interoperability.
- 2017‑06‑27:
Robert Maxwell and the staggeringly profitable business of scientific publishing.
- 2017‑06‑26:
Xandikos: a git-backed CalDAV/CardDAV server.
- 2017‑06‑26:
Streaming combinators and extracting flat parallelism in the Futhark functional array programming language.
- 2017‑06‑26:
Literate SQL using the WITH clause.
- 2017‑06‑26:
25 microchips that shook the world.
- 2017‑06‑25:
Making the Internet Archive's full text search faster.
- 2017‑06‑25:
What can developers learn from being on call?
- 2017‑06‑25:
American national standard safety code and requirements for dry Martinis.
- 2017‑06‑25:
The Bakerloo is the hottest London Underground line.
- 2017‑06‑25:
Why your dockerized application isn't receiving signals.
- 2017‑06‑25:
Stack Clash: an ancient kernel hole is (not) closed.
- 2017‑06‑25:
The rise and fall of FireWire, IEEE 1394.
- 2017‑06‑25:
uncertainties: a Python calculator with error propagation.
- 2017‑06‑25:
Qalculate! the ultimate Linux desktop calculator.
- 2017‑06‑24:
Insect: a high precision scientific calculator with support for units of measurement.
- 2017‑06‑24:
Play Tetris over traceroute.
- 2017‑06‑23:
BGP nyan cat.
- 2017‑06‑23:
Why is the Internet so slow?!
- 2017‑06‑23:
Website global latency testing tool.
- 2017‑06‑23:
InspiroBot: an AI generating unique inspirational quotes for endless enrichment of pointless human existence.
- 2017‑06‑23:
Beyond memory safety with types in Rust.
- 2017‑06‑23:
Philip Coppola spends nearly 40 years illustrating New York City's subway stations.
- 2017‑06‑22:
Five things we have forgotten about Open Source.
- 2017‑06‑22:
Stack Clash disclosure post-mortem.
- 2017‑06‑22:
Severe weather Europe.
- 2017‑06‑22:
European severe weather database.
- 2017‑06‑22:
Dinosaurs vs flowers.
- 2017‑06‑21:
liblb: an empirical study of load balancing algorithms.
- 2017‑06‑21:
A critical problem: this plutonium photo should give you the creeps.
- 2017‑06‑21:
The latitude observatory at Ukiah, California.
- 2017‑06‑21:
DNSSEC validation algorithm support test.
- 2017‑06‑20:
Truffle, Graal, and Futamura: practical partial evaluation for high-performance dynamic language runtimes.
- 2017‑06‑20:
An ex-AAIB inspector discusses accident investigation and the Grenfell Tower fire.
- 2017‑06‑20:
JSON in PostgreSQL: the present and future.
- 2017‑06‑20:
Racking Mac Pros for web image optimization.
- 2017‑06‑20:
Ted Nelson's junk mail archive.
- 2017‑06‑19:
Cats are an extreme outlier among domestic animals.
- 2017‑06‑19:
Render the Mandelbrot Set with jq.
- 2017‑06‑19:
The stack clash: many local root vulnerabilities due to stack/heap confusion.
- 2017‑06‑19:
One-hour Mandelbrot: Creating a fractal on the vintage Xerox Alto.
- 2017‑06‑19:
How do you draw a circle? Clockwise, anticlockwise, handwriting and scripts.
- 2017‑06‑19:
A historical review of US contributions to the atomic redefinition of the SI second in 1967.
- 2017‑06‑19:
Improving DNS security: a measurement-based approach.
- 2017‑06‑19:
A patch for Postel's robustness principle.
- 2017‑06‑19:
sparsehash: C++ associative containers using popcount compressed arrays.
- 2017‑06‑19:
Simplicity Debt: the difficulty of adding generics to Golang.
- 2017‑06‑19:
Australian Tax Office SAN outage report.
- 2017‑06‑18:
Unambiguous Webpack config with Typescript.
- 2017‑06‑18:
Out for the Count: at the election counts in Edinburgh.
- 2017‑06‑18:
The remote branch triangle and Git's missing terminology.
- 2017‑06‑17:
"Because I moved 5 shirts"... portrait of an unexpected Twitter storm.
- 2017‑06‑17:
fwupd: updating firmware in Linux.
- 2017‑06‑17:
AppliedMicro's X-Gene 3 SoC begins sampling: a step up in ARM's server ambitions.
- 2017‑06‑17:
pASSWORD tYPOS and how to correct them securely.
- 2017‑06‑16:
Will AMD's Ryzen finally bring SHA extensions to Intel's CPUs?
- 2017‑06‑16:
Finding open DNS resolvers on IPv6.
- 2017‑06‑16:
NANOG discusses templating/automating network configuration.
- 2017‑06‑16:
Is SHA-3 slow?
- 2017‑06‑15:
The secret origin story of the iPhone.
- 2017‑06‑15:
If you write unsafe Rust, you should use compiletest.
- 2017‑06‑15:
Bugs you'll probably only have in unsafe Rust.
- 2017‑06‑14:
Strange Horizons - Utopia, LOL?
- 2017‑06‑14:
What stops IPv6 traffic in a dual-stack ISP?
- 2017‑06‑14:
Rust's MutexGuard was Sync when It should not have been: a data race bug found with formal methods.
- 2017‑06‑14:
Ten things Idris improved over Haskell.
- 2017‑06‑14:
hyper v0.11: Rust's HTTP server library is now based on Tokio async i/o.
- 2017‑06‑14:
Rust as a gateway drug to Haskell.
- 2017‑06‑13:
An introduction to Wayland.
- 2017‑06‑13:
The design and use of QuickCheck.
- 2017‑06‑12:
Initialization in C++ is bonkers.
- 2017‑06‑12:
Digging the graveyard of oil's past: decommissioning North Sea oil rigs.
- 2017‑06‑12:
#c0ffee is the colour: what real words are valid CSS hex RGB colours?
- 2017‑06‑12:
Secrets and LIE-abilities: the state of modern secret management.
- 2017‑06‑12:
PostgreSQL set_user extension: swap to/from a different role, with enhanced logging and control.
- 2017‑06‑12:
Cooling the Tube: engineering heat out of the London Underground.
- 2017‑06‑11:
How to write exciting conference talk proposals.
- 2017‑06‑11:
VirtualBox: are you getting your money's worth?
- 2017‑06‑11:
A PGP / GnuPG tutorial.
- 2017‑06‑11:
An introduction to timekeeping in Linux VMs.
- 2017‑06‑11:
Exploring /dev/input/.
- 2017‑06‑11:
tini: a tiny `init` for Docker containers.
- 2017‑06‑11:
Kubernetes patterns and anti-patterns.
- 2017‑06‑11:
Comdb2: Bloomberg's distributed RDBMS.
- 2017‑06‑10:
BitKeeper: the original distributed source management system, now open source (Apache 2.0).
- 2017‑06‑10:
How Turla malware abused satellites to stay under the radar.
- 2017‑06‑10:
Sushi = Beer ?! UTF8 bug fixes in MySQL 8.0.
- 2017‑06‑09:
Sachal Studios Orchestra (Pakistan): Take Five.
- 2017‑06‑09:
I/O efficient gzip compression with libpcap and funopen().
- 2017‑06‑09:
BIND and ISC DHCP bug DB opening up for guest users.
- 2017‑06‑09:
The L scripting language: C syntax, Perl features, Tcl implementation.
- 2017‑06‑09:
x86 approaching 40 and still going strong.
- 2017‑06‑09:
Intel fires warning shot at Qualcomm and Microsoft over Windows 10 ARM emulation in x86 birthday blog post.
- 2017‑06‑09:
HomeOffice rules: the mindset of the Home Office and its officials.
- 2017‑06‑08:
Christine de Pizan: a feminist writer in early 1400s France. (Radio 4)
- 2017‑06‑08:
Compressing pcap files with gzip, xz, and zstd.
- 2017‑06‑08:
Intelligent tracking prevention in WebKit.
- 2017‑06‑08:
A mathematical chronology.
- 2017‑06‑08:
How to understand the Wireless Diagnostics app on your Mac.
- 2017‑06‑08:
How to think about HTTP status codes.
- 2017‑06‑08:
Rust performance pitfalls.
- 2017‑06‑08:
Creating a distributed data centre architecture using Kubernetes and containers.
- 2017‑06‑08:
D-Expressions: Lisp power, Dylan style.
- 2017‑06‑08:
3D virtual tour of the national museum of computing at Bletchley Park.
- 2017‑06‑08:
State of the art in lightweight symmetric cryptography.
- 2017‑06‑08:
A formal Linux kernel memory-ordering model.
- 2017‑06‑08:
PEP 524: os.urandom() now blocks on Linux in Python 3.6.
- 2017‑06‑08:
3-year-olds consuming alternative milks are 1.5 cm shorter on average.
- 2017‑06‑08:
SyncPerf: categorizing, detecting, and diagnosing synchronization performance bugs.
- 2017‑06‑07:
Five years of IPv6: whither the next five?
- 2017‑06‑07:
A day without Javascript.
- 2017‑06‑07:
You are not Google, or Amazon, or LinkedIn.
- 2017‑06‑07:
Performance improvements in .NET Core 2.0.
- 2017‑06‑07:
Network automation do's and don'ts.
- 2017‑06‑07:
State of IPv6 deployment 2017.
- 2017‑06‑07:
WebKit JavaScriptCore optimizations for ES6.
- 2017‑06‑06:
The Boom hierarchy.
- 2017‑06‑06:
Comprehending ringads.
- 2017‑06‑06:
pgBadger: log analyzer for PostgreSQL.
- 2017‑06‑06:
DocuColor printer tracking dot decoding guide.
- 2017‑06‑06:
Printer dots: how The Intercept outed NSA leaker Reality Winner.
- 2017‑06‑06:
A powerful study that bolsters the lead-crime hypothesis.
- 2017‑06‑05:
IBM unveils world's first 5nm chip.
- 2017‑06‑05:
A history of the birth of the IBM PC.
- 2017‑06‑05:
An epoxy potted homebrew OCXO.
- 2017‑06‑05:
A homebrew OCXO.
- 2017‑06‑05:
Kubernetes: more like jazz improv than orchestration.
- 2017‑06‑04:
Mup: music publication software.
- 2017‑06‑04:
ARM pointer authentication on Linux.
- 2017‑06‑03:
Tilting titling: direction of printing on spines of books.
- 2017‑06‑03:
U.Texas information security office policy on food provisioning at meetings.
- 2017‑06‑03:
32-bit x86 position independent code is really bad.
- 2017‑06‑03:
Multi-threaded setuid on Linux.
- 2017‑06‑03:
Don't mix Linux namespace switching and goroutines.
- 2017‑06‑03:
The evolution of code deploys at Reddit.
- 2017‑06‑03:
JSON-LD is about linked data for better Web APIs, not the Semantic Web.
- 2017‑06‑03:
Please, enough with the dead butterflies!
- 2017‑06‑03:
What really happened with Vista.
- 2017‑06‑02:
Cryptographic hash functions and indifferentiability.
- 2017‑06‑02:
A real steam-powered simplified difference engine. (YouTube)
- 2017‑06‑02:
U 2 can U2F.
- 2017‑06‑02:
Little's Law and the universal scalability law.
- 2017‑06‑02:
Progress with Python's GILectomy.
- 2017‑06‑02:
Cambridge North station is covered in Rule 30!
- 2017‑06‑01:
Pinboard acquires Del.icio.us.
- 2017‑06‑01:
A guide to the many flavours of TeX.
- 2017‑05‑31:
SHA-3 should probably not be used.
- 2017‑05‑31:
Seville shows what makes a city great for cycling: the number of cycleways, or their connectivity?
- 2017‑05‑31:
New DNS infrastructure at GitHub.
- 2017‑05‑31:
Problems with OCSP stapling and Must-Staple and why certificate revocation is still broken.
- 2017‑05‑31:
HTTP/2 push is tougher than you might expect.
- 2017‑05‑31:
Federal Circuit loses again: US Supreme Court categorically rejects enforcement of post-sale patent restrictions.
- 2017‑05‑30:
Venus has very few volcanoes. Weirdly, this might be why it's as hot as hell.
- 2017‑05‑30:
Golden Carrots: Kenya's M-PESA, W3C's Web Payments, Australia's NPP.
- 2017‑05‑30:
What went wrong in the British Airways data centre?
- 2017‑05‑30:
DST causes an estimated 30 traffic accident deaths per year in the USA.
- 2017‑05‑30:
CalVer: calendar-based version numbers.
- 2017‑05‑30:
Conference speaking as a software vendor / talks as a product design tool.
- 2017‑05‑30:
Scaling Amazon Aurora at ticketea: compensating for DNS propagation delay.
- 2017‑05‑30:
Avert your eyes from the server "humping" trend in GPU compute chassis.
- 2017‑05‑29:
The atomic bomb considered as a Hungarian high school science fair project.
- 2017‑05‑29:
STEM: still no shortage of qualified people in the USA.
- 2017‑05‑29:
Book Review: The Entrepreneurial State.
- 2017‑05‑29:
The rise of the QR code and how it has forever changed China's social habits.
- 2017‑05‑29:
LLVM's shifty semantics.
- 2017‑05‑29:
The world Is running out of (the right kinds of) sand.
- 2017‑05‑29:
Hacking Golang's type system.
- 2017‑05‑29:
Jitterdämmerung
- 2017‑05‑29:
Harnessing the energy generated when freshwater meets saltwater.
- 2017‑05‑29:
View counting at Reddit, with Redis HyperLogLog, Kafka, and Cassandra.
- 2017‑05‑29:
What's the difference between the COM and EXE extensions?
- 2017‑05‑29:
Building the Lego Saturn V.
- 2017‑05‑29:
RFC 3484 address sorting is a bug: DNS resolution in Golang and Cgo.
- 2017‑05‑29:
Template for an outage post-mortem review document.
- 2017‑05‑28:
Trump stole the Davies coat of arms from the former owners of Mar-a-Lago.
- 2017‑05‑28:
SSD rowhammer: vulnerabilities in MLC NAND flash memory programming.
- 2017‑05‑28:
How to use conscious purpose without wrecking everything.
- 2017‑05‑27:
traintimes.org.uk performance notes.
- 2017‑05‑27:
Don't go to the doctor: PREVENT's effects on British muslims.
- 2017‑05‑27:
JOSE (Javascript Object Signing and Encryption) is a bad standard that everyone should avoid.
- 2017‑05‑26:
Faster command line tools in D, with simple TSV as an example.
- 2017‑05‑26:
Rocket Lab's Electron conducts inaugural flight from New Zealand.
- 2017‑05‑26:
Rocket Lab's New Zealand space launch is first from a private site.
- 2017‑05‑26:
uTT: lightweight and efficient MQTT broker. (WIP)
- 2017‑05‑26:
MH17 and the utility of NOTAMs.
- 2017‑05‑26:
Chrome won the browser war.
- 2017‑05‑26:
Simple and Happy: is Clojure dying, and what has Ruby got to do with it?
- 2017‑05‑25:
Let's Encrypt OCSP and issuance outage postmortem.
- 2017‑05‑25:
Why Flamingos are more stable on one leg than two.
- 2017‑05‑25:
Rust's built-in traits: the when, how, and why.
- 2017‑05‑25:
Saint Architeuthis is the patron saint of doomed sailors.
- 2017‑05‑25:
Meld: a visual diff and merge tool for developers
- 2017‑05‑25:
Linux kernel dentry cache growth causes performance problems.
- 2017‑05‑24:
Using TLS1.3 with OpenSSL.
- 2017‑05‑24:
Google buys a /12 IPv4 address block: further concentration of internet haves and have nots.
- 2017‑05‑24:
System programming in Rust: beyond safety.
- 2017‑05‑24:
Tutorial: CSV parsing with Rust.
- 2017‑05‑24:
Rocket Lab's first Electron launcher "It's a Test" is set to lift off from New Zealand.
- 2017‑05‑24:
Turning the database inside out with Apache Kafka and Samza.
- 2017‑05‑23:
1Password travel mode: protect your accounts when crossing borders.
- 2017‑05‑23:
Who owns England? Land ownership map.
- 2017‑05‑23:
Chaos Computer Club breaks iris recognition system of the Samsung Galaxy S8.
- 2017‑05‑23:
After seven years, Microsoft is finally fixing the "J" email bug.
- 2017‑05‑22:
HTTPS on Stack Overflow: the end of a long road.
- 2017‑05‑22:
On the Turing Completeness of PowerPoint. (YouTube)
- 2017‑05‑21:
Improving qsort worst case behaviour on OpenBSD, plus multipivot quicksort.
- 2017‑05‑21:
Six programming paradigms that will change how you think about coding.
- 2017‑05‑21:
SILE: a typesetter written in Lua.
- 2017‑05‑21:
CPU utilization is wrong.
- 2017‑05‑21:
Approximating sin(x) to 5 ULP with Chebyshev polynomials.
- 2017‑05‑21:
Pattern matching for Java.
- 2017‑05‑21:
Google PhotoScan takes glare-free pictures of pictures with a smartphone.
- 2017‑05‑21:
Prepack: partial evaluator for JavaScript.
- 2017‑05‑21:
Generating fantasy maps.
- 2017‑05‑21:
New in Debian Stretch: nftables.
- 2017‑05‑21:
Programming as a way of thinking.
- 2017‑05‑21:
Writing a new time series database for Prometheus.
- 2017‑05‑21:
fireflowers: advocating Rust, in the words of its practitioners.
- 2017‑05‑21:
How basic performance analysis saved us millions. (PostgreSQL, perf, flame graphs)
- 2017‑05‑20:
Escaping hell with monads.
- 2017‑05‑20:
ARM's ASL: architecture specification language.
- 2017‑05‑20:
XML parsing accelerator with Intel SSE4.
- 2017‑05‑20:
Generating datasets with varied appearance and identical statistics through simulated annealing.
- 2017‑05‑20:
Myth: it's easier to multiply and divide with Hindu-Arabic numerals than with Roman ones?
- 2017‑05‑20:
The politics of the NHS WannaCrypt ransomware outbreak.
- 2017‑05‑20:
An introduction to monoids with FizzBuzz.
- 2017‑05‑20:
Freshly Remember'd: Kirk drift.
- 2017‑05‑20:
Slovak Radio building.
- 2017‑05‑20:
Criticisms of RFC6979 deterministic ECDSA.
- 2017‑05‑20:
Where have all the insects gone?
- 2017‑05‑20:
Troublesome OCSP server outage handling in Apache.
- 2017‑05‑20:
CRLite: a scalable system for pushing all TLS X.509 certificate revocations to all browsers.
- 2017‑05‑19:
FizzBuzz in Haskell by embedding a domain-specific language.
- 2017‑05‑19:
Disable the GNU libstdc++ memory allocator to avoid leaks.
- 2017‑05‑19:
NVidia Tesla Volta data center GPU.
- 2017‑05‑19:
Monitoring PostgreSQL streaming slave lag.
- 2017‑05‑19:
Performance problems due to false dependency in Intel popcnt instruction.
- 2017‑05‑19:
How to restart MySQL fast: the difference between knowledge and experience.
- 2017‑05‑19:
pgsidekick: scheduler (pglater) and external tool invoker (pglisten) for PostgreSQL.
- 2017‑05‑19:
North Sea Wind Power Hub: A giant wind farm to power all of north Europe.
- 2017‑05‑19:
The replication crisis in psychology: Daryl Bem "proved" ESP is real, which means science is broken.
- 2017‑05‑19:
Replacing Disqus with Github comments.
- 2017‑05‑19:
Temporal tables PostgreSQL extension.
- 2017‑05‑19:
How Trump could get fired.
- 2017‑05‑19:
Swift is like Kotlin.
- 2017‑05‑19:
P-hacking "Mindless Eating", or how to send an entire life of research into question.
- 2017‑05‑19:
Let us paste passwords!
- 2017‑05‑19:
secure-operator: a DNS server proxy to Google's DNS-over-HTTPS.
- 2017‑05‑19:
Teller reveals his magical secrets.
- 2017‑05‑19:
The fold-and-cut problem: make any shape by folding paper flat and making one cut?
- 2017‑05‑18:
Cargo Rust crate registry format.
- 2017‑05‑18:
The quantum thermodynamics revolution.
- 2017‑05‑18:
Flang: a Fortran compiler based on the PGI front end and LLVM back end.
- 2017‑05‑18:
How to accidentally stop a global cyber attack. (WannaCry)
- 2017‑05‑18:
PlantNet: 'Shazam' for plants will identify French plants from a picture.
- 2017‑05‑18:
Sensible new password guidelines from NIST.
- 2017‑05‑18:
Cap'n Proto 0.6 Released: Two and a half years of improvements.
- 2017‑05‑18:
Remotely exploitable Javascript type confusion bug in privileged Microsoft Security Essentials AV scanner.
- 2017‑05‑18:
Rules for successful hotel Wi-Fi.
- 2017‑05‑18:
Caddy 0.10 released. (Golang http server)
- 2017‑05‑18:
go-audit: Slack's tool for syscall auditing at scale.
- 2017‑05‑18:
A Rust optimization guide.
- 2017‑05‑17:
Everything you need to know about HTTP security headers.
- 2017‑05‑17:
Getting started with headless Google Chrome.
- 2017‑05‑17:
How ssh got port 22.
- 2017‑05‑17:
"Me and SVG" - Amelia Bellamy-Royds.
- 2017‑05‑17:
Prolog under the hood: an honest look.
- 2017‑05‑17:
Fusion reactors: Not what they're cracked up to be.
- 2017‑05‑17:
VME broken on AMD Ryzen. (Affects 16bit virtual machines.)
- 2017‑05‑17:
How we fine-tuned HAProxy to achieve 2,000,000 concurrent SSL connections.
- 2017‑05‑17:
New LLVM JIT in Azul's Zing JVM.
- 2017‑05‑17:
The SQL layer in CockroachDB.
- 2017‑05‑17:
Kryptonite: an ssh agent on your phone with Touch ID authorization.
- 2017‑05‑17:
Intent to remove support in Google Chrome for commonName matching in X.509 certificates.
- 2017‑05‑17:
Aspirin and pandemic influenza mortality, 1918-1919: pharmacology, pathology, and historic evidence.
- 2017‑05‑17:
4chan: the skeleton key to the rise of Trump.
- 2017‑05‑16:
UPSERT race condition with MERGE on Microsoft SQL Server.
- 2017‑05‑16:
Fewer mallocs in curl.
- 2017‑05‑16:
Notation as a tool of thought. (Ken Iverson)
- 2017‑05‑16:
Akumuli storage engine design.
- 2017‑05‑16:
Is the preprocessor still needed in C++?
- 2017‑05‑16:
Wax worm caterpillars can dissolve plastic shopping bags surprisingly fast.
- 2017‑05‑15:
Check whether Intel AMT is enabled and provisioned under Linux.
- 2017‑05‑15:
Designing robust and predictable APIs with idempotency.
- 2017‑05‑13:
Physical separation of cyclists from traffic "crucial" to dropping injury rates, shows U.S. study.
- 2017‑05‑13:
How to reduce Lua boilerplate with D.
- 2017‑05‑12:
Optimal probabilistic cache stampede prevention.
- 2017‑05‑12:
A public key that crashes ssh-keygen. (2015)
- 2017‑05‑10:
Beware of the background colour of transparent pixels.
- 2017‑05‑10:
Truly seamless reloads with HAProxy: no more hacks!
- 2017‑05‑10:
A history of relay computers.
- 2017‑05‑09:
Innovation is an overrated ideology, say historians of technology. Maintenance means more to most peoples' lives.
- 2017‑05‑09:
Writing a fast hash table with a tiny memory footprint.
- 2017‑05‑08:
Migrating from Heroku to AWS.
- 2017‑05‑08:
Did Macron outsmart Russian hackers?
- 2017‑05‑07:
A dog that rescues cats.
- 2017‑05‑05:
Rediscovering the Intel AMT remote firmware authentication vulnerability.
- 2017‑05‑05:
Background and introduction to BBR TCP.
- 2017‑05‑03:
Programming as theory building. (Peter Naur)
- 2017‑05‑03:
LEGO Ideas 21309 NASA Apollo Saturn V.
- 2017‑05‑03:
The sandwich alignment chart.
- 2017‑05‑01:
Rust your ARM microcontroller!
- 2017‑05‑01:
Laffer curve: Everything right-wingers get wrong about trickle-down economics.
- 2017‑04‑30:
How Ireland achieved a crucial Brexit coup.
- 2017‑04‑29:
Sorting 2 tonnes of Lego.
- 2017‑04‑29:
luajit-bpf: Lua to eBPF compiler for easier in-kernel scripting.
- 2017‑04‑26:
File processing in Clojure (and Java) can easily become CPU bound.
- 2017‑04‑26:
Dynamic storage allocation: a survey and critical review. (1995)
- 2017‑04‑26:
How many disks can you add to a (virtual) Linux machine?
- 2017‑04‑25:
Capturing all the flags in BSidesSF CTF by pwning Kubernetes.
- 2017‑04‑25:
LSD microdoses make people feel sharper, and scientists want to know how.
- 2017‑04‑25:
Glob matching can be simple and fast (but often isn't).
- 2017‑04‑24:
Protect your management interfaces.
- 2017‑04‑24:
Tools as a catalyst for tech culture change.
- 2017‑04‑24:
Unicode character inspector.
- 2017‑04‑23:
Kava: A Java dialect with a uniform object model for lightweight classes.
- 2017‑04‑21:
Post-quantum RSA.
- 2017‑04‑21:
Design flaws in LastPass two factor authentication.
- 2017‑04‑21:
ARM releases a machine readable architecture specification.
- 2017‑04‑20:
Hellandizing: disciplined test point placement in server software.
- 2017‑04‑19:
MIT deploying IPv6 and selling off half of 18.0.0.0/8.
- 2017‑04‑19:
b.root-servers.net to begin anycast service and renumber.
- 2017‑04‑18:
Compact PAT trees (PATRICIA suffix tries).
- 2017‑04‑18:
Level-compressed tries: improved behaviour of tries by adaptive branching.
- 2017‑04‑18:
SILT (small index, large table): a memory-efficient, high-performance key-value store.
- 2017‑04‑18:
Theft and loss recovery for iOS users. (Passwords? Phone numbers? Credit cards?)
- 2017‑04‑18:
Prioritizing economics over democracy is crippling the U.S. economy.
- 2017‑04‑18:
"I thought I understood the American right. Trump proved me wrong."
- 2017‑04‑18:
How to know if you've sent a horrible tweet.
- 2017‑04‑18:
Angry Birds / Inglourious Basterds.
- 2017‑04‑17:
CVE-2017-7892: arithmetic overflow undefined behaviour leads to security vulnerability in Cap'n Proto.
- 2017‑04‑17:
Calling bullshit in the age of big data.
- 2017‑04‑17:
The invisible parts of CSS.
- 2017‑04‑17:
The origins of XXX as a FIXME comment marker.
- 2017‑04‑17:
The Dzhanibekov effect aka the tennis racket theorem: when the axis of rotation flips.
- 2017‑04‑17:
Inside the PHP 7 virtual machine.
- 2017‑04‑17:
Five reasons blog posts are of higher scientific quality than journal articles.
- 2017‑04‑17:
Cloning r/place in a weekend.
- 2017‑04‑17:
Debugging compilers with optimization fuel (applied to ghc / Haskell).
- 2017‑04‑16:
What is DevOps?
- 2017‑04‑16:
Ten simple rules for making research software more robust.
- 2017‑04‑15:
Optimizing struct size in Rust: a 6-month compiler development project.
- 2017‑04‑15:
Critical deficiencies in Jigsaw / JSR-376 Java platform module system.
- 2017‑04‑15:
Host key verification in golang SSH clients.
- 2017‑04‑15:
Who would go Nazi? (1941)
- 2017‑04‑14:
Leibniz, Bernoulli, and the logarithms of negative numbers.
- 2017‑04‑14:
What happens when the pager goes off?
- 2017‑04‑14:
The future of ad blocking.
- 2017‑04‑14:
A retrospective on the tech behind the IMDB message boards.
- 2017‑04‑13:
How Reddit built their epic r/Place 1st April stunt.
- 2017‑04‑13:
Intel Haskell research compiler.
- 2017‑04‑13:
Blender cheat sheet / quick reference poster.
- 2017‑04‑13:
Blender for hackers: 3D modeling is just like using vim.
- 2017‑04‑13:
Memory bandwidth per instruction.
- 2017‑04‑13:
High-performance rate limiting with RocksDB.
- 2017‑04‑11:
Linear lambda calculus and PTIME-completeness.
- 2017‑04‑11:
Typing the technical interview: solving 8 queens in the Haskell type system.
- 2017‑04‑11:
The Centennial Society's business reply pamphlet: how to break free from the junk mail industry.
- 2017‑04‑11:
In pursuit of perfection : thermocompensated quartz watches and their movements.
- 2017‑04‑11:
Banker Bob (still) can't get TLS right: a security analysis of TLS in leading UK banking apps.
- 2017‑04‑11:
A field guide to the American sandwich.
- 2017‑04‑10:
The BEAM Book: A description of the Erlang Runtime System ERTS and the virtual machine BEAM.
- 2017‑04‑10:
Setting up a failover Database for PostgreSQL.
- 2017‑04‑10:
Spotify's love/hate relationship with DNS.
- 2017‑04‑10:
Using the PostgreSQL TAP framework for testing extensions.
- 2017‑04‑10:
New features coming in PostgreSQL 10.
- 2017‑04‑10:
Brexit: economists will have the last word.
- 2017‑04‑06:
The Portlandification of pot.
- 2017‑04‑06:
How momentum speeds up gradient descent.
- 2017‑04‑06:
Lessons learned managing site reliability for some of the world's busiest gambling sites.
- 2017‑04‑06:
Exploiting Broadcom's Wi-Fi stack over the air.
- 2017‑04‑04:
Paul Vixie on good/bad ideas and interoperable implementations.
- 2017‑04‑04:
Education of a programmer.
- 2017‑04‑04:
Eventually-fair locking in WebKit.
- 2017‑04‑03:
The mess with internationalized domain names.
- 2017‑04‑03:
EuroLLVM 2017 review.
- 2017‑04‑03:
A retired German statistician proved the Gaussian correlation inequality, but the response was underwhelming.
- 2017‑04‑03:
Understanding how an OS uses a modern NIC.
- 2017‑04‑03:
Cloudflare now hosting f.root-servers.net
- 2017‑04‑03:
More bent horizon pictures by Aydın Büyüktaş.
- 2017‑04‑03:
Bent horizon projections of Manhattan.
- 2017‑04‑03:
The American West looks like a space habitat in these bent-horizon photos.
- 2017‑04‑02:
Pointing and calling in Japan's zero-accident total participation campaign.
- 2017‑04‑02:
Why Japan's rail workers can't stop pointing at things.
- 2017‑04‑02:
Microsoft is shutting down their open source hosting service CodePlex.
- 2017‑04‑02:
Jacobsen v. Katzer upheld enforceability of copyright conditions in the Artistic License.
- 2017‑04‑02:
Get lost in mega-tunnels dug by South American megafauna.
- 2017‑04‑01:
cgo is not Golang.
- 2017‑04‑01:
Filming mosquitoes reveals a completely new approach to flight.
- 2017‑04‑01:
Fuzzing is magic, or how to find a panic in Rust's regex library.
- 2017‑04‑01:
Capability-based computer systems.
- 2017‑04‑01:
Rate limiting with Nginx.
- 2017‑04‑01:
How to block rate-limited http traffic with Varnish.
- 2017‑04‑01:
Scaling a web API with rate limiters.
- 2017‑04‑01:
The exceptional beauty of Doom 3's source code.
- 2017‑04‑01:
John Carmack on functional programming in C++.
- 2017‑04‑01:
Trolls are winning the Internet. How do we defeat them?
- 2017‑04‑01:
UW professor: The information war is real, and we're losing it.
- 2017‑03‑31:
How not to cite academic software.
- 2017‑03‑31:
Special tools covering advanced topics for the experienced system administrator.
- 2017‑03‑31:
Learn redis the hard way (in production).
- 2017‑03‑30:
Daffowocky: a poetic mash-up.
- 2017‑03‑30:
Beej's Guide to Network Programming.
- 2017‑03‑30:
sedlisp: a Lisp implementation in sed.
- 2017‑03‑29:
Ravenserodd and other lost settlements of the East Yorkshire coast.
- 2017‑03‑28:
rsync's 32KB buffer size makes it slower than cp.
- 2017‑03‑28:
Use a 128KB buffer for efficient file copying on Linux.
- 2017‑03‑28:
Research Unix 8th / 9th / 10th editions released for non-commercial use.
- 2017‑03‑28:
Pi and the golden ratio, via Viète's formula.
- 2017‑03‑28:
Self-hosted, server-side MathJax.
- 2017‑03‑28:
KaTeX: Fast math typesetting for the web.
- 2017‑03‑27:
Qattara depression: flood the Sahara with water from the Mediterranean for hydroelectric power?
- 2017‑03‑27:
A historical survey of subroutine linkage and procedure call mechanisms.
- 2017‑03‑26:
A constructive look at TempleOS.
- 2017‑03‑26:
How Elsevier plans to sabotage Open Access.
- 2017‑03‑26:
Chasing the first arcade easter egg.
- 2017‑03‑26:
BEAMJIT: An LLVM based just-in-time compiler for Erlang.
- 2017‑03‑26:
C++17 feature comparisons.
- 2017‑03‑26:
Winter ISO C++ standards meeting: C++17 is complete.
- 2017‑03‑26:
Apple's new APFS has Unix-style "bag of bytes" filenames.
- 2017‑03‑25:
Hadoop has failed in a smoking heap of cost and complexity.
- 2017‑03‑25:
Czar of Bad Systems, responsible for changing dumb company rules.
- 2017‑03‑25:
Comprehensive and biaised comparison of OpenBSD and FreeBSD.
- 2017‑03‑25:
An detailed, eye-opening roadmap for meeting the Paris climate goals.
- 2017‑03‑24:
Research debt is the accumulation of missing interpretive labor.
- 2017‑03‑24:
OpenSSL switching to Apache License.
- 2017‑03‑23:
An empirical evaluation of in-memory multi-version concurrency control.
- 2017‑03‑23:
Peloton: building a new database management system in academia.
- 2017‑03‑22:
MyRocks: a RocksDB storage engine for MySQL.
- 2017‑03‑22:
Iago attacks: syscall return values can induce arbitrary computation in userland processes.
- 2017‑03‑22:
Hungarian secret agent reveals in detail how serious the Russian threat is.
- 2017‑03‑22:
attrs: the one Python library everybody needs.
- 2017‑03‑21:
Can ultraprecise time measurements warp space?
- 2017‑03‑21:
Put your Raspberry Pi NTP server in a padded envelope to improve temperature and frequency stability.
- 2017‑03‑21:
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments.
- 2017‑03‑21:
Uber is being sued for avoiding VAT in the UK.
- 2017‑03‑20:
How not to do it: breaking up ammonium nitrate.
- 2017‑03‑20:
We can teach women to code, but that just exposes a deeper problem.
- 2017‑03‑20:
PostgreSQL 10 hash indexes are faster than Btree indexes?
- 2017‑03‑20:
DeepMind in talks with National Grid to reduce UK energy use by 10%.
- 2017‑03‑20:
Performance results of the Oscilloquartz optically pumped cesium beam clock.
- 2017‑03‑20:
Oscilloquartz high performance optically-pumped cesium beam clock.
- 2017‑03‑20:
Building a Hackintosh Pro.
- 2017‑03‑19:
Inside the vintage 74181 ALU chip: how it works and why it's so strange.
- 2017‑03‑19:
Every attempt to manage academia makes it worse.
- 2017‑03‑18:
badssl.com: a web site for testing clients against bad server SSL configs.
- 2017‑03‑18:
The million dollar AWS cost reduction.
- 2017‑03‑18:
Guetzli: a new open source JPEG encoder, produces smaller and better images, much slower.
- 2017‑03‑18:
The road to a free Europe goes through Moscow.
- 2017‑03‑18:
Information Wars: a window into the alternative media (Russian disinformation) ecosystem.
- 2017‑03‑18:
The bootstrapping mindset: seeking higher-level abstractions for the web.
- 2017‑03‑18:
Is your fancy git shell prompt vulnerable?
- 2017‑03‑17:
I hate Matlab: How an IDE, a language, and a mentality harm science.
- 2017‑03‑17:
Penrose map binning.
- 2017‑03‑17:
SHA-1 is dead: implications of hash collisions for long-term digital archiving, e.g. LOCKSS.
- 2017‑03‑17:
Application crash consistency and performance with CCFS.
- 2017‑03‑17:
Enlightening the I/O path: A holistic approach for application performance.
- 2017‑03‑17:
Practical color theory for people who code.
- 2017‑03‑17:
Beautiful Racket: how to make your own programming languages with Racket.
- 2017‑03‑16:
Dark matter is missing from young galaxies in the early universe.
- 2017‑03‑16:
A Unicode reading list.
- 2017‑03‑16:
Russia's 5th Column.
- 2017‑03‑15:
Physics, topology, logic, and computation: a Rosetta Stone.
- 2017‑03‑15:
Scotland isn't different, it's Britain that's bizarre.
- 2017‑03‑15:
Silent data corruption investigated at CERN.
- 2017‑03‑15:
Meet the companies installing 'Irish' pubs in cities across the world.
- 2017‑03‑14:
Parallel queries in PostgreSQL 10.
- 2017‑03‑14:
Ripgrep 0.5.0, with support for UTF-16 and other encodings.
- 2017‑03‑14:
Embedded Rust on an ARM Cortex M3.
- 2017‑03‑14:
Arithmetic with distances in Rust: safety and correctness across units.
- 2017‑03‑14:
A formal spec for GitHub Flavored Markdown.
- 2017‑03‑14:
European Union regulations on algorithmic decision-making and a "right to explanation".
- 2017‑03‑14:
Linear types make Haskell performance more predictable.
- 2017‑03‑14:
from __past__ import bytes_literals: a hack to help port Mercurial to Python 3.
- 2017‑03‑14:
Unpaywall: a browser for finding preprint or institutional archive copies of academic papers.
- 2017‑03‑14:
Berry's paradox.
- 2017‑03‑14:
Is Yablo's paradox non-circular?
- 2017‑03‑14:
Paradox without self-reference.
- 2017‑03‑14:
If statements considered harmful, or, How to achieve coding happiness using null objects.
- 2017‑03‑14:
Left wing politicians need to keep their policies simple and take credit for them.
- 2017‑03‑13:
The other side of communications data: screwups, misdirected warrants, false arrests.
- 2017‑03‑13:
HTML5 SGML DTD reference.
- 2017‑03‑13:
Kantu: picture-driven web automation.
- 2017‑03‑13:
How to recover lost Python source code if it's still resident in a running interpreter.
- 2017‑03‑12:
Silent data corruption is real.
- 2017‑03‑11:
Rust's type system is Turing complete.
- 2017‑03‑11:
A digital clock made from 288 analogue faces.
- 2017‑03‑11:
Annotated Google SRE book.
- 2017‑03‑11:
Inter-lingual personal script: a phonetic alphabet made from stick figures.
- 2017‑03‑10:
A history of AIX, IBM 801, ROMP, RT/PC.
- 2017‑03‑10:
Unicode character names fed through an RNN.
- 2017‑03‑10:
Zippers as derivatives of data types.
- 2017‑03‑09:
selfie: tiny self-hosting C compiler, MIPS emulator, and hypervisor.
- 2017‑03‑08:
An introduction to GraphQL using the GitHub API.
- 2017‑03‑08:
Session resumption with forward secure PSK key agreement in TLS 1.3.
- 2017‑03‑08:
Why Warren Buffett is winning his $1 million bet against hedge funds.
- 2017‑03‑08:
Redundancy does not imply fault tolerance: distributed storage reactions to single errors and corruptions.
- 2017‑03‑08:
How to stop Ubuntu Xenial from randomly killing your big processes.
- 2017‑03‑08:
The Council of Elrond.
- 2017‑03‑08:
Brexit is (maybe) the ruin of Irish whiskey.
- 2017‑03‑07:
Time system calls are ~77% slower on AWS EC2.
- 2017‑03‑07:
Deterland: deterministically deterring timing attacks across hypervisor guests.
- 2017‑03‑07:
SS64 command line reference with annotated man pages.
- 2017‑03‑07:
Malware Guard Extension: using Intel SGX to conceal cache attacks.
- 2017‑03‑07:
Two executables with matching SHA-1 and MD5 hashes.
- 2017‑03‑07:
Cloud hosting VPS benchmarks.
- 2017‑03‑07:
Cloud hosting comparison: DigitalOcean vs. Linode vs. Vultr vs. OVH vs. Scaleway.
- 2017‑03‑06:
Changes to Ragel in response to the CloudFlare security incident.
- 2017‑03‑06:
0-RTT key exchange with full forward secrecy.
- 2017‑03‑06:
Securing PostgreSQL.
- 2017‑03‑06:
PostgreSQL + ZFS best practices and standard procedures.
- 2017‑03‑06:
Why replace SHA-1 with BLAKE2?
- 2017‑03‑06:
Penflip: browser/cloud collaborative writing and version control.
- 2017‑03‑06:
Scrolling through time by sending undo/redo commands with the mouse wheel.
- 2017‑03‑06:
How to handle noisy LLVM benchmark results.
- 2017‑03‑06:
Dartmouth communication files: interprocess communication before pipes.
- 2017‑03‑06:
Spam-a-lago: the fall of an empire.
- 2017‑03‑06:
Linguistic antipatterns: bad naming in software.
- 2017‑03‑06:
Is naming things really that hard?
- 2017‑03‑06:
A programmer's introduction to Unicode.
- 2017‑03‑05:
The accidental arrival of the cubicle.
- 2017‑03‑05:
Aheui (아희): an esoteric programming language written in Hangul.
- 2017‑03‑05:
802.eleventy what? A deep dive into why Wi-Fi kind of sucks.
- 2017‑03‑05:
SpaceEngine is a realistic virtual Universe you can explore on your computer.
- 2017‑03‑05:
If the Moon were only 1 pixel: A tediously accurate map of the solar system.
- 2017‑03‑04:
The license/contract dichotomy in open licenses: a comparative analysis.
- 2017‑03‑04:
A digital clock built in Conway's Game of Life.
- 2017‑03‑04:
NeFS, the Network Extensible File System: NFSv3 based on in-kernel PostScript.
- 2017‑03‑04:
Window management with Sun NeWS.
- 2017‑03‑03:
Algebraic subtyping.
- 2017‑03‑03:
Operation Rosehub: patching ALL THE JAVA THINGS to fix the Mad Gadget vulnerability.
- 2017‑03‑02:
Summary of the AWS S3 outage: command line typo.
- 2017‑03‑02:
How many floating-point numbers are in the interval [0,1]?
- 2017‑03‑02:
V8 behind the scenes: a tale of TurboFan.
- 2017‑03‑01:
New GitHub terms of service are incompatible with many Free Software and open source licences.
- 2017‑03‑01:
The power of role models: women in astronomy.
- 2017‑03‑01:
Gravitational Teleport: an SSH server for teams managing distributed infrastructure.
- 2017‑03‑01:
Doing presentations, gov.uk style.
- 2017‑03‑01:
Towards faster Ruby hash tables.
- 2017‑02‑28:
.SUNW_cap: CPU-dependent linking on Solaris/Illumos.
- 2017‑02‑28:
Stormy petrels: words that cannot be used except as part of a stock phrase.
- 2017‑02‑28:
Where are Amazon's data centers?
- 2017‑02‑28:
Movie review: The Great Wall.
- 2017‑02‑28:
Evolutionary database design.
- 2017‑02‑28:
Who needs a software / systems architect?
- 2017‑02‑28:
Miller is like awk, sed, cut, join, and sort for name-indexed data such as CSV, TSV, and tabular JSON.
- 2017‑02‑28:
Who needs GPS? Etak's amazing 1985 car navigation system.
- 2017‑02‑27:
Same-sex marriage linked to decline in teen suicides.
- 2017‑02‑27:
A transition plan for git to move to a new hash function.
- 2017‑02‑27:
Citizens' initiative (i.e. petition) for a European passport.
- 2017‑02‑27:
Logging vs instrumentation.
- 2017‑02‑27:
No domain left behind: is Let's Encrypt democratizing encryption?
- 2017‑02‑26:
How New Relic does DevOps.
- 2017‑02‑26:
Thoughts on Kubernetes.
- 2017‑02‑26:
Streaming databases in realtime with MySQL, Debezium, and Kafka.
- 2017‑02‑26:
Continuous delusion at the infrastructure layer.
- 2017‑02‑26:
Future Shocked: Judge Dredd at 40.
- 2017‑02‑26:
Self-driving cars have a SMIDSY problem.
- 2017‑02‑26:
Why I enthusiastically switched from Cacti to Zabbix for system monitoring.
- 2017‑02‑26:
Meet the man who stopped thousands of people becoming HIV-positive.
- 2017‑02‑26:
How RCA invented then lost the LCD.
- 2017‑02‑26:
Lessons from the history of attacks on secure hash functions.
- 2017‑02‑25:
Securing browsers through isolation vs mitigation: Google Chrome vs Microsoft Edge.
- 2017‑02‑25:
Inside the trenches of an information war: a case study in dating a video, fake or not?
- 2017‑02‑25:
Game system emulation latency.
- 2017‑02‑24:
Generation CS: undergraduate enrollment has more than tripled since 2006.
- 2017‑02‑24:
reStructuredText vs. Markdown for technical documentation.
- 2017‑02‑24:
Lifetimes of cryptographic hash functions.
- 2017‑02‑24:
Make your own PDFs with matching SHA-1 hashes.
- 2017‑02‑24:
Search a Usenet archive with AltaVista.
- 2017‑02‑24:
Redis on the Raspberry Pi: adventures in unaligned memory access.
- 2017‑02‑24:
Safe arrays and pointers for C through compatible additions to the language.
- 2017‑02‑24:
Upspin: a file sharing service from the Golang team at Google.
- 2017‑02‑24:
On the existence of two states in liquid water: impact on biological and nanoscopic systems.
- 2017‑02‑24:
frunk: Funktional generic programming in Rust.
- 2017‑02‑24:
Billions and Treellions: there are more trees on Earth than stars in the Galaxy.
- 2017‑02‑24:
Browsers belatedly add built-in protection against cross-site request forgery.
- 2017‑02‑24:
X-Frame-Options HTTP header for clickjacking protection.
- 2017‑02‑24:
Attacking the OAuth protocol.
- 2017‑02‑24:
Set the TZ environment variable to avoid stat() syscalls.
- 2017‑02‑24:
Cloudflare reverse proxies were dumping uninitialized memory.
- 2017‑02‑24:
Git Rev News 24, with interesting stuff from the Git Merge conference.
- 2017‑02‑24:
How would Git handle a SHA-1 collision?
- 2017‑02‑24:
Yubikey handbook.
- 2017‑02‑24:
Cloudflare's incident report on their accidental decrypted data exposure.
- 2017‑02‑23:
Docker in production: an update.
- 2017‑02‑23:
strace: wow much syscall.
- 2017‑02‑23:
Why facts don't change our minds.
- 2017‑02‑21:
The best single-word anagram in English.
- 2017‑02‑21:
pg_healer: repairing PostgreSQL problems automatically using data checksums.
- 2017‑02‑21:
All you need to know how to influence the EU in one easy chart (and several paragraphs).
- 2017‑02‑20:
Meet the project manager of the world's most spectacular bicycle bridge: the Hovenring in Eindhoven.
- 2017‑02‑20:
A nonsense collection of disgusting code.
- 2017‑02‑20:
How copying an int made some Rust code 11 times faster.
- 2017‑02‑20:
Chile's ReciclApp is sparking a recycling revolution.
- 2017‑02‑20:
Debugging a hardware panic: use the ESM log!
- 2017‑02‑20:
Pachyderm: a containerized, version-controlled data lake. ("git for data science")
- 2017‑02‑19:
42 recommendations about coding in C++
- 2017‑02‑19:
systemd cgroup process limits and Java out-of-memory errors.
- 2017‑02‑19:
A camera made from 32000 drinking straws takes pointillistic photographs.
- 2017‑02‑19:
A line in the sand: a homemade machine to roll a ball around.
- 2017‑02‑18:
Oldskool demo on lots of 7 segment displays.
- 2017‑02‑17:
Etymology of "shit sandwich".
- 2017‑02‑17:
Jepsen analysis of CockroachDB.
- 2017‑02‑17:
AVM private key leak puts cable modems worldwide at risk.
- 2017‑02‑16:
JavaScript attack on MMU page table side channel breaks ASLR.
- 2017‑02‑16:
Chez Scheme as the Racket VM.
- 2017‑02‑16:
13 things you didn't know about Brexit.
- 2017‑02‑16:
Pathfinder, a fast GPU-based font rasterizer in Rust.
- 2017‑02‑16:
Faster startup times for TruffleRuby on the Substrate VM.
- 2017‑02‑16:
Realtime analysis of the Oroville dam overflow.
- 2017‑02‑15:
Instapaper outage cause and recovery (on AWS MySQL RDS).
- 2017‑02‑15:
A surreal trip to a domain names conference.
- 2017‑02‑15:
First synthesis of pentazole, one unhappy molecule.
- 2017‑02‑15:
The biggest and weirdest commits in Linux kernel git history.
- 2017‑02‑15:
Google's not-so-secret new OS.
- 2017‑02‑15:
European contraception atlas.
- 2017‑02‑14:
BIND 9 refactoring.
- 2017‑02‑14:
Is PostgreSQL good enough?
- 2017‑02‑14:
Quizlet tests Google Cloud Spanner.
- 2017‑02‑14:
Google Cloud Spanner and the CAP Theorem.
- 2017‑02‑14:
Smalltalk was great, is great, but the cult-building is maddening.
- 2017‑02‑14:
The history behind the decision to move Python to GitHub.
- 2017‑02‑14:
Rust compiler design sprint summary.
- 2017‑02‑13:
Solar system in a bottle.
- 2017‑02‑13:
The origin of the insult "shitgibbon".
- 2017‑02‑13:
A working balloon-powered paper pipe organ.
- 2017‑02‑12:
A feminist guide to married women's names.
- 2017‑02‑12:
Introducing Riptide: WebKit's retreating wavefront concurrent garbage collector.
- 2017‑02‑12:
Linux eBPF tracing tools.
- 2017‑02‑12:
mkfile(8) bandwidth is severely limited by Sys all performance on OS X.
- 2017‑02‑12:
Process reconnaissance without /proc on Linux.
- 2017‑02‑11:
takeover.sh: Wipe and reinstall a running Linux system via SSH, without rebooting.
- 2017‑02‑11:
GitLab data loss postmortem.
- 2017‑02‑11:
check_pgactivity: Nagios remote agent for PostgreSQL.
- 2017‑02‑11:
LPegLabel: parsing expression grammars for Lua, with error labels.
- 2017‑02‑11:
Decovar: A multistyle decorative variable font by David Berlow.
- 2017‑02‑10:
Utrasound can accelerate the aging of distilled liquor.
- 2017‑02‑10:
An experimental investigation of a crappy USB mug warmer.
- 2017‑02‑10:
FreeBSD-1.x CVS converted to git.
- 2017‑02‑10:
Conversion scripts of the CSRG SCCS repository to git.
- 2017‑02‑10:
Why PostgreSQL does not have query planner hints.
- 2017‑02‑10:
Mains frequency regulation, AC grids, and the retirement of steam turbine power stations.
- 2017‑02‑10:
Code execution vulnerability in bash tab completion.
- 2017‑02‑10:
Safe schema migrations without downtime on PostgreSQL.
- 2017‑02‑10:
RethinkDB versus PostgreSQL: lessons learned from developing SageMathCloud.
- 2017‑02‑09:
France's beautiful national library reopens after a decade of renovations.
- 2017‑02‑09:
Why acme-client does not use a seccomp sandbox on Linux.
- 2017‑02‑09:
The warm, rich sound of valve guitar amplifiers.
- 2017‑02‑09:
Leap-smeared representation of time for high-accuracy applications.
- 2017‑02‑08:
The Uber SSH Certificate Authority.
- 2017‑02‑08:
We finally have a computer that can survive on the surface of Venus.
- 2017‑02‑08:
American Fuzzy Lop'ing Rust.
- 2017‑02‑08:
HERMIT: the Haskell equational reasoning model-to-implementation tunnel.
- 2017‑02‑08:
Why prove programs equivalent when your Haskell compiler can do that for you?
- 2017‑02‑08:
Oracle to Postgres migration: considerations, hurdles, and possible solutions.
- 2017‑02‑08:
More on Microsoft's GVFS and git performance work.
- 2017‑02‑07:
MongoDB 3.4.0 Jepsen analysis.
- 2017‑02‑07:
The security impact of https interception.
- 2017‑02‑07:
The Women Scientists WikiProject: a brilliant "fuck you" to Wikipedia trolls.
- 2017‑02‑07:
Why Star Trek: Deep Space Nine and Voyager won't be released in HD or on Blu-ray.
- 2017‑02‑07:
zetcd: Zookeeper client support for etcd clusters.
- 2017‑02‑07:
How Kubernetes handles incoming requests: services and ingress under an X-ray.
- 2017‑02‑07:
Online database migrations at scale.
- 2017‑02‑07:
How Shopify throttles flashes of high-write traffic using nginx+Lua.
- 2017‑02‑07:
Inferbo: Infer-based buffer overrun analyzer.
- 2017‑02‑06:
The garbage collection handbook.
- 2017‑02‑06:
RethinkDB joins the Linux Foundation.
- 2017‑02‑06:
The Cloud Native Computing Foundation recommends ASLv2.
- 2017‑02‑06:
pgBackRest: PostgreSQL backup and restore.
- 2017‑02‑06:
New ammonia process also generates electricity.
- 2017‑02‑06:
Russian hackers have broken casino slot machine random number generators.
- 2017‑02‑06:
RethinkDB relicensed from AGPL3 to APL2.
- 2017‑02‑05:
WAL-E: continuous archiving for Postgres.
- 2017‑02‑05:
M&Ms and Skittles sorting machine.
- 2017‑02‑05:
Understanding Julia and Mandelbrot sets.
- 2017‑02‑05:
The case against serving in Trump's administration.
- 2017‑02‑05:
Kaitai Struct: declarative binary format parsing language.
- 2017‑02‑05:
How powerful people trick you into hating protesters.
- 2017‑02‑04:
QE2 1987 refit from steam turbine to diesel electric.
- 2017‑02‑04:
SQL Slammer returns from the dead.
- 2017‑02‑04:
The Gray-1, a homebrew CPU exclusively composed of memory.
- 2017‑02‑04:
Donald Trump and the terrible phone call with Australia.
- 2017‑02‑04:
Frictionless border with Ireland impossible after Brexit, government is told.
- 2017‑02‑04:
Scaling Git at Microsoft.
- 2017‑02‑03:
UK rail companies to undergo most radical overhaul of train fares for more than 30 years.
- 2017‑02‑03:
Monotonic elapsed time measurements in Golang.
- 2017‑02‑03:
NHSmail #replyallgate: 500 million messages in 75 minutes.
- 2017‑02‑03:
Abstraction-filtration-comparison test for non-literal copying of code.
- 2017‑02‑03:
John Carmack on the Zenimax vs Oculus trial.
- 2017‑02‑02:
The beauty of array indexing and mixed-radix bases.
- 2017‑02‑02:
Lychee identified as cause for mystery deadly childhood illness in India.
- 2017‑02‑02:
The landlord octopus, still stalking London.
- 2017‑02‑01:
Early analysis of the relationship between Brexit vote and anti-Trump petition.
- 2017‑02‑01:
Red tape is organizational scar tissue.
- 2017‑02‑01:
GitLab.com database incident report.
- 2017‑02‑01:
How Etsy manages TLS X.509 certificates for custom domains with Let's Encrypt.
- 2017‑01‑31:
macOS patches for Dell XPS 13.
- 2017‑01‑31:
Bit permutations.
- 2017‑01‑31:
An overview of macros in Rust.
- 2017‑01‑31:
Lowering Rust traits to logic: Horn clauses in the type system.
- 2017‑01‑31:
Don't setenv in multi-threaded code.
- 2017‑01‑31:
The algorithms behind probabilistic programming.
- 2017‑01‑31:
Swift hash table iteration and reinsertion is accidentally quadratic.
- 2017‑01‑31:
Punched card typography explained.
- 2017‑01‑30:
Quickly counting secure delegations using HyperLogLog and DNSSEC NSEC3.
- 2017‑01‑30:
Using rational numbers to key nested sets in a relational database.
- 2017‑01‑30:
Building the Raspberry Pi Infinity+ jumbo exhibition model.
- 2017‑01‑30:
UK anti-Trump petition map.
- 2017‑01‑30:
What is the oldest computer program still in use?
- 2017‑01‑30:
Trunk-based development: how to branch your source repository.
- 2017‑01‑29:
MIT PDP-10 ITS Incompatible Timesharing System source code.
- 2017‑01‑29:
KVM hypervisor security hardening in the Google Cloud.
- 2017‑01‑29:
Ansible best practices. (Native YAML for module arguments!)
- 2017‑01‑29:
Project Everest: a formally verified https stack in development at INRIA.
- 2017‑01‑29:
Peloton: the self-driving database. (slides)
- 2017‑01‑29:
Peloton: an in-memory database based on PostgreSQL, self-tuned using machine learning.
- 2017‑01‑28:
The internals of PostgreSQL.
- 2017‑01‑28:
The long-overdue opioid revolution is finally here.
- 2017‑01‑28:
Google Chrome no longer rechecks all resources when you reload a page.
- 2017‑01‑28:
Using immutable caching to speed up the web.
- 2017‑01‑27:
Secrets management with Hashicorp Vault in the Autopilot pattern.
- 2017‑01‑27:
1.1 billion taxi rides analysed with kdb+/q and 4 Xeon Phi CPUs.
- 2017‑01‑27:
IPv6 on FreeBSD on AWS EC2.
- 2017‑01‑27:
Archeology at the New Museums Site in Cambridge.
- 2017‑01‑27:
The design of POSTGRES. (1985)
- 2017‑01‑27:
Some highlights from POPL'17 in Paris.
- 2017‑01‑27:
Google's root X.509 TLS CA.
- 2017‑01‑26:
Formal proof of the four colour theorem.
- 2017‑01‑26:
AWS IPv6 rollout.
- 2017‑01‑26:
If your boss could do your job, you are more likely to be happy at work.
- 2017‑01‑25:
Tektronix Smalltalk document archive.
- 2017‑01‑25:
The styrofoam presidency.
- 2017‑01‑25:
Russian Proton rocket grounded by poor quality control.
- 2017‑01‑25:
How GitHub moved persistent data from Redis to MySQL.
- 2017‑01‑25:
MiniKeePass for iPhone.
- 2017‑01‑25:
KeePassXC: KeePass cross-platform community edition. (A fork without a single-maintainer bottleneck.)
- 2017‑01‑25:
Columbus and the shape of the Earth, a "Holywood" story.
- 2017‑01‑25:
Rogue One subverts Asian male stereotypes, and that's important.
- 2017‑01‑25:
Handshake patterns in Rust: making two traits co-operate.
- 2017‑01‑25:
Towards assigning blame to unsafe code in Rust.
- 2017‑01‑24:
Twelve LaTeX packages to get your paper accepted.
- 2017‑01‑24:
Vendors take Facebook's data centre switches to market.
- 2017‑01‑24:
The saga of Golang dependency management.
- 2017‑01‑24:
Delete an inline function, save 794 kB.
- 2017‑01‑24:
Plotting a Dutch cycling network onto a British town.
- 2017‑01‑23:
Why Trump's staff are lying.
- 2017‑01‑23:
Cisco Umbrella / OpenDNS top 1m most popular domains.
- 2017‑01‑22:
So your institute went cold turkey on Elsevier. What now?
- 2017‑01‑22:
The death of the British dream.
- 2017‑01‑22:
Ada Lovelace's calculation of Bernoulli's numbers: dissecting an Analytical Engine program.
- 2017‑01‑22:
So just how fast are Golang channels anyway?
- 2017‑01‑22:
The barycentric conspiracy: modern triangle rasterization.
- 2017‑01‑22:
Programming languages other than Erlang on the BEAM.
- 2017‑01‑22:
Maintainers don't scale: the BDFL is an antipattern in open source software development.
- 2017‑01‑22:
BundleWrap compared to other config management tools.
- 2017‑01‑22:
BundleWrap: config management with Python without yaml.
- 2017‑01‑22:
ngrok: secure introspectable tunnels to servers on your localhost behind a firewall.
- 2017‑01‑22:
Hellogopher: just clone and make your conventional Golang project, without GOPATH.
- 2017‑01‑21:
How a Kalman filter works, in pictures.
- 2017‑01‑21:
This is not an EXE, this is not a DLL, this is a Windows App.
- 2017‑01‑21:
The infrastructure behind Twitter.
- 2017‑01‑21:
How Discord stores billions of messages in Cassandra.
- 2017‑01‑20:
Collapse of the Larsen B Antarctic ice shelf. (2002)
- 2017‑01‑20:
The rift in the Larsen-C Antarctic ice shelf grew 10km since the start of the month.
- 2017‑01‑20:
Fac: a build system that automatically tracks dependencies, by the author of Darcs.
- 2017‑01‑20:
Exponential laws of computing growth. Moore's law, Dennard scaling, Koomey's law, Amdahl's law, vs the logistic function.
- 2017‑01‑20:
IPv6-only at Microsoft.
- 2017‑01‑19:
postage: a web-based GUI for PostgreSQL.
- 2017‑01‑18:
The problem with the English: England doesn't want to be just another member of a team. (Brexit)
- 2017‑01‑18:
A full English Brexit, with kippers.
- 2017‑01‑17:
A brief history of African click words.
- 2017‑01‑17:
The CIA's declassified but previously inaccessible history is now online.
- 2017‑01‑17:
Trace the growth (or decline) of British cities and counties over the last 200 years.
- 2017‑01‑17:
Erik Verlinde's gravity minus dark matter: a quantum basis for MOND.
- 2017‑01‑17:
How did Darwin decide which book to read next?
- 2017‑01‑17:
Gates Foundation research must now be published in open access journals.
- 2017‑01‑17:
Dovecot security audit results.
- 2017‑01‑16:
When constant-time source code compiles to a binary with a timing attack vulnerability in Curve25519.
- 2017‑01‑16:
The line of death: which pixels are trustworthy?
- 2017‑01‑15:
Blobless Linux on Raspberry Pi now boots.
- 2017‑01‑15:
Feeling safer online with Firefox: better security permissions dialog boxes.
- 2017‑01‑15:
Containers from scratch, without docker or rkt.
- 2017‑01‑15:
Linux kernel initialization, translated to bash.
- 2017‑01‑15:
vallumd: feed an MQTT topic into an IPset blacklist.
- 2017‑01‑15:
posixcube: a POSIX compliant shell script server automation framework.
- 2017‑01‑15:
dgsh: directed graph shell, a bash extension for multiple parallel pipelines.
- 2017‑01‑14:
When they came from another world: James Gleick reviews Story Of Your Life and Arrival.
- 2017‑01‑14:
ZeroPhone: a Raspberry Pi smartphone.
- 2017‑01‑14:
Seagate is shutting down one of its largest HDD manufacturing plants.
- 2017‑01‑14:
DRAM latency then and now / the perfomance of 1980s RAM-coupled processors.
- 2017‑01‑14:
Big comparison grid of C++ compilers standards implementation status.
- 2017‑01‑14:
GCC C++ standards implementation status.
- 2017‑01‑14:
Clang C++ standard implementation status.
- 2017‑01‑13:
The complexity of abstract machines / the efficiency of lambda calculus evaluation strategies.
- 2017‑01‑13:
Freenom World public DNS resolver.
- 2017‑01‑13:
The state of certificate revocation: CRLs, OCSP and OCSP stapling. (Jan 2016)
- 2017‑01‑13:
GoDaddy revoked and then un-revoked a certificate without request.
- 2017‑01‑13:
GoDaddy issued certificates without proper domain validation.
- 2017‑01‑13:
RISC-V port of gcc heads upstream.
- 2017‑01‑12:
How Flickr got through a year without buying one byte of additional storage.
- 2017‑01‑11:
Dart on LLVM.
- 2017‑01‑11:
Dockerfile security tuneup.
- 2017‑01‑11:
Docker? Looks like you have a bad case of embedded libraries.
- 2017‑01‑11:
The programmer-archaeologist sees the GPL and asks, "What is this?"
- 2017‑01‑11:
Box is a special type in Rust.
- 2017‑01‑11:
Chris Lattner is joining Tesla.
- 2017‑01‑11:
Chris Lattner is leaving Apple.
- 2017‑01‑11:
The Rust module system is too confusing.
- 2017‑01‑10:
How Stack Overflow plans to survive the next DNS attack.
- 2017‑01‑10:
Think you understand the link between money supply and inflation? Think again.
- 2017‑01‑10:
Kali: a Linux distribution for penetration testing and ethical hacking.
- 2017‑01‑10:
The web application hacker's handbook.
- 2017‑01‑10:
Tron: a Windows cleanup script that fights for the user.
- 2017‑01‑10:
On the portability of Algol68 and BLISS vs C and Pascal in the 1970s.
- 2017‑01‑10:
How to make select(2) go faster.
- 2017‑01‑10:
select(2) is fundamentally slow.
- 2017‑01‑09:
The history of select(2).
- 2017‑01‑09:
ouxr: old Unix source cross-reference.
- 2017‑01‑09:
The Riemann Hypothesis, explained.
- 2017‑01‑09:
Free As In Health Care: freedom vs restraint, software vs liability.
- 2017‑01‑08:
GCC code generation for C++ constant loops of various sizes.
- 2017‑01‑08:
A tour of the CS Responder trans-oceanic cable laying ship.
- 2017‑01‑08:
Maja Kuczyńska, skydance junior world champion.
- 2017‑01‑08:
I wore men's clothes for a month, and it changed my life.
- 2017‑01‑08:
The Irish ether drinking craze of the 1800s.
- 2017‑01‑08:
A collection of debugging stories.
- 2017‑01‑08:
Why are the data formats in Star Wars such an awful mess?
- 2017‑01‑08:
GNU sed 4.3 now uses GNU grep's DFA regex matcher, for a 10x speedup.
- 2017‑01‑07:
Alacritty: a GPU-accelerated terminal emulator.
- 2017‑01‑07:
LLVM target for VideoCore4 (Raspberry Pi VPU).
- 2017‑01‑07:
vc4-toolchain: A port of gcc + binutils to the Raspberry Pi's VideoCore4 processor.
- 2017‑01‑07:
Tools and information for the Broadcom VideoCore IV (RaspberryPi).
- 2017‑01‑07:
Did media literacy backfire? On critical reading, doubt, and distrust of experts.
- 2017‑01‑07:
Brexit: remaining angry.
- 2017‑01‑07:
Adventures in PKI and pkcs-11.
- 2017‑01‑06:
Compiling Rust to Wasm.
- 2017‑01‑06:
KLF / Justified Ancients Of Mu Mu to return in August 2017.
- 2017‑01‑06:
A tourist's guide to the LLVM source code.
- 2017‑01‑06:
Rust at OneSignal.
- 2017‑01‑06:
Graph isomorphism strikes back.
- 2017‑01‑06:
dnsfwd: aggregate DNS queries over a single TCP/TLS connection.
- 2017‑01‑06:
Cepheus: a practically perfect AI poker player.
- 2017‑01‑06:
Google reveals anonymous online test of AlphaGo, which beat top players.
- 2017‑01‑05:
The real name fallacy.
- 2017‑01‑05:
State of the VMS port to x86_64 as of sep 2016.
- 2017‑01‑05:
Renewing Medium's focus, veering away from ad-supported writing.
- 2017‑01‑04:
Everything you never wanted to know about PKI but were forced to find out.
- 2017‑01‑04:
X.509 style guide.
- 2017‑01‑04:
Progress with sentiment analysis of FOSS communities.
- 2017‑01‑04:
Grumpy: a Python to Golang compiler.
- 2017‑01‑04:
On the reversed layouts of phone and calculator keypads.
- 2017‑01‑04:
Conclusion of the SpaceX launch pad explosion investigation.
- 2017‑01‑04:
Why isn't memset() async-signal-safe?
- 2017‑01‑04:
Square-mile street network visualization: how big are your city blocks?
- 2017‑01‑04:
Did inadequate women's healthcare destroy Star Wars' Old Republic?
- 2017‑01‑03:
How to write tests.
- 2017‑01‑02:
650Gbps DDoS attack from the Leet botnet.
- 2017‑01‑02:
Does Googlebot execute JavaScript?
- 2017‑01‑02:
The moving sofa problem.
- 2017‑01‑02:
Boost the wisdom of crowds by accounting for metaknowledge.
- 2017‑01‑01:
Trump, Putin, and the oil pipelines to nowhere.
- 2017‑01‑01:
Princess Leia's revolutionary hairstyle.
- 2017‑01‑01:
Gitea: a lightweight git hosting service written in Golang, forked from Gogs.
- 2017‑01‑01:
A quick introduction to RISC-V assembly language.
- 2016‑12‑31:
Apple AirPods teardown.
- 2016‑12‑31:
The best prime numbers of 2016.
- 2016‑12‑31:
How command line parameters are parsed on Windows.
- 2016‑12‑31:
About the PHPMailer CVE-2016-10033 and CVE-2016-10045 remote code execution vulnerabilities.
- 2016‑12‑31:
Load Balanced DNS with dnsdist.
- 2016‑12‑30:
Typography wars: has the Internet killed curly quotes?
- 2016‑12‑30:
The Hardware Hacker: Bunnie Huang's tour-de-force book on his career so far.
- 2016‑12‑30:
OpenSSL 1.1 API migration path (or the lack thereof...)
- 2016‑12‑30:
US CDC considers lowering threshold level for lead exposure.
- 2016‑12‑30:
The history of keeping the damned women out: when Cambridge went co-educational.
- 2016‑12‑30:
Hormonal contraceptives are linked to depression, and doctors can no longer ignore it.
- 2016‑12‑30:
Non-compete clauses in employment contracts and developers' side projects.
- 2016‑12‑30:
Firejail security sandbox, based on Linux namespaces and seccomp-bpf.
- 2016‑12‑30:
LoRaHam: Ham radio protocols and Arduino examples for LoRa on 70cm.
- 2016‑12‑30:
A coding style guide horror story.
- 2016‑12‑30:
Security risks with untrusted input and Python's new-style string formatting.
- 2016‑12‑29:
How to triage an academic paper.
- 2016‑12‑29:
DTrace at home: a kernel hacker bypasses a bug in Adobe Illustrator.
- 2016‑12‑29:
How not to build a digital archive: lessons from the dark side of the force.
- 2016‑12‑29:
From tape drives to memory orbs, the data formats of Star Wars suck.
- 2016‑12‑29:
Modules in Clang.
- 2016‑12‑29:
Detecting the use of `curl | bash` server side.
- 2016‑12‑29:
Theresa May lacks courage to admit complexity of Brexit.
- 2016‑12‑29:
Mealworms can happily and safely eat styrofoam.
- 2016‑12‑29:
From secretary to software developer, the hard way.
- 2016‑12‑28:
OONI: open observatory of network interference, detecting censorship, surveillance and traffic manipulation.
- 2016‑12‑28:
New theory explains how the moon got there.
- 2016‑12‑28:
Maslow's hierarchy of SRE / devops needs.
- 2016‑12‑28:
What was it like working on the original iPhone project (codenamed Project Purple)?
- 2016‑12‑28:
Live CO2 emissions of European electricity production.
- 2016‑12‑28:
The mysterious virus that could cause obesity.
- 2016‑12‑28:
How C compilers break for objects larger than PTRDIFF_MAX bytes.
- 2016‑12‑28:
Chunked sequences: O(1) push and pop, O(log n) split and concat, low constant factors.
- 2016‑12‑28:
A list of lists of falsehoods programmers believe about almost everything.
- 2016‑12‑27:
Falsehoods programmers believe about CSV.
- 2016‑12‑27:
twitter-export-image-fill: A script to download all the images that should be in your Twitter archive.
- 2016‑12‑27:
ISO/IEC JTC1 SC22 WG14 N2086: C2x charter.
- 2016‑12‑27:
Everyone quotes command line arguments the wrong way on Windows.
- 2016‑12‑27:
Rogue One: an engineering ethics story.
- 2016‑12‑27:
Making DNSSEC work for an AWS-hosted site.
- 2016‑12‑27:
Reflecting on Haskell in 2016.
- 2016‑12‑26:
Code style tip: Return early and clearly.
- 2016‑12‑26:
μWWVB: A tiny WWVB station for setting radio-synced watches.
- 2016‑12‑26:
The farmer who built her own gigabit FTTP ISP.
- 2016‑12‑26:
No API? No problem! Scripting AJAX web UIs with Fiddler and PowerShell.
- 2016‑12‑26:
All the talks from the Systems We Love conference.
- 2016‑12‑26:
Kubernetes / AWS networking for dummies.
- 2016‑12‑26:
A container networking introduction and overview.
- 2016‑12‑26:
What the Guardian tech team learnt from their mistakes in 2016.
- 2016‑12‑26:
Petros Vrellis: knitted pictures on a circular loom.
- 2016‑12‑26:
ThreadTone: halftone images made of thread.
- 2016‑12‑26:
Die photos and analysis of the revolutionary 8008 microprocessor, 45 years old.
- 2016‑12‑26:
The MySQL "swap insanity" problem and the effects of the NUMA architecture.
- 2016‑12‑25:
Cambridge night climbing.
- 2016‑12‑25:
gti: a steam locomotive for git users.
- 2016‑12‑24:
Selected Usenet articles on computing.
- 2016‑12‑24:
Constant-time crypto in BearSSL.
- 2016‑12‑23:
Inside the Starshot mission to Alpha Centauri.
- 2016‑12‑23:
Multiple DNS providers: synchronizing Dyn and to AWS Route 53, using nsnotifyd and cli53.
- 2016‑12‑23:
Leap smear at Amazon.
- 2016‑12‑23:
Top 10 Python libraries of 2016.
- 2016‑12‑22:
How Heroku sped up SNI TLS handshakes in Erlang by 5x.
- 2016‑12‑22:
Now, that's what I call Brexit! Delving into the Brexicon.
- 2016‑12‑22:
Squaring the data protection circle with Brexit just got harder for the UK.
- 2016‑12‑22:
Learning from a year of security breaches.
- 2016‑12‑22:
Mike Oldfield 'Tubular Bells' Live at the BBC 1973. (YouTube)
- 2016‑12‑22:
Multi-process Firefox project status report.
- 2016‑12‑21:
Let Toys Be Toys 2016 end of year report.
- 2016‑12‑21:
A history of the Washington-Moscow hotline.
- 2016‑12‑21:
Furiosa's armor-plated cat feeder.
- 2016‑12‑21:
The war on drugs in 2016.
- 2016‑12‑21:
Solar now produces a better energy return on investment than oil.
- 2016‑12‑20:
20 years ago, Apple bought NeXT.
- 2016‑12‑20:
Fabrice Bellard's 128-bit RISCVEMU RISC-V system emulator.
- 2016‑12‑20:
Modern garbage collection vs Golang.
- 2016‑12‑20:
The incompatible food triad is the most delicious philosophical problem of our time.
- 2016‑12‑20:
A qp-trie implementation in Rust.
- 2016‑12‑20:
A complete archive of the sf-lovers mailing list.
- 2016‑12‑19:
A bit of history about sf-lovers.
- 2016‑12‑19:
SF-lovers: archive of the first big non-technical ARPANET mailing list.
- 2016‑12‑19:
GPS seismology: real-time high-rate sampling for tsunami warnings.
- 2016‑12‑19:
The accidental tide guage: a GPS reflection case study from Alaska.
- 2016‑12‑19:
How does a GPS tide guage work?
- 2016‑12‑19:
GPS interferometric reflectometry for measuring the depth of snow.
- 2016‑12‑19:
CYGNSS: a weather satellite system using reflected GPS signals to measure ocean winds.
- 2016‑12‑19:
How Sweden has redesigned streets to route around bad human behavior.
- 2016‑12‑18:
Why percentiles don't work the way you think.
- 2016‑12‑18:
You need to rethink your ssh jump server.
- 2016‑12‑18:
Three-tier support should be replaced with Swarming in a DevOps-oriented organization.
- 2016‑12‑18:
Tired of Makefiles.
- 2016‑12‑18:
Reliably compromising Ubuntu desktops by attacking the crash reporter.
- 2016‑12‑18:
How Unix got into the CEO's office at AT&T.
- 2016‑12‑18:
Some advice for dealing with narcissists like Trump.
- 2016‑12‑17:
Project Wycheproof tests crypto libraries against known attacks.
- 2016‑12‑17:
SQLines Oracle to PostgreSQL migration reference.
- 2016‑12‑17:
Could the best way to make money from science be to give it away for free?
- 2016‑12‑17:
A chemical chorus: "carol of the bells" played using NMR data.
- 2016‑12‑17:
How Godbolt's compiler explorer works.
- 2016‑12‑16:
Galileo, Europe's global navigation satellite system, goes into production.
- 2016‑12‑16:
Compromise recent Linux desktops via gstreamer SNES emulation.
- 2016‑12‑16:
The underhanded Rust contest.
- 2016‑12‑16:
GitHub is building a coder's paradise. It's not coming cheap.
- 2016‑12‑15:
Major flaws in university league tables: Governments and institutions should ignore them.
- 2016‑12‑15:
Zero-cost futures in Rust.
- 2016‑12‑15:
9 places that reveal the hidden history of the cold war in Britain.
- 2016‑12‑14:
Programming is forgetting: toward a new hacker ethic.
- 2016‑12‑14:
What would happen if the USA went to war against Santa?
- 2016‑12‑14:
Efficient markets? When to send an investing model into retirement.
- 2016‑12‑14:
Kakoune: a vi-like editor with a better command grammar:
- 2016‑12‑14:
Zone poisoning: the how and where of insecure dynamic DNS UPDATEs.
- 2016‑12‑14:
Why you should not review for or publish with Elsevier.
- 2016‑12‑14:
A faster sort algorithm for Rust.
- 2016‑12‑13:
EPA admits that fracking can contaminate drinking water.
- 2016‑12‑13:
Enormous uplift at a site of explosive volcanic eruptions on the Chile / Argentina border.
- 2016‑12‑13:
Choose your own email adventure! A tool to help freelancers negotiate contract terms.
- 2016‑12‑13:
Cheap-ass ECMP with an ethernet hub and non-contiguous netmasks.
- 2016‑12‑13:
Where does 9600bps come from?
- 2016‑12‑13:
Best practices in DNS anycast service provision architecture. (2006)
- 2016‑12‑13:
Best practices in IPv4 anycast routing. (1997)
- 2016‑12‑13:
Build your own anycast network in 9 steps.
- 2016‑12‑13:
3 million Brexit tweets reveal leave voters talked about immigration more than anything else.
- 2016‑12‑13:
Hexml: a very fast but incomplete XML parser inC and Haskell.
- 2016‑12‑13:
Pugixml: parsing XML at the speed of light.
- 2016‑12‑13:
pugixml: Light-weight, simple and fast XML parser for C++ with XPath support.
- 2016‑12‑13:
Daniel Ellsberg, Edward Snowden, and the modern whistle-blower.
- 2016‑12‑12:
Revamped bubble wrap loses its pop.
- 2016‑12‑12:
Commercial web sites must check all their link targets for piracy, rules Hamburg court.
- 2016‑12‑12:
Discussion of server hardware for GitLab.com.
- 2016‑12‑12:
Not giving up on PGP: how to set up stronger key encryption and use OpenKeychain on Android.
- 2016‑12‑12:
Exchange Online message corruption breaks DKIM signatures on some forwarded messages.
- 2016‑12‑12:
German judges explain why Adblock Plus is legal.
- 2016‑12‑12:
Wendelstein 7-X fusion stellarator: At the cutting edge of technology.
- 2016‑12‑12:
Confirmation of the topology of the Wendelstein 7-X fusion stellarator's plasma confinement magnetic field.
- 2016‑12‑11:
grafanalib: generate Grafana dashboards from simple Python scripts.
- 2016‑12‑11:
jid: json incremental digger, like an interactive jq. (Golang)
- 2016‑12‑11:
ansistrano: an Ansible port of the Capistrano web app deployment tool.
- 2016‑12‑11:
pREST: an alternative to PostgREST written in Golang instead of Haskell.
- 2016‑12‑11:
Fan is a tool-using animal.
- 2016‑12‑11:
How to manage multistage environments with Ansible.
- 2016‑12‑11:
NetData: scalable, distributed real-time performance and health monitoring.
- 2016‑12‑11:
President of Colombia called for a rethink of the war on drugs in his Nobel Peace Prize acceptance speech.
- 2016‑12‑10:
Better insults.
- 2016‑12‑10:
Only one activity is known to grow new neurons in adulthood: vigorous aerobic exercise.
- 2016‑12‑10:
Command-line cartography with newline-delimited JSON (NDJSON).
- 2016‑12‑10:
PG Wodehouse archives acquired by British Library.
- 2016‑12‑10:
Five things we learnt from the Supreme Court Article 50 hearing.
- 2016‑12‑10:
Don't cry over dead trade agreements.
- 2016‑12‑09:
Breaking the exploit chain: Win32k API lockdown in Google Chrome.
- 2016‑12‑09:
Hilary: the most poisoned baby name in US history.
- 2016‑12‑09:
Passive WiFi could be 10,000 times more power efficient.
- 2016‑12‑09:
A guide to the breads of India.
- 2016‑12‑09:
Intel x86 documentation has more pages than the 6502 has transistors.
- 2016‑12‑09:
Romer's gap / tetrapod triumph! Solving the mystery of the first land vertebrates.
- 2016‑12‑09:
New measurements of the Earth's rotation from 720 BC to AD 2015.
- 2016‑12‑09:
EU applications to Cambridge University fell after the Brexit vote.
- 2016‑12‑09:
RISC-V BOOM: Berkeley Out-of-Order Machine.
- 2016‑12‑09:
FOSSi: The Free and Open Source Silicon Foundation.
- 2016‑12‑09:
Faild: Fastly's in-house load balancing system.
- 2016‑12‑09:
The right has its own version of political correctness. It's just as stifling.
- 2016‑12‑08:
The half-life of code and the git of Theseus.
- 2016‑12‑08:
Communications infrastructure in Cornwall. (YouTube)
- 2016‑12‑08:
Announcing TypeScript 2.1.
- 2016‑12‑08:
Compositional test-case shrinking in Hypothesis.
- 2016‑12‑08:
Integrated vs type-based shrinking: Hypothesis vs QuickCheck.
- 2016‑12‑08:
How to get someone to check a cable: ask them to blow the dust out of the connector.
- 2016‑12‑08:
Mr. Robot killed the Hollywood hacker.
- 2016‑12‑07:
An algebra of graphs.
- 2016‑12‑07:
How not to fuck up your manufacturing startup.
- 2016‑12‑07:
Secure ROM extraction on iPhone 6s.
- 2016‑12‑07:
Starting a new Rust project right, with error-chain.
- 2016‑12‑07:
The UK's Investigatory Powers Act allows the state to tell lies in court.
- 2016‑12‑07:
Google says it will run entirely on renewable energy in 2017.
- 2016‑12‑07:
The orphaned Internet: 120K domains vulnerable to the shared hosting takeover attack.
- 2016‑12‑07:
Giving up on PGP.
- 2016‑12‑06:
Ultra-stable optical clock with two cold-atom ensembles.
- 2016‑12‑06:
NIST ZDT (zero dead time) dual ytterbium optical lattice clock sets new stability record.
- 2016‑12‑06:
Azure Jupyter notebooks in action for CUED 1A computing.
- 2016‑12‑06:
Azure Jupyter notebooks.
- 2016‑12‑05:
SSD prices rise as NAND shortage bites; HDD shortage looms as components become scarce.
- 2016‑12‑05:
How slow https processing in Python revealed a performance bug in macOS calloc().
- 2016‑12‑05:
How I wrote the screenplay of Arrival, and what I learned doing it.
- 2016‑12‑05:
V8 JavaScript engine: optimizing memory consumption.
- 2016‑12‑05:
Torsors made easy.
- 2016‑12‑05:
ripgrep code review.
- 2016‑12‑04:
How to use PVS-Studio static analyser for free.
- 2016‑12‑04:
Quantum physics and prime numbers: the answer to life, the universe and the third moment of the Riemann zeta function.
- 2016‑12‑04:
Origin of diversity in falling snow: how special are snowflakes?
- 2016‑12‑04:
Tim Hayward's guide to making the ultimate gravy.
- 2016‑12‑04:
ProtonMail deploys SRP to improve usability by unifying login and decryption passwords.
- 2016‑12‑04:
IPv6 support for EC2 instances in AWS virtual private clouds.
- 2016‑12‑04:
Canonical log lines: a single-line summary of each request.
- 2016‑12‑04:
Brigadoon, the time machine.
- 2016‑12‑04:
ojo: Fun one-liners with Mojo, a perl web framework.
- 2016‑12‑04:
recs: A system for command-line analysis of data.
- 2016‑12‑03:
Let's stop copying C.
- 2016‑12‑02:
15 years of concurrency at Microsoft.
- 2016‑12‑02:
Service discovery at Stripe with Consul, HAProxy, and DNS.
- 2016‑12‑02:
RoLR, Registrar of Last Resort: malicious domain quarantine.
- 2016‑12‑02:
Avalanche law enforcement takedown.
- 2016‑12‑02:
'Avalanche' botnet C&C dismantled in international operation.
- 2016‑12‑02:
So long, Whitechapel bell foundry.
- 2016‑12‑02:
How data analysis identified the Singapore Circle Line rogue train.
- 2016‑12‑01:
Google OSS-Fuzz: continuous fuzzing for open source software.
- 2016‑12‑01:
GNU Shepherd: the Guix system distribution's init process, written in Guile.
- 2016‑12‑01:
An apocryphal story about defect rates when ordering electronics from Japan.
- 2016‑12‑01:
Nichia LEDs: precise binning AND low minimum order quantities.
- 2016‑12‑01:
AMD will sneak-peek its high-end Zen CPU in December, starting a new CPU war.
- 2016‑11‑30:
Shipping maps win at the Information Is Beautiful awards.
- 2016‑11‑30:
UK ratifies membership of new unified EU patent court, despite Brexit.
- 2016‑11‑30:
The Emacs dumper dispute, or, unexec the awesomely horrible.
- 2016‑11‑30:
A very precise calculation of exactly how many cows are being murdered to make the new fivers.
- 2016‑11‑30:
A design for micron-scale atomic clocks using endohedral fullerenes.
- 2016‑11‑30:
Raspberry Pi NTP stratum 1 microserver HOWTO.
- 2016‑11‑30:
Browsix: Unix in the browser tab.
- 2016‑11‑30:
Google public NTP servers with smeared leap seconds.
- 2016‑11‑30:
Corrode C-to-Rust translator: goto considered (mostly) harmless.
- 2016‑11‑30:
nom parser combinator library for Rust, version 2.0.
- 2016‑11‑30:
Rust's iterators are inefficient, and here's what to do about it.
- 2016‑11‑30:
Fujitsu and ARM collaborate for Japan's Post K supercomputer.
- 2016‑11‑30:
Barcelona supercomputing centre MareNostrum 4 will include Intel Xeon, Knights Hill, Knights Landing, IBM POWER 9, NVIDIA GPUs, Fujitsu ARMv8.
- 2016‑11‑30:
Router / switch buffer size issues.
- 2016‑11‑30:
New polymer £5 note added to Churchill archives centre, where it sits alongside Winston Churchill's unpaid bills.
- 2016‑11‑30:
10G ethernet switch buffer sizes.
- 2016‑11‑30:
Betavoltaic devices.
- 2016‑11‑30:
A new higher-power diamond betavoltaic battery.
- 2016‑11‑29:
The surprising implications of the Microsoft / Ireland warrant case.
- 2016‑11‑29:
LEGO Technics machine produces true braided rope.
- 2016‑11‑29:
Ofcom orders BT to separate from Openreach to improve competition.
- 2016‑11‑29:
Umberto Eco on Ur-Fascism.
- 2016‑11‑29:
The 14 characteristics of fascism.
- 2016‑11‑29:
Narcissistic personality disorder: Coping with chaos in the White House.
- 2016‑11‑29:
Chance of an 'orderly' Brexit within two years is less than 50%.
- 2016‑11‑29:
The electoral college was not meant to overturn elections.
- 2016‑11‑28:
The design of Vulkano, a Rust interface to Vulkan.
- 2016‑11‑28:
Who speaks for the state? Brexit in court.
- 2016‑11‑28:
On bullshit and the oath of office: the "LOL nothing matters" presidency.
- 2016‑11‑28:
The blockchain paradox: once you address the problem of governance, you no longer need a blockchain.
- 2016‑11‑27:
pgTAP: unit testing for PostgreSQL.
- 2016‑11‑27:
pgrebase: easy management of Postgres functions, triggers, views, etc.
- 2016‑11‑27:
Pictures of the GeoCities cage at Exodus Communications. (1999)
- 2016‑11‑27:
Systemd is not magic security pixie dust.
- 2016‑11‑26:
Building a Harlequin ZX Spectrum clone.
- 2016‑11‑26:
Abusing MS Edge URL protocols.
- 2016‑11‑26:
Lessons learned playing the programming game Shenzhen I/O.
- 2016‑11‑26:
Approaches to applying spacing methods in seriffed and sans-serif typeface designs.
- 2016‑11‑26:
What if jobs are not the solution but the problem?
- 2016‑11‑25:
Disobedient electronics: call for submissions.
- 2016‑11‑25:
Don't build private clouds.
- 2016‑11‑25:
On political and civic structures.
- 2016‑11‑25:
Rust hash tables are accidentally quadratic.
- 2016‑11‑25:
sccache, Mozilla's distributed compiler cache, now written in Rust.
- 2016‑11‑25:
Putting the Rust in Trust: towards formal verification.
- 2016‑11‑25:
Robigalia: a userland for seL4 written in Rust.
- 2016‑11‑25:
CakeML: a formally verified implementation of ML.
- 2016‑11‑23:
Aspartame may prevent weight loss by blocking an intestinal enzyme's activity.
- 2016‑11‑23:
Solving imaginary scaling issues, at scale.
- 2016‑11‑22:
Using Let's Encrypt within FreeBSD.org.
- 2016‑11‑22:
Who will command the robot armies?
- 2016‑11‑22:
Brussels prepares for a hard Brexit.
- 2016‑11‑22:
US banks lay groundwork to leave London.
- 2016‑11‑22:
A 4-bit calculator made from cardboard and marbles.
- 2016‑11‑21:
How to chop garlic. (video)
- 2016‑11‑21:
constexpr-8cc: a C compiler implemented in C++14 constant expressions.
- 2016‑11‑21:
Cloudflare IPv6 state of play.
- 2016‑11‑21:
This year is the first time the winner of the Interactive Fiction Competition can be played without a keyboard.
- 2016‑11‑21:
A particular kind of seaweed can reduce methane in cow burps and farts to nearly zero.
- 2016‑11‑21:
Lessons learned from South Australia power blackout.
- 2016‑11‑21:
QP trie to be used in Knot DNS.
- 2016‑11‑20:
German cities have come up with a cheap way to provide public toilets.
- 2016‑11‑20:
How to make bots that successfully fight racism on Twitter.
- 2016‑11‑19:
Blameless postmortem debriefing facilitation guide.
- 2016‑11‑19:
SpaceX plans worldwide low latency gigabit satellite Internet service.
- 2016‑11‑18:
"Sore winner" syndrome: Why are Donald Trump's supporters (and Brexiteers) still so angry?
- 2016‑11‑18:
Election expenses exposed: Channel 4 news investigation into breaches of campaign law.
- 2016‑11‑18:
Why Roman law did not succeed in England.
- 2016‑11‑18:
Chernobyl containment arch moved into place in historic engineering feat.
- 2016‑11‑17:
Stephen Wolfram on his contribution to the movie Arrival.
- 2016‑11‑17:
NTP leap smearing test results.
- 2016‑11‑17:
How Arrival's designers crafted a mesmerizing alien alphabet.
- 2016‑11‑17:
Rust for C++ programmers.
- 2016‑11‑17:
Learning Rust with entirely too many linked lists.
- 2016‑11‑17:
Xnet protesters in Spain drove the criminal prosecution of top bankers.
- 2016‑11‑15:
H L Mencken on Trump.
- 2016‑11‑15:
Leaked brexit memo: ministers have multiple conflicting plans, and Whitehall is struggling to cope.
- 2016‑11‑15:
Portable System Services: systemd takes over Linux containers.
- 2016‑11‑15:
Thunderbolt 3 technology brief.
- 2016‑11‑15:
Dutch principles of road design: Sustainable Safety in action.
- 2016‑11‑14:
Compromising a Linux desktop using 6502 processor opcodes on an emulated Nintendo.
- 2016‑11‑14:
Refactoring Rust std lib for ultimate portability.
- 2016‑11‑14:
More about the Fraunhofer Institute StEnSEA pumped storage system.
- 2016‑11‑14:
StEnSEA under-sea pumped storage 1:10 trial under way.
- 2016‑11‑14:
Cretonne as a backend for the Rust compiler.
- 2016‑11‑14:
Cretonne vs LLVM.
- 2016‑11‑14:
Cretonne: a low-level compiler back-end IR and retargetable code generator, implemented in Rust.
- 2016‑11‑14:
Wish you would step back from that ledge my friend: on leaving tech.
- 2016‑11‑13:
Some thoughts about DNS and DDoS.
- 2016‑11‑13:
Stop asking me to empathize with the white working class.
- 2016‑11‑13:
Solar panels surpass coal-fired electricity in UK over summer.
- 2016‑11‑13:
pg_repack: reorganize PostgreSQL with minimal locks. (Alternative to vacuum.)
- 2016‑11‑13:
What so many people don't get about the US working class.
- 2016‑11‑13:
Authoritarianism, not the economy, explains Trump and Brexit.
- 2016‑11‑13:
Sheffield University's vice chancellor on Theresa May's trade mission to India.
- 2016‑11‑12:
DNS request analysis with open source software.
- 2016‑11‑12:
Extreme bagpiping.
- 2016‑11‑12:
The Cinemax theory of racism.
- 2016‑11‑12:
Blink Shell: ssh and mosh terminal emulator for iOS.
- 2016‑11‑12:
Why sorting an array makes a Python loop faster.
- 2016‑11‑12:
Ted Chiang, the science fiction genius behind the film Arrival.
- 2016‑11‑11:
What's the singular form of 'cattle'?
- 2016‑11‑11:
Things fall apart: a history of banking crises and ensuing political crises in Britain.
- 2016‑11‑11:
Why the IETF should standardize JMAP.
- 2016‑11‑11:
Getting "atomic" (WWVB) clocks to work indoors and in weak signal areas.
- 2016‑11‑11:
CAN bus-off attack: error handling of in-vehicle networks makes them vulnerable.
- 2016‑11‑11:
The Beagle2 Mars lander came excruciatingly close to success.
- 2016‑11‑11:
Tor, TPMs and service integrity attestation.
- 2016‑11‑10:
History tells us what may happen next with Brexit and Trump.
- 2016‑11‑10:
Lies to children: Why electricity is hard to understand.
- 2016‑11‑09:
Climate change may be escalating so fast it could be 'game over'.
- 2016‑11‑09:
UK IPv6 council meeting October 2016 slides and videos.
- 2016‑11‑08:
NAPALM: network automation and programmability abstraction layer with multivendor support, for Ansible or Salt.
- 2016‑11‑08:
UK austerity policies 'amount to violations of disabled people's rights' says UN.
- 2016‑11‑08:
Brutal reality of lower benefit cap hits home for struggling UK families.
- 2016‑11‑08:
Akamai will smear the 2016 leap second.
- 2016‑11‑08:
How do you feel about optical lattice clocks?
- 2016‑11‑08:
Sun outage / interference prediction for geostationary orbit satellites.
- 2016‑11‑08:
IoT goes nuclear: creating a ZigBee chain reaction worm that spreads by physical proximity.
- 2016‑11‑08:
A list of headless browsers and related automation tools.
- 2016‑11‑08:
Some thoughts on Python asynchronous API design in a post-async/await world.
- 2016‑11‑07:
Locking in WebKit.
- 2016‑11‑07:
Futexes are tricky.
- 2016‑11‑07:
rq: record query, like a multi-format jq.
- 2016‑11‑07:
Perl and the birth of the dynamic web.
- 2016‑11‑06:
The "hard problem" of consciousness is a distraction from the "real problem".
- 2016‑11‑06:
Docker in production: a history of failure.
- 2016‑11‑06:
kpatch: patch a running Linux kernel.
- 2016‑11‑06:
Harvard researchers created solid metallic hydrogen and saw it is a reflective metal at low temperature at 495GPa.
- 2016‑11‑06:
The secret world of microwave networks.
- 2016‑11‑05:
Brexit is jeopardizing Britain's universities.
- 2016‑11‑05:
Holovect: holographic vector display. (Kickstarter)
- 2016‑11‑05:
Jeff Erickson's Algorithms, Etc.
- 2016‑11‑04:
BearSSL: a new small TLS implementation.
- 2016‑11‑03:
Abusing systemd user services.
- 2016‑11‑03:
Measuring Docker network overhead in multi-host clusters.
- 2016‑11‑03:
Measuring Docker disk IO overhead by benchmarking Percona server.
- 2016‑11‑03:
Measuring Docker CPU / network overhead by benchmarking Percona server.
- 2016‑11‑03:
PornHub bypasses ad blockers by using WebSockets.
- 2016‑11‑03:
Not so special: Why the US won't help Britain in the Brexit talks.
- 2016‑11‑02:
Active Cyber Defence: tackling cyber attacks on the UK
- 2016‑11‑02:
Benjamin Franklin's method for improving his writing.
- 2016‑11‑02:
The Brexit campaign, physics and data science: Vote Leave's "Voter Intention Collection System" (VICS) now available for all.
- 2016‑11‑01:
Polymorphism, subtyping, and type inference in MLsub.
- 2016‑11‑01:
Maastricht 25 years on: what happened to the European dream?
- 2016‑11‑01:
HP / Agilent / Symmetricom 5071A cesium beam tube photos.
- 2016‑11‑01:
HP 9100A, their first RPN calculator.
- 2016‑11‑01:
What's inside an atomic clock Cs beam tube?
- 2016‑11‑01:
Eliminating excessive state in network, application, and services architectures as a DDoS defense strategy.
- 2016‑11‑01:
I don't understand Python's asyncio.
- 2016‑10‑31:
Glossary of government IT self-harm bullshit.
- 2016‑10‑31:
Comedy script writer jargon.
- 2016‑10‑31:
European parliament debates DST.
- 2016‑10‑31:
Mituharu's enhanced emacs-mac port.
- 2016‑10‑31:
Museu del Cinema, Girona.
- 2016‑10‑30:
The USA spent $5.7 billion on a nuclear armageddon pyramid, then abandoned it.
- 2016‑10‑30:
telnetlogger: record login attempts from the Mirai botnet.
- 2016‑10‑30:
Michael Moore's Angel in the Tweets.
- 2016‑10‑30:
Misc stuff about USB-C.
- 2016‑10‑30:
Differing Thunderbolt 3 vs PCIe bandwidth in the late-2016 MacBook Pro USB-C ports.
- 2016‑10‑30:
Why are there no USB-C Receptacle to Type-B plugs or Type-A plugs?
- 2016‑10‑30:
Bus1: capability-based object-oriented inter-process communication on Linux.
- 2016‑10‑29:
What comes after iptables? Its successor, nftables.
- 2016‑10‑29:
The fourth argument to main() on macOS.
- 2016‑10‑29:
Compatibility nightmare: USB-C and Thunderbolt 3.
- 2016‑10‑29:
Buttery smooth Emacs: double-buffered rendering on X11.
- 2016‑10‑29:
The DrK attack: de-randomize kernel ASLR using Intel TSX.
- 2016‑10‑29:
Corrode C-to-Rust update: support from Mozilla, and new features.
- 2016‑10‑29:
Home Office rules: social and economic policy after Brexit.
- 2016‑10‑28:
27th DNS root key ceremony: generating the future KSK.
- 2016‑10‑28:
Cognitive bias cheat sheet.
- 2016‑10‑28:
Hooked on DTrace.
- 2016‑10‑28:
Intro to DTrace on macOS.
- 2016‑10‑28:
DTrace (or rather BPF) for Linux 2016
- 2016‑10‑27:
A visit to the museum of technology in Figueres.
- 2016‑10‑27:
Museu de la Tècnica de l'Empordà, Figueres.
- 2016‑10‑27:
Bimodal IT considered harmful.
- 2016‑10‑27:
Gecko plus Servo: a quantum leap for the Web.
- 2016‑10‑27:
Security operations centre (SOC) buyers guide.
- 2016‑10‑27:
Passfault password strength analyser.
- 2016‑10‑26:
Parsing JSON is a minefield.
- 2016‑10‑26:
How Google almost killed ProtonMail.
- 2016‑10‑26:
OpenSSL face to face meeting report: roadmap and platform updates, including TLS 1.3.
- 2016‑10‑26:
IETF dots wg: DDoS open threat signalling.
- 2016‑10‑26:
Attackers are now abusing exposed LDAP servers to amplify DDoS attacks.
- 2016‑10‑26:
The fantasy of autonomous cars is already encouraging neglect of more efficient transit systems .
- 2016‑10‑26:
Verisign public DNS recursive resolver service.
- 2016‑10‑26:
PPRuNe discusses Concorde.
- 2016‑10‑25:
task_t considered harmful: problems in the core of XNU / macOS / iOS.
- 2016‑10‑25:
How not to do it: liquid nitrogen tanks.
- 2016‑10‑25:
Brexit Britain is a narcissist nation.
- 2016‑10‑25:
Marginal "Marginal evidence for cosmic acceleration from Type Ia supernovae".
- 2016‑10‑25:
How Democrats killed their populist soul: post-Watergate liberals stopped fighting monopoly power.
- 2016‑10‑24:
Nobel prize overturned? No dark energy, no accelerating expansion of the universe?
- 2016‑10‑24:
"They didn't tell us we could do that": Brexit, Mayism, and the economics of nationalism.
- 2016‑10‑24:
Threat analysis of on-premises and cloud encryption.
- 2016‑10‑24:
Charles Dickens' pet raven Grip inspired Edgar Allen Poe.
- 2016‑10‑23:
cinf: Linux container info, and low-level namespace and cgroup prodding.
- 2016‑10‑23:
A burning philosophical question: dumpster fires vs tire fires.
- 2016‑10‑23:
Scaling Puppet and Puppet culture at GitHub.
- 2016‑10‑23:
A guide to optimising software in C++.
- 2016‑10‑23:
Rust roadmap for 2017.
- 2016‑10‑23:
Internet Census 2012: Port scanning /0 using insecure embedded devices.
- 2016‑10‑23:
The racist and sexist history of keeping birth control side effects secret.
- 2016‑10‑23:
Kircher and Schott's computer music of the Baroque.
- 2016‑10‑23:
Nomulus: Google's open source top-level domain name registry.
- 2016‑10‑22:
Sunday Strip Watchmen: your favourite syndicated cartoons get the dark treatment.
- 2016‑10‑22:
Dyn statement on 2016-10-21 DNS DDoS attack.
- 2016‑10‑22:
Full(er) House: Exposing high-end poker cheating devices.
- 2016‑10‑22:
Shami Chakrabarti's fall from grace: how a liberal hero lost her reputation.
- 2016‑10‑21:
Goodbye World! The perils of error checking stdio.
- 2016‑10‑21:
World's longest pub crawl: a travelling salesman problem solved between 25,000 UK boozers.
- 2016‑10‑21:
Comodo issued X.509 certs to the wrong people because they used OCR to read whois data from .be and .eu.
- 2016‑10‑21:
SANET 100Gbit NREN backbone based on TRILL.
- 2016‑10‑21:
Why we lost the Brexit vote: Behind the scenes of the flawed campaign to keep the UK in the EU.
- 2016‑10‑21:
Fixing Python performance with Rust.
- 2016‑10‑20:
The dangerous dream: How a progressive alliance could split Labour's left.
- 2016‑10‑20:
Architects Registration Board will not prosecute "Software Architects".
- 2016‑10‑20:
"Software architect" is an illegal job title in the UK.
- 2016‑10‑20:
How the Web became unreadable: against low-contrast typography.
- 2016‑10‑20:
8cc.vim: a C compiler written in vim script, based on ELVM.
- 2016‑10‑20:
$ export TERM=aaa-60; : jwz resurrects an old terminal.
- 2016‑10‑20:
Brexit: the death of British business.
- 2016‑10‑19:
Greenland is melting. The floodgates may already be open.
- 2016‑10‑19:
Bit-rot tolerance in digital archives doesn't work.
- 2016‑10‑18:
History of actors in programming languages.
- 2016‑10‑18:
The history and manufacture of pencils.
- 2016‑10‑18:
Faster counting in PostgreSQL.
- 2016‑10‑18:
Debugging with Bacon.
- 2016‑10‑17:
A dramatic tour through Python's data visualization landscape.
- 2016‑10‑17:
12480: an alphanumeric writing system.
- 2016‑10‑17:
The Birkana runic hexadecimal number symbols.
- 2016‑10‑17:
How Twitch uses PostgreSQL.
- 2016‑10‑17:
The Importance of Place: explaining the characteristics underpinning the Brexit vote across different parts of the UK.
- 2016‑10‑17:
JMESpath: a query language for JSON.
- 2016‑10‑17:
CIRA labs DSAP: DS automated provisioning, for third-party DNS operator DNSSEC maintenance.
- 2016‑10‑17:
Irish leaders fear Brexit will bring economic disaster.
- 2016‑10‑16:
Brexit: a story in maps.
- 2016‑10‑16:
Yeti DNS root server testbed: the first experiments.
- 2016‑10‑16:
Rolling the root zone DNSSEC KSK.
- 2016‑10‑16:
ENT was here !!! A problem with DNSSEC validation and empty non-terminal names.
- 2016‑10‑16:
Anycast vs. DDoS: evaluating 2016-11-30 attack on root DNS servers.
- 2016‑10‑16:
The ops identity crisis.
- 2016‑10‑16:
Amazon EC2 instance comparison table.
- 2016‑10‑16:
Understanding cacheing in Postgres.
- 2016‑10‑16:
Introduction to PostgreSQL physical storage.
- 2016‑10‑16:
NOMMU Linux, without virtual memory.
- 2016‑10‑16:
Unix command line utility style guide.
- 2016‑10‑16:
MySQL 8.0: the end of MyISAM.
- 2016‑10‑15:
Gradual typing for functional programming languages.
- 2016‑10‑15:
Static types in Python, oh my(py)!
- 2016‑10‑15:
What $50 buys you at Huaqiangbei, a huge electronics market in Shenzhen.
- 2016‑10‑15:
This robot can do more push-ups because it sweats.
- 2016‑10‑14:
How to speed up the Rust compiler.
- 2016‑10‑14:
A single byte write opened a root execution exploit, via c-ares on Android.
- 2016‑10‑14:
A look back at a view of categories of SDN from 2013.
- 2016‑10‑14:
Bellringers banned from York Minster, one of the greatest rings of bells in the country.
- 2016‑10‑14:
The AstroPy problem: lack of funding and recognition for work on scientific software.
- 2016‑10‑14:
Hedy Lamarr: inventor of frequency-hopping spread spectrum.
- 2016‑10‑14:
Benchmarking popcount: hand coded assembly beats compiler intrinsics.
- 2016‑10‑14:
101 ways to screw up when making a fake online identity.
- 2016‑10‑14:
A dozen USB chargers in the lab.
- 2016‑10‑13:
Your social media fingerprint: which web sites are you logged into?
- 2016‑10‑12:
New algorithm solves the bounded fair cake-cutting problem.
- 2016‑10‑12:
PostgreSQL major version upgrade options.
- 2016‑10‑12:
OpenSSL key recovery attack on unsafe RFC 5114 DH parameters.
- 2016‑10‑11:
Multics Emacs: the history, design, and implementation.
- 2016‑10‑11:
Algorithms for making more interesting mazes.
- 2016‑10‑11:
Hopper disassembler v4.
- 2016‑10‑11:
Britain's raucous negotiating style will not help Brexit.
- 2016‑10‑11:
WASM is switching from an AST representation to a stack machine bytecode.
- 2016‑10‑10:
"Don't feed the trolls" really is good advice. Here's the evidence.
- 2016‑10‑10:
The massacre at Monkey Hill: Solly Zuckerman's misunderstanding of the baboons of London Zoo.
- 2016‑10‑10:
Why does the replication crisis seem worse in psychology?
- 2016‑10‑10:
Microsoft's P programming language, for asynchronous event-driven programming.
- 2016‑10‑10:
6 reasons to choose PostgreSQL 9.6.
- 2016‑10‑10:
SQL style guide.
- 2016‑10‑10:
Still think you don't need HTTPS?
- 2016‑10‑10:
Kubernetes without SDN.
- 2016‑10‑10:
Real world microservices: routing RPCs with linkerd and namerd.
- 2016‑10‑10:
Outage postmortems: on finding root causes and contributing conditions.
- 2016‑10‑10:
Rules, benefits, patterns, and anti-patterns for pre-merge code reviews.
- 2016‑10‑10:
Mattermost: open source alternative to Slack.
- 2016‑10‑10:
IRCv3
- 2016‑10‑09:
Bottled Water: Real-time integration of PostgreSQL and Kafka.
- 2016‑10‑09:
Streaming updates from Postgres.
- 2016‑10‑09:
Transit app: how their pretty auto-generated transit maps work.
- 2016‑10‑09:
A JavaScript journey with only six different characters.
- 2016‑10‑08:
szl: a scripting language inspired by Tcl, shell, and CPython.
- 2016‑10‑08:
Don't listen to the 400 richest Americans: most on the list inherited their wealth.
- 2016‑10‑08:
Just Too Much Administration: breaking JEA, PowerShell's new security barrier.
- 2016‑10‑08:
Der Giftschrank: the poison cupboard of dangerous books.
- 2016‑10‑08:
In Little England, the conceit of Brexit is on full display; says the South China Morning Post.
- 2016‑10‑08:
FOSS nonprofits: judged on their merits at the IRS?
- 2016‑10‑07:
Git didn't beat SVN, GitHub did.
- 2016‑10‑07:
Science used to be polyglot, but now English rules. How did this happen, and at what cost?
- 2016‑10‑07:
ructe: compiled templates for Rust.
- 2016‑10‑07:
Are DDoS attacks a threat to the decentralized Internet?
- 2016‑10‑07:
CloudFlare and RSS.
- 2016‑10‑07:
Opposition to Galileo was scientific as well as religious.
- 2016‑10‑07:
Three years of @fewerror.
- 2016‑10‑07:
macOS Sierra permanently remembers SSH key passphrase by default.
- 2016‑10‑07:
Possible backdoor in RFC 5114 Diffie-Hellman groups?
- 2016‑10‑06:
On the causes of the huge Level 3 VOIP outage.
- 2016‑10‑06:
Parallela Epiphany-V: A 1024-core 64-bit RISC processor.
- 2016‑10‑06:
ECDSA and DNSSEC: ready for prime time?
- 2016‑10‑05:
The first computer music recording was programmed by Christopher Strachey on a machine designed by Freddie Williams and Tom Kilburn.
- 2016‑10‑05:
A mathematician looks at Wolfram's "new kind of science".
- 2016‑10‑05:
The cost of forsaking C / why to teach C to undergrads.
- 2016‑10‑05:
A tale of a DNS packet: BIND CVE-2016-2776.
- 2016‑10‑05:
Fighting fire with fire: Eliminating standing queues with large UDP packet floods.
- 2016‑10‑05:
Queueing in the Linux network stack.
- 2016‑10‑05:
A bit about TCP BBR.
- 2016‑10‑05:
BBR bottleneck bandwidth and RTT congestion control.
- 2016‑10‑05:
Mr Grayling is wrong about the Brexit dividend to station platform heights.
- 2016‑10‑04:
Letter opener? Paper knife? The mystery of the phantom page turner.
- 2016‑10‑04:
Python packaging is not bad any more.
- 2016‑10‑04:
Pull-based monitoring doesn't scale. Or does it? (Prometheus)
- 2016‑10‑04:
Deep-fried data.
- 2016‑10‑04:
A comparison of Logstash, Filebeat, Fluentd, rsyslog, syslog-ng, and Logagent.
- 2016‑10‑04:
LinkedIn Autobuild: zero-touch provisioning of physical servers.
- 2016‑10‑04:
XMLStarlet: a set of shell commands to transform, query, validate, and edit XML documents.
- 2016‑10‑04:
json_xs: convert to/from JSON and a dozen other serialization formats.
- 2016‑10‑04:
gron: make JSON greppable.
- 2016‑10‑04:
Debugging PostgreSQL performance, the hard way.
- 2016‑10‑04:
Distributed authentication at Facebook using OpenSSH certificate authorization.
- 2016‑10‑04:
Wayland to replace X in Fedora 25.
- 2016‑10‑04:
Outlook/Exchange autodiscover allows web site compromise to escalate to email compromise.
- 2016‑10‑04:
Timezone boundary builder: create shapefiles for Olson tz names using data from Open Street Map and node.js.
- 2016‑10‑04:
Why the 27 are taking a hard line on Brexit.
- 2016‑10‑04:
Brexit talks will be like the Greek bailout.
- 2016‑10‑03:
40 minute video of extremely soothing artisanal Nixie tube production.
- 2016‑10‑03:
The day TravisCI deleted their VM images.
- 2016‑10‑03:
Brexit is damaging UK science already. Here is a plan to fix it.
- 2016‑10‑03:
Attitudes to potentially offensive language and gestures on TV and radio.
- 2016‑10‑03:
rr: lightweight user-space record and replay debugging.
- 2016‑10‑03:
High Hitler: how Nazi drug abuse steered the course of history. (A review of "Blitzed".)
- 2016‑10‑03:
Manufacturer usage description (MUD): automatic firewall configuration for the Internet of Things.
- 2016‑10‑03:
Rendering ASCII Charts with D3.
- 2016‑10‑03:
ASCIItoSVG: Convert ASCII diagrams to beautiful SVG, using PHP.
- 2016‑10‑03:
asciidiagram: A freeform ASCII diagram parser for Haskell (inspired by Ditaa).
- 2016‑10‑03:
ASCIIFlow: ASCII art diagram editor.
- 2016‑10‑03:
Ascii to SVG, using Elm.
- 2016‑10‑02:
The rebuilding of the Weston Library in Oxford, winner of the Stirling Prize.
- 2016‑10‑02:
The accidental DBA.
- 2016‑10‑02:
Nitrokey USB crypto devices.
- 2016‑10‑02:
Will the Nobel Prize overlook Barry Barish, the master builder of gravitational wave detectors?
- 2016‑10‑02:
When Paris closed a riverside expressway, half the motor traffic disappeared.
- 2016‑10‑02:
What caused crime to decline in the U.S.?
- 2016‑10‑02:
Lesser known Git options and aliases.
- 2016‑10‑01:
Thoughts on cults, and compassion for victims of spiritual abuse.
- 2016‑10‑01:
Visiting the secret laboratory inside the Monument to the Great Fire of London.
- 2016‑10‑01:
An intro to interesting mathematical twittering.
- 2016‑10‑01:
DNS-over-HTTPS proxies.
- 2016‑10‑01:
Google public DNS: DNS-over-HTTPS.
- 2016‑10‑01:
Announcing Rust 1.12: new error message format; MIR mid-level intermediate representation.
- 2016‑10‑01:
You don't have to be stupid to work here, but it helps: how workplaces suppress intelligence.
- 2016‑10‑01:
Postgres full-text search is good enough!
- 2016‑09‑30:
PostgreSQL 9.6 released!
- 2016‑09‑30:
Amazon's newest ambition: competing directly with UPS and FedEx.
- 2016‑09‑30:
Using mathematics to repair an ancient artistic masterpiece.
- 2016‑09‑30:
Phone-based 2fa and account recovery is not secure.
- 2016‑09‑29:
How to lock up systemd in one tweet.
- 2016‑09‑29:
Theresa May accused of trying to remove positive data from immigration report before Brexit vote.
- 2016‑09‑29:
The protocol-relative URL.
- 2016‑09‑28:
UTF-8 in OpenBSD: why and how you ought to keep multibyte character support simple.
- 2016‑09‑28:
JVM warmup flame graphs.
- 2016‑09‑28:
The three IT infrastructure mistakes your company must not make.
- 2016‑09‑28:
Unsafe at any clock speed: Linux kernel security needs a rethink.
- 2016‑09‑28:
Restoring a vintage Xerox Alto day 8: it boots!
- 2016‑09‑28:
The fall and rise of SVG.
- 2016‑09‑28:
Brexit Britain: The poor man of Western Europe?
- 2016‑09‑27:
pgComparator: compare tables in different locations and report differences. (PostgreSQL / Perl)
- 2016‑09‑27:
Largest health and safety fines in the UK.
- 2016‑09‑27:
SC4-HSM USB cryptographic module / security token.
- 2016‑09‑27:
Designing and producing 2FA tokens to sell on Amazon.
- 2016‑09‑26:
Virtual Colossus: a simulation of the world's first electronic computer.
- 2016‑09‑26:
The John Peel mistake: "Everyone I know's got a copy." "No, you know everyone who's got a copy."
- 2016‑09‑26:
SSH implementation comparison: huge cipher support matrix.
- 2016‑09‑26:
DDoS botnets: the democratization of censorship.
- 2016‑09‑26:
Top 10 London sundials.
- 2016‑09‑26:
RTP and leap seconds.
- 2016‑09‑26:
The new Napster: Sci-Hub is blowing up the academic publishing industry.
- 2016‑09‑26:
Microsoft's rollout of FPGAs in their Azure cloud.
- 2016‑09‑26:
The many hurdles of Brexit.
- 2016‑09‑26:
Traffic source analysis of the J-root DNS server anycast instances.
- 2016‑09‑26:
TCP anycast: don't believe the FUD.
- 2016‑09‑26:
Use "Sperner's Lemma" to split unequal rent fairly.
- 2016‑09‑26:
Why the silencing of KrebsOnSecurity opens a troubling chapter for the 'Net.
- 2016‑09‑26:
Coping with the TCP TIME-WAIT state on busy Linux servers.
- 2016‑09‑26:
Investigating the phrase "fills a much-needed gap".
- 2016‑09‑25:
Animations of pinball flipper techniques.
- 2016‑09‑25:
Commercial National Security Algorithm (CNSA) suite and quantum computing FAQ.
- 2016‑09‑25:
A riddle wrapped in an enigma: the NSA's policy on elliptic curve and post-quantum cryptography.
- 2016‑09‑24:
PdB: ANSI C to Postscript compiler.
- 2016‑09‑24:
List of humorous units of measurement.
- 2016‑09‑24:
Hy-Brasil: an imaginary island that stayed on maps for five centuries.
- 2016‑09‑24:
Corbyn has won, again. This could be the end of the Labour Party.
- 2016‑09‑24:
srez: image super-resolution through deep learning.
- 2016‑09‑24:
optimise-js: tweak IIFE coding style to reduce parsing overhead.
- 2016‑09‑24:
The performance impact of ECDSA signatures on DNSSEC validation.
- 2016‑09‑24:
An ode to the night train.
- 2016‑09‑23:
The NSA's hubris and the Shadow Brokers 0-day.
- 2016‑09‑23:
Streetmix: design, remix, and share your street.
- 2016‑09‑23:
Why coffee is sometimes called mocha.
- 2016‑09‑23:
Cisco vulnerabilities and Shadow Brokers EPICBANANA and EXTRABACON exploits.
- 2016‑09‑23:
ripgrep: the usability of ag and the speed of GNU grep. (Written in Rust.)
- 2016‑09‑23:
Globalization should be put to work for democracy.
- 2016‑09‑23:
Bloomberg will smear the next leap second.
- 2016‑09‑23:
QuickSpec: guessing formal specifications using testing.
- 2016‑09‑23:
QuickSpec: equational laws for free!
- 2016‑09‑23:
Humanity left Africa in one big surge.
- 2016‑09‑23:
The oil and gas we have already tapped will take us past 1.5°C.
- 2016‑09‑23:
Why Hanjin, the world's 7th-largest ocean freight carrier, was allowed to go bankrupt.
- 2016‑09‑23:
4 maps that will change how you see migration in Europe.
- 2016‑09‑23:
syncookied: offload syn flood protection.
- 2016‑09‑23:
Introducing the GitHub load balancer.
- 2016‑09‑23:
Norton's law: Over time, all data approaches deleted, or public.
- 2016‑09‑23:
The winds have changed: bad statistics and invalid results in psychological and sociological research.
- 2016‑09‑22:
Julia v0.5.0 release notes.
- 2016‑09‑22:
Firefox 49 fixes sites designed with WebKit in mind, and more.
- 2016‑09‑22:
MotionMark: WebKit's new graphics benchmark for web browsers.
- 2016‑09‑22:
Which tent cost more? #GBBO or Henry VIII's field of cloth of gold?
- 2016‑09‑22:
How to make the perfect fish fingers.
- 2016‑09‑22:
The discredited PACE trial: bad science misled millions with ME / chronic fatigue syndrome.
- 2016‑09‑22:
Animation of HEVC wavefront parallel encoding.
- 2016‑09‑21:
Optical fibre connectors: cleanliness is a virtue.
- 2016‑09‑21:
What it costs to run Let's Encrypt.
- 2016‑09‑20:
Hackers were able to remotely activate a Tesla's brakes via a web browser privilege escalation vulnerability.
- 2016‑09‑20:
The problem with cul-de-sac suburbia: more traffic fatalities than a dense grid.
- 2016‑09‑20:
Roughtime: network time service that assumes both network and time servers are untrustworthy.
- 2016‑09‑20:
Edgy humour isn't funny any more? Don't blame political correctness, bame Poe's law.
- 2016‑09‑19:
Rewriting a Python program in Golang and Rust.
- 2016‑09‑19:
Improving license and patent issues for LLVM: Apache v2 and GPL v2 compatibility.
- 2016‑09‑19:
DNS stats graphing tools: DSC and alternatives.
- 2016‑09‑19:
Pg-Strom large table scan acceleration with SSD-to-GPU direct DMA.
- 2016‑09‑18:
Twice the bits, twice the trouble: vulnerabilities induced by migrating to 64-bit platforms.
- 2016‑09‑18:
OSTN15: the new geoid for Britain (and why Calf Top is now a mountain).
- 2016‑09‑18:
TCP BBR: bottleneck bandwidth and congestion control.
- 2016‑09‑18:
Solitude, space junk and sea monsters: the eerieness of Point Nemo.
- 2016‑09‑18:
In America, mass incarceration has caused more crime than it has prevented.
- 2016‑09‑17:
EU countries in scramble to "steal" UK-based research centres, because brexit.
- 2016‑09‑17:
Google's BBR TCP congestion control algorithm: bottleneck bandwidth and RTT.
- 2016‑09‑17:
The iPhone 7's new CPU should worry Intel.
- 2016‑09‑17:
The impossible Bridge book: enumerating every possible deal.
- 2016‑09‑17:
Big Deal: a program for dealing Bridge hands.
- 2016‑09‑17:
American Contract Bridge League to switch to more secure European Big Deal hand generation software.
- 2016‑09‑16:
More LastPass security vulnerabilities.
- 2016‑09‑16:
An introduction to Cherry MX mechanical keyboard switches.
- 2016‑09‑16:
How much screen time do women get in Hollywood movies?
- 2016‑09‑16:
Blocked! Database of web sites censored in the UK.
- 2016‑09‑16:
There is no REST API.
- 2016‑09‑16:
Sorry David Attenborough, we didn't evolve from "aquatic apes": here's why.
- 2016‑09‑16:
If you leave your kids alone, it's not predatory strangers who are a risk.
- 2016‑09‑16:
A floating point exception, a compiler bug, and a crash in Chrome.
- 2016‑09‑16:
CC BY and data: not always a good fit.
- 2016‑09‑15:
Mozilla Firefox debugger.html: more progress replacing XUL.
- 2016‑09‑15:
qira, QEMU interactive runtime analyser: a timeless debugger.
- 2016‑09‑15:
Mozilla WebReplay rewindable debugger project.
- 2016‑09‑15:
PCH peering survey 2016.
- 2016‑09‑15:
The DDoS awareness / hype cycle amongst senior managers.
- 2016‑09‑15:
ISC tech note on DNS anycast ECMP clusters with BIND, Zebra, and FreeBSD.
- 2016‑09‑14:
Sophie Dahl writes about her grandfather Roald Dahl for his centenary.
- 2016‑09‑14:
Inside the spire of the Transamerica Pyramid.
- 2016‑09‑14:
dhcplb: Facebook's open source DHCP load balancer.
- 2016‑09‑14:
Yandex Mail migrated from Oracle to Postgres.
- 2016‑09‑13:
Pascal said that to persuade someone they are wrong, first find out how they are right.
- 2016‑09‑13:
Why do tourists visit ancient ruins everywhere except the United States?
- 2016‑09‑13:
China will resurrect the Antonov AN-225, the world's largest plane.
- 2016‑09‑13:
A tale of an impossible bug: big.LITTLE and cache flushing.
- 2016‑09‑13:
Someone is learning how to take down the Internet.
- 2016‑09‑13:
Notional results for the 2015 UK parliamentary election with the provisional constituency boundaries.
- 2016‑09‑13:
The Doves Press typeface: the world's most beautiful lettering was nearly lost forever.
- 2016‑09‑13:
A digital reconstruction of the Doves Press typeface.
- 2016‑09‑13:
European GDP at regional level.
- 2016‑09‑13:
The sugar industry bought off scientists and skewed dietary guidelines for decades.
- 2016‑09‑13:
How songbirds island-hopped their way from Australia to colonise the world.
- 2016‑09‑13:
Inside the violent, geeky world of hardcore international medieval combat.
- 2016‑09‑13:
The technological trends that will shape the next 30 years: an interview with Kevin Kelly.
- 2016‑09‑13:
How to cheat at Bridge by breaking the tournament card-dealing random number generator.
- 2016‑09‑13:
Constituency Boundaries: explore the impact of proposed changes to Parliamentary constituency boundaries.
- 2016‑09‑12:
Jeremy Corbyn's disastrous year.
- 2016‑09‑12:
Input threads in the X server.
- 2016‑09‑12:
xkcd: Earth temperature timeline.
- 2016‑09‑12:
Vanilla JS :-)
- 2016‑09‑12:
Visible light vs transparency of water to electromagnetic radiation.
- 2016‑09‑12:
DAV's Endian FAQ.
- 2016‑09‑12:
Wreck of HMS Terror found nearly 170 years after disastrous Northwest Passage attempt.
- 2016‑09‑12:
whatplug.global: find out about plugs, sockets and power adapters around the world.
- 2016‑09‑12:
Brexit calendar for the rest of 2016 (and beyond).
- 2016‑09‑12:
Jewel in the crown: Rolls-Royce's single-crystal turbine blade casting foundry.
- 2016‑09‑12:
Rust vs graph structures and inheritance.
- 2016‑09‑12:
The origin of C's cast syntax.
- 2016‑09‑12:
The brightest part of a shadow is in the middle (if you have a circular object and a laser). (YouTube)
- 2016‑09‑12:
Netnod NTP from a distributed timescale traceable to UTC.
- 2016‑09‑12:
Swedish distributed time service, including a link to the FPGA NTP server source code.
- 2016‑09‑12:
Netnod NTP time service: how and why?
- 2016‑09‑12:
Brexit from the perspective of Brussels.
- 2016‑09‑12:
Climate change will lead to more incidents of severe clear-air turbulence on passenger flights.
- 2016‑09‑12:
The vDOS booter service got hacked, revealing their customer database.
- 2016‑09‑12:
Cambridge peak-time congestion control points - FAQ.
- 2016‑09‑12:
Cambridge peak-time congestion control points - quick guide.
- 2016‑09‑12:
The loud sound of a fire suppression gas release destroyed dozens of hard drives at ING Bank's main data centre.
- 2016‑09‑12:
The two cultures of mathematics.
- 2016‑09‑11:
What is it like to understand advanced mathematics?
- 2016‑09‑11:
Lucille Ball and Star Trek.
- 2016‑09‑11:
Tricki: a repository of mathematical know-how.
- 2016‑09‑11:
When will New York City sink into the sea?
- 2016‑09‑11:
The false promise of a free-trade paradise: Brexit Britain will lose access to 50 trade agreements.
- 2016‑09‑11:
Failure of national welfare systems can be partly blamed for discontent with the EU.
- 2016‑09‑11:
Teaching computational thinking with the Wolfram Language.
- 2016‑09‑11:
Halide: a programming language for high performance image processing pipelines, embedded in C++.
- 2016‑09‑11:
VW engineer's guilty plea could signal more indictments on diesel emissions scandal.
- 2016‑09‑11:
Python 3.6 dict becomes compact and gets a private version; and keywords become ordered.
- 2016‑09‑11:
Argument maps.
- 2016‑09‑11:
How to write articles and essays quickly and expertly.
- 2016‑09‑10:
Data snooping blunders by UK spies and police led to wrongful arrests.
- 2016‑09‑10:
A zfs-style filesystem on Noms.
- 2016‑09‑10:
Photos from inside NORAD's Cheyenne Mountain combat center.
- 2016‑09‑10:
Pypy RevDB: reverse debugger for Python.
- 2016‑09‑10:
The efficacy of donations and spending on Lib Dem seats at the 2015 UK general election.
- 2016‑09‑10:
Brits will need a visa to visit the EU after Brexit.
- 2016‑09‑09:
Discovering how Dropbox hacks your Mac to get accessibility privileges.
- 2016‑09‑09:
Brexit: England's last gasp of empire.
- 2016‑09‑09:
Evidence rebuts Chomsky's theory of language learning and universal grammar.
- 2016‑09‑09:
Incremental compilation in Rust.
- 2016‑09‑09:
The fierce, forgotten library wars of the ancient world.
- 2016‑09‑09:
Why is printing "B" dramatically slower than printing "#"?
- 2016‑09‑08:
Our assumption that spacetime is a continuum leads to many challenges in mathematical physics.
- 2016‑09‑08:
Databases and CGI were the killer app for the WWW.
- 2016‑09‑08:
DSA-3628: vulnerabilities due to perl loading modules from the current directory.
- 2016‑09‑08:
Upcoming change to perl: current directory no longer in @INC.
- 2016‑09‑08:
How to raise a genius: lessons from a 45-year study of supersmart children.
- 2016‑09‑08:
Google obliterated a 4 year old Chrome extension with 24k+ users.
- 2016‑09‑08:
The people's priority? Free trade or immigration control? Ashcroft's Brexit poll.
- 2016‑09‑08:
EasyJet moves maintenance base to Malta thanks to Brexit.
- 2016‑09‑08:
Turing codec: BBC's open source HEVC H.265 video compression.
- 2016‑09‑07:
Frowns are different in the UK and USA.
- 2016‑09‑07:
The next steps for gmane.
- 2016‑09‑07:
Dolphin emulator now boots the final GameCube game. (MMU emulation!)
- 2016‑09‑07:
Thoughts on conducting a beginner level Rust workshop.
- 2016‑09‑07:
A lucky iron fish helps fix anaemia in Cambodia.
- 2016‑09‑06:
Compromised cryptographic key reuse remains widespread in embedded products.
- 2016‑09‑06:
Unwieldy LEGO sculptures reveal a multitude of hidden shadow designs.
- 2016‑09‑06:
Prime Minister says Secretary of State for Brexit's comments on the Single Market are not government policy.
- 2016‑09‑06:
Autonomous driving: Mercedes-Benz E-Class vs Tesla Model S.
- 2016‑09‑06:
ANTP: authenticated network time synchronization.
- 2016‑09‑06:
One bit flips, one cloud flops: cross-VM rowhammer attacks and privilege escalation.
- 2016‑09‑06:
German federal intelligence service BND violates laws and constitution.
- 2016‑09‑06:
The XTS cipher mode: how it works and why you don't want to use it.
- 2016‑09‑06:
One, two, three, four: Sesame Street, Frege, and the foundations of arithmetic.
- 2016‑09‑06:
The secret to a breakthrough in fighting norovirus? Human bile.
- 2016‑09‑05:
Moving from Docker to rkt.
- 2016‑09‑05:
Inside OpenBSD's full disk encryption.
- 2016‑09‑05:
Stabilized time lapse video shows Earth rotating under fixed stars. (YouTube)
- 2016‑09‑05:
skypeopensource2: reverse engineered Skype client.
- 2016‑09‑05:
What I learned about languages just by looking at a Turkish typewriter.
- 2016‑09‑05:
Obama quashes prospect of fast-track Brexit UK-USA trade deal.
- 2016‑09‑05:
Japan's unprecedented warning to UK over Brexit.
- 2016‑09‑05:
A fighter pilot's guide to avoiding road traffic collisions.
- 2016‑09‑04:
Computing with programmable logic (FPGA).
- 2016‑09‑04:
What can a university teacher do to make compsci more inclusive?
- 2016‑09‑04:
Big bad adjective order in English.
- 2016‑09‑04:
The Shit Pyramids of King Sneferu: the learning process before the Great Pyramid of King Khufu.
- 2016‑09‑04:
ThreatSTOP RPZ DNS firewall.
- 2016‑09‑04:
The hacker, the scrapheap, and the first Apollo computer.
- 2016‑09‑04:
The NSA hacked the Élysée in 2012.
- 2016‑09‑04:
Flooding of American coast, caused by global warming, becomes hard to ignore.
- 2016‑09‑04:
Let's build an igloo at the South Pole!
- 2016‑09‑03:
Nick Clegg: 'I did not cater for the Tories' brazen ruthlessness'
- 2016‑09‑03:
12 MORE ways to make it look like Brexit has happened!
- 2016‑09‑03:
History of Gaussian elimination.
- 2016‑09‑03:
Why do criminals launder money through restaurants?
- 2016‑09‑03:
100 million year old avian dinosaur wing found preserved in amber.
- 2016‑09‑03:
pingfs: storage in ICMP in the cloud.
- 2016‑09‑03:
A catalogue of extraordinary stranger-than-fiction people.
- 2016‑09‑03:
Bizarre ant colony discovered in an abandoned Polish nuclear weapons bunker.
- 2016‑09‑03:
Windyty: wind map and forecast.
- 2016‑09‑03:
Contemplating the possible retirement of Apache OpenOffice.
- 2016‑09‑03:
Brexit: there will be tears before bedtime.
- 2016‑09‑03:
Solutions to integer overflow.
- 2016‑09‑02:
Hidden assets, hidden costs: a review of the Panama Papers.
- 2016‑09‑02:
WoSign's legal threats over their secret purchase of StartCom.
- 2016‑09‑02:
A short history of Internet protocols at CERN. (1995)
- 2016‑09‑02:
How to attack servers bound to localhost on someone else's workstation.
- 2016‑09‑02:
Arrival (based on Ted Chiang's Story Of Your Life) is science fiction at its most beautiful and provocative.
- 2016‑09‑02:
3D printed Curta mechanical calculator.
- 2016‑09‑01:
40 years on, the Internet transmits every aspect of our lives.
- 2016‑09‑01:
External issues in DNS scalability. (1995)
- 2016‑09‑01:
y-cruncher: a multi-threaded pi program (the world record holder).
- 2016‑09‑01:
Rclone: a command line program to sync files and directories to and from various cloud storage services.
- 2016‑09‑01:
lzturbo: fast compressor.
- 2016‑09‑01:
Zstandard: smaller and faster data compression from Facebook.
- 2016‑09‑01:
Four reasons why Brexit negotiations are harder than you (or the Cabinet) might think.
- 2016‑09‑01:
Rowhammer plus VM page deduplication leads to cross-VM crypto key compromise.
- 2016‑08‑31:
A nice RAM latency chart.
- 2016‑08‑31:
RAM access with TLBs is O(N log N).
- 2016‑08‑31:
RAM access is O(√N) not O(1).
- 2016‑08‑31:
How jvns made a zine about netstat, netcat, ngrep, tcpdump, wireshark, strace, eBPF, dstat, and perf!
- 2016‑08‑31:
British officials don't have the expertise, the staff or a plan for the tortuous Brexit negotiations.
- 2016‑08‑31:
The top 19 brexit promises.
- 2016‑08‑31:
Theresa May calls for "unique" brexit deal: in the single market, without freedom of movement.
- 2016‑08‑31:
The restructuring of Internet standards governance 1987-1992.
- 2016‑08‑31:
Notes on the history of fork and join.
- 2016‑08‑31:
Little: a statically typed, C-like scripting language compiled to Tcl bytecode.
- 2016‑08‑31:
GNU JTW: Delphi-flavoured bournegol for Java.
- 2016‑08‑31:
MIT problem set on regexes.
- 2016‑08‑31:
scsh sre: scheme shell regular-expression notation.
- 2016‑08‑31:
Emacs rx: readable regexes.
- 2016‑08‑31:
SRL: simple (verbose) regex language.
- 2016‑08‑30:
A Docker fork? Talk of a split is now on the table.
- 2016‑08‑30:
PLOT3: programming language for old timers.
- 2016‑08‑30:
bitdata: high-level views on low-level binary data representations.
- 2016‑08‑30:
Zig: a C-like programming language which prioritizes optimality, safety, and readability.
- 2016‑08‑30:
Game animation from rotoscoped filmed parkour.
- 2016‑08‑29:
undebt: automatic refactoring for Python.
- 2016‑08‑29:
Cambridge: a history of its railways and station.
- 2016‑08‑29:
mpc: a micro parser combinator library for C.
- 2016‑08‑29:
The price of solar power installations is declining to unprecedented lows.
- 2016‑08‑28:
Sad puppies vs sf: radical futures and conservative sensitivities.
- 2016‑08‑28:
How Chuck Tingle beat sf's sad puppies at their own game, and cured a case of writer's block.
- 2016‑08‑28:
Rustdoc meets Emacs.
- 2016‑08‑28:
Theresa May orders her cabinet ministers to come up with a plan for brexit.
- 2016‑08‑27:
Investment managers with poor parents produce higher returns than those with rich parents.
- 2016‑08‑27:
Human-induced climate change started in the 1830s.
- 2016‑08‑27:
The wrong emotion.
- 2016‑08‑27:
Taking over 20K domain names with lame servers pointing at DigitalOcean.
- 2016‑08‑27:
Farming was invented twice in the Middle East, shows a genetic study.
- 2016‑08‑27:
Rasputin and the "this is a work of fiction" disclaimer.
- 2016‑08‑27:
Attack of the week: Sweet32 exploits birthday collisions in 64-bit ciphers in TLS.
- 2016‑08‑26:
How many x86 instructions are there?
- 2016‑08‑26:
What's new in C# 7.
- 2016‑08‑26:
Technical analysis of Pegasus iPhone spyware.
- 2016‑08‑26:
Million dollar dissident: NSO Group's iPhone 0days used against a UAE human rights defender.
- 2016‑08‑26:
Decline and fall of the British lobbying empire.
- 2016‑08‑26:
Database of 4200 predictions about the future of the Internet from the early 1990s.
- 2016‑08‑25:
Traffic Light Protocol for controlled disclosure of sensitive security information.
- 2016‑08‑24:
Rover: proof of concept exploit of CVE-2016-5696.
- 2016‑08‑24:
31 essential sf terms and where they came from.
- 2016‑08‑24:
The Python JITs are coming.
- 2016‑08‑24:
Dynamic branch prediction with perceptrons.
- 2016‑08‑24:
The Ethernet PAUSE frame.
- 2016‑08‑23:
Host of troubles: HTTP cache poisoning through Host: header misparsing confusion.
- 2016‑08‑23:
Bubble-wrapped sponge makes steam using ambient sunlight.
- 2016‑08‑23:
Samsung M1 ARMv8 core has a neural network branch predictor.
- 2016‑08‑23:
libpnet: low level networking (and binary packet parsing) in Rust,
- 2016‑08‑23:
Roaring bitmaps in C.
- 2016‑08‑23:
Array layouts for comparison-based searching.
- 2016‑08‑23:
Nail: A practical interface generator for data formats, such as DNS.
- 2016‑08‑22:
The general method for solving all problems is: 1. Find the most difficult outstanding problem; 2. Solve it.
- 2016‑08‑22:
Crash not accident: more neutral, constructive terminology when referring to collisions on the roads.
- 2016‑08‑22:
City of London police is replacing fraud prosecutions with privatised-for-profit civil lawsuits.
- 2016‑08‑22:
Playing with syntax: variations of setf in Common Lisp.
- 2016‑08‑22:
Help to Buy ISA scandal: they cannot be used for initial deposit on homes as originally promised.
- 2016‑08‑22:
A year of Rust and DNS.
- 2016‑08‑22:
NIST's new password rules.
- 2016‑08‑21:
Brexit ministers have not even got to base one in knowledge of EU treaties.
- 2016‑08‑21:
The myth of the placebo effect.
- 2016‑08‑21:
A suggestion on how to spend a day at home.
- 2016‑08‑21:
The LMS Turbomotive 6202: steam turbine locomotive.
- 2016‑08‑21:
Self-Hosted Kubernetes makes Kubernetes installs, scaleouts, upgrades easier.
- 2016‑08‑21:
Nasa just made all its research available online for free.
- 2016‑08‑21:
What is the colour of an atom?
- 2016‑08‑21:
The hidden danger of big data.
- 2016‑08‑21:
The difficulties of getting that Brexit deal.
- 2016‑08‑21:
Brexiteers are short of a plan and the people to implement it.
- 2016‑08‑21:
The war on cash.
- 2016‑08‑20:
Power pricing: a handy rule of thumb for the annual cost of electricity.
- 2016‑08‑20:
Research funding in a post-brexit world.
- 2016‑08‑20:
"Hot" sex and young girls.
- 2016‑08‑20:
Pro-EU folks in the UK: keep making your case, don't apologise.
- 2016‑08‑19:
Interview with Jeffery Snover, inventor of PowerShell.
- 2016‑08‑19:
ScanTailor: an interactive post-processing tool for scanned pages.
- 2016‑08‑19:
Manually dewarping photos of pages of books with Photoshop.
- 2016‑08‑19:
Automatically dewarping photographs of pages of books.
- 2016‑08‑18:
PowerShell is now open source and running on Linux.
- 2016‑08‑18:
Empire of the air: the British imperial airship service.
- 2016‑08‑18:
It's the future of web app deployment!
- 2016‑08‑18:
The bedroom tax failed to free up larger homes.
- 2016‑08‑18:
Beer archaeologist: how alcohol shaped our civilization.
- 2016‑08‑18:
The Shadow Brokers mess is what happens when the NSA hoards zero-days.
- 2016‑08‑18:
Intel licenses ARM technology to boost foundry business.
- 2016‑08‑18:
Brexit trade deals: the gruelling challenge of taking back control.
- 2016‑08‑18:
World's biggest banks already plotting mass exodus from London after Brexit.
- 2016‑08‑17:
Close encounters of the Java memory model kind.
- 2016‑08‑17:
A Palo Alto housing commissioner leaves town, and starts an affordable housing furor.
- 2016‑08‑17:
TriforceAFL: full-system fuzzing with AFL and qemu.
- 2016‑08‑17:
July was the hottest month since records began.
- 2016‑08‑17:
public-inbox: mailing list archives stored in git.
- 2016‑08‑17:
git-series: track changes to a patch series over time.
- 2016‑08‑17:
Colorized man pages using LESS_TERMCAP.
- 2016‑08‑17:
Why didn't Larrabee fail?
- 2016‑08‑17:
NTIA to allow IANA functions contract to expire on October 1, relieving ICANN from US DoC supervision.
- 2016‑08‑17:
Hitler and the reinvention of interpreting: simultaneous translation.
- 2016‑08‑17:
The uniform European Union passport.
- 2016‑08‑17:
Brexit is not going to happen, but it might need a second referendum.
- 2016‑08‑16:
pgpdump: PHP packet visualizer.
- 2016‑08‑16:
mb21: the UK transmission mast gallery.
- 2016‑08‑16:
Quick Brexit illusion exposed in unusual tale of Greenland.
- 2016‑08‑15:
Circumventing fuzzing roadblocks with compiler transformations that help AFL find magic numbers.
- 2016‑08‑15:
Sonic black hole creates its own version of Hawking radiation.
- 2016‑08‑15:
Implementing a Pratt parser in Rust.
- 2016‑08‑15:
Tyre: typed regular expressions for Ocaml.
- 2016‑08‑15:
Distributed logging architecture in the container era with fluentd.
- 2016‑08‑15:
Sysdig tracers: system profiling for lazy developers.
- 2016‑08‑15:
Why is the Greenwich Prime Meridian 102m west of the GPS zero meridian?
- 2016‑08‑15:
Brexit could be delayed until late 2019. Whitehall doesn't even know the right questions to ask.
- 2016‑08‑15:
wcc: the Witchcraft Compiler Collection - shared object extraction, conversion, and scripting.
- 2016‑08‑15:
Java memory model pragmatics.
- 2016‑08‑15:
A notation for algorithms written by hand on paper.
- 2016‑08‑14:
A cyclist's view of road congestion in London.
- 2016‑08‑14:
The beauty of polynomial roots.
- 2016‑08‑14:
Incompetent Liam Fox's dept. deletes press release after making big Brexit EU admission.
- 2016‑08‑14:
The brexit hangover just got worse.
- 2016‑08‑13:
Could a 'reverse Greenland' arrangement keep Scotland and Northern Ireland in the EU?
- 2016‑08‑13:
New "bionic" leaf is roughly 10x more efficient than natural photosynthesis.
- 2016‑08‑13:
PostgreSQL BDR 1.0: bi-directional replication.
- 2016‑08‑13:
Lake Kivu's dissolved methane extraction project.
- 2016‑08‑13:
Lake Nyos: the deadliest lake in the world suffocated over 1,746 people in one night.
- 2016‑08‑12:
Enough David Brent, Brexit is serious!
- 2016‑08‑12:
DiskFiltration: data exfiltration from speakerless air-gapped computers via covert hard drive noise.
- 2016‑08‑12:
The proton radius puzzle: a muon orbiting around an atom confirms physics is broken.
- 2016‑08‑12:
Elliptic curve calculator: a slide rule made from a sheet of paper and a straight edge.
- 2016‑08‑12:
DDoSCoin: a cryptocurrency with a malicious proof-of-work.
- 2016‑08‑12:
How Microsoft compromised their Secure Boot implementation.
- 2016‑08‑12:
CENTRstats: data on European national TLD registries.
- 2016‑08‑11:
Zero-cost futures in Rust.
- 2016‑08‑11:
EMF TiLDA: ElectroMagnetic Field programmable con badges.
- 2016‑08‑11:
Britain may soon leave Europol as a result of Brexit.
- 2016‑08‑11:
These are the red lines Europe won't cross in Brexit talks.
- 2016‑08‑11:
Wireless hacks can unlock millions of motor vehicles.
- 2016‑08‑11:
On the performance of AES vs ChaCha.
- 2016‑08‑11:
Brexit means Brexit, but in reality it's a long time away.
- 2016‑08‑11:
"Biased" fit for work tests penalise poorer people.
- 2016‑08‑10:
Linux performance tools, with maps of which tools do what.
- 2016‑08‑10:
NEJM continues campaign against open data.
- 2016‑08‑10:
US DEA agents profile travellers to seize cash, not to make arrests or build criminal cases.
- 2016‑08‑10:
Ride like a girl: cycling is awfully similar to being a woman.
- 2016‑08‑10:
Microsoft has accidentally left a hole in Secure Boot.
- 2016‑08‑10:
The shape of errors to come in Rust.
- 2016‑08‑10:
fast-cli: test your download speed using fast.com and node.js.
- 2016‑08‑10:
On cybersecurity and being targeted: DNS compromise leads to narrowly avoided account compromise.
- 2016‑08‑10:
Met Office weather radar upgrade can now capture the size and shape of raindrops.
- 2016‑08‑10:
Brexit: almost a third of international students less likely to come to the UK to study.
- 2016‑08‑10:
UK researchers excluded from European research network due to Brexit.
- 2016‑08‑09:
Building fast.com, the Netflix speed test web site.
- 2016‑08‑09:
Foghorn: a DNS greylisting proxy.
- 2016‑08‑09:
Stop talking about the trolley problem.
- 2016‑08‑09:
Behind the scenes with iOS security.
- 2016‑08‑09:
Carto-Metro London rail and tube map v3.5.
- 2016‑08‑09:
Notes on distributed systems for new engineers.
- 2016‑08‑09:
Radicale: a simple CalDAV and CardDAV server.
- 2016‑08‑09:
Moving 12 years of email from GMail to FastMail.
- 2016‑08‑08:
How not to autoconf: it's hard work printing nothing.
- 2016‑08‑08:
Mathematica version 11 announcement.
- 2016‑08‑08:
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms.
- 2016‑08‑08:
Why sodium and potassium really explode in water.
- 2016‑08‑08:
DNA analysis shows the horse's smooth fast ambling gait originated near York in about 850 AD.
- 2016‑08‑08:
Brexit: a divided nation.
- 2016‑08‑08:
Think the north and the poor caused Brexit? Think again.
- 2016‑08‑08:
I peeked into my node.js modules directory, and you won't believe what happened next!
- 2016‑08‑08:
Guide to building lightning protection.
- 2016‑08‑08:
Benchmarking integer and floating point operations on the JVM.
- 2016‑08‑08:
Cuckoo filter: practically better than Bloom.
- 2016‑08‑07:
American wire gauge and the 39th root of 92.
- 2016‑08‑07:
Quanergy announces $250 solid-state LIDAR for cars, robots, and more.
- 2016‑08‑07:
MIT and DARPA packed a LIDAR sensor onto a single chip.
- 2016‑08‑07:
International Phonetic Alphabet reference chart.
- 2016‑08‑07:
Fun facts about the International Phonetic Alphabet.
- 2016‑08‑07:
About the International Phonetic Alphabet.
- 2016‑08‑07:
Mapping the hidden worlds beneath Greenland's ice.
- 2016‑08‑06:
Julia Reda: the political iconoclast at the center of Europe's tech policy debate.
- 2016‑08‑06:
Superblocks: how Barcelona is taking city streets back from cars.
- 2016‑08‑06:
EditorConfig: define and maintain consistent coding styles across different editors and IDEs.
- 2016‑08‑06:
DCAS is not a silver bullet for nonblocking algorithm design.
- 2016‑08‑06:
asyncpg: 1M rows/s from Postgres to Python.
- 2016‑08‑06:
RhodeCode: repo hosting for Hg, Git, SVN.
- 2016‑08‑06:
Moving to GitLab! Yes, it's worth it!
- 2016‑08‑06:
Ratas: A hierarchical timer wheel.
- 2016‑08‑05:
Towards a unified theory of Operational Transformation and CRDT.
- 2016‑08‑04:
$hell on earth: from browser to system compromise. Pwn2Own attack chain analysis.
- 2016‑08‑04:
HEIST attack uses TCP to make the CRIME and BREACH TLS attacks easier.
- 2016‑08‑04:
What's next for multi-process Firefox?
- 2016‑08‑04:
Thoughts on Uber's list of Postgres limitations.
- 2016‑08‑03:
Dynamically diagnosing type errors in unsafe C.
- 2016‑08‑03:
Cipherli.st: strong TLS ciphers for Apache, nginx and Lighttpd.
- 2016‑08‑03:
Prepaid or PAYG data SIM wiki.
- 2016‑08‑03:
A unified theory of randomness.
- 2016‑08‑03:
font-rs: the fastest font renderer in the world, written in Rust.
- 2016‑08‑03:
C style and coding standards for SunOS.
- 2016‑08‑02:
OpenWeatherMap.
- 2016‑08‑02:
How to read a book.
- 2016‑08‑02:
Structure literals vs constructors in Rust.
- 2016‑08‑02:
Vector Space Systems aims for 100 launches per year, 50kg to LEO.
- 2016‑08‑02:
Nigerian email scam fraudster arrested.
- 2016‑08‑02:
Calling it PostgreSQL instead of plain Postgres was the single worst mistake the project ever made.
- 2016‑08‑02:
A field guide to China's most indispensable meme.
- 2016‑08‑02:
Looking back at Swift 3 and ahead to Swift 4.
- 2016‑08‑02:
Stop hacking the Amazon Dash button and learn to solder.
- 2016‑08‑02:
Surprises of the Faraday cage.
- 2016‑08‑02:
Time Flies: levitating nixie clock.
- 2016‑08‑02:
Netflix billing migration: self-hosted Oracle to MySQL on AWS.
- 2016‑08‑01:
The vanishing civility.
- 2016‑08‑01:
A geologist's guide to ancient history embedded in London's buildings.
- 2016‑08‑01:
Boeing 747 production may soon cease.
- 2016‑08‑01:
Dealing with COTS products in a DevOps world.
- 2016‑08‑01:
Writing systemd unit files.
- 2016‑08‑01:
systemd: mask services to disable them despite dependencies.
- 2016‑08‑01:
Linux hardware information commands.
- 2016‑08‑01:
Software over-engineering mistakes.
- 2016‑08‑01:
Direct detection of the 229Th nuclear clock transition.
- 2016‑08‑01:
USB polling intervals.
- 2016‑08‑01:
Lumen: magic auto brightness based on screen contents. (Mac OS)
- 2016‑07‑31:
Phantom types with Flow, a static type checker for JavaScript.
- 2016‑07‑31:
How to avoid being called a bozo when producing XML.
- 2016‑07‑31:
How the British government saved $2.2bn by going digital.
- 2016‑07‑31:
America uses stealthy submarines to hack other countries' systems.
- 2016‑07‑31:
Desalination now provides 55% of domestic water in Israel.
- 2016‑07‑31:
Why not write dependently typed Haskell?
- 2016‑07‑31:
Habits of highly mathematical people.
- 2016‑07‑30:
Bootstrap Kubernetes the hard way. No scripts.
- 2016‑07‑30:
synsanity: iptables module for multicore SYN flood mitigation.
- 2016‑07‑30:
Protocol Buffers v3.
- 2016‑07‑30:
Mechanical techno: ghost in the machine music.
- 2016‑07‑29:
The end of Gmane?
- 2016‑07‑28:
The Rust Platform: a batteries-included Cargo metapackage.
- 2016‑07‑28:
Troubleshooting tales: problems with pgbouncer in transaction pooling mode.
- 2016‑07‑28:
Emacs horrors: unexec.
- 2016‑07‑28:
PostgreSQL mailing list discussion of Uber's criticisms.
- 2016‑07‑28:
Gravity Probe B: the world's most perfect gyroscopes.
- 2016‑07‑28:
A biography of Alice and Bob.
- 2016‑07‑28:
What is the roundest country?
- 2016‑07‑27:
Structured deferral: synchronization via procrastination.
- 2016‑07‑27:
Booter blacklist: DDoS-for-hire services.
- 2016‑07‑27:
Using quiescent states to reclaim memory in concurrent data structures.
- 2016‑07‑27:
A century of trends in adult human height.
- 2016‑07‑27:
Log structured merge trees.
- 2016‑07‑27:
Let's Encrypt now has full support for IPv6.
- 2016‑07‑27:
What is the Q of Earth as an oscillator?
- 2016‑07‑27:
No, it's not your opinion. You're just wrong.
- 2016‑07‑27:
Brexit, euro clearing, and the City of London.
- 2016‑07‑26:
Why Uber switched from PostgreSQL to MySQL.
- 2016‑07‑26:
Tapping yeast genetics for better beer.
- 2016‑07‑26:
Three implementation models for Scheme.
- 2016‑07‑26:
Root DNSSEC KSK rollover plans: K-day will be 11 Oct 2017.
- 2016‑07‑25:
Flent: the FLExible Network Tester. (Good for checking bufferbloat.)
- 2016‑07‑25:
The effect of TCP tuning on BGP convergence efficiency.
- 2016‑07‑24:
PgBouncer: a lightweight connection pooler for PostgreSQL.
- 2016‑07‑24:
repmgr: Replication Manager for PostgreSQL clusters.
- 2016‑07‑24:
PostgreSQL vs the audacity of NoSQL.
- 2016‑07‑24:
High availability for PostgreSQL with HAproxy, Governor, and etcd.
- 2016‑07‑24:
The great British pensions cock-up.
- 2016‑07‑24:
How archaeologists found the lost medieval megacity of Angkor. (LIDAR)
- 2016‑07‑24:
Climate change is rapidly taking the planet apart.
- 2016‑07‑24:
Why has Scotland risen above the anti-immigrant mood that fuelled the Brexit vote?
- 2016‑07‑24:
David Chang's unified theory of deliciousness.
- 2016‑07‑23:
Who is harmed by a "real names" policy.
- 2016‑07‑23:
How we broke PHP, hacked Pornhub, and earned $20,000.
- 2016‑07‑23:
Building Photoshop.
- 2016‑07‑22:
Fuzzing with AFL is an art.
- 2016‑07‑22:
The Erlang shell: a bit more (and less) than a REPL.
- 2016‑07‑22:
se: a full-screen editor with the ed command set.
- 2016‑07‑22:
e: the RAND full-screen text editor.
- 2016‑07‑22:
LeoNTP inexpensive GPS time server.
- 2016‑07‑22:
"I'm with the banned": Laurie Pennie not writing about Milo Yiannopoulos.
- 2016‑07‑21:
Git for Windows accidentally creates NTFS alternate data streams.
- 2016‑07‑21:
Brexit Blues.
- 2016‑07‑21:
DeepMind reduces energy used for cooling Google data centers by 40% (15% less PUE).
- 2016‑07‑20:
A brexit memo to David Cameron from the former Canadian High Commissioner to the UK.
- 2016‑07‑20:
Fuzzing through multi-objective shrinking: combining a test case reducer with AFL.
- 2016‑07‑20:
Graal and Truffle: radically accelerating innovation in programming language design.
- 2016‑07‑20:
The British political crisis is a consequence of FPTP and lack of proportional representation.
- 2016‑07‑20:
PRoot: user-space `chroot` and `mount --bind` implemented with ptrace() instead of LD_PRELOAD.
- 2016‑07‑20:
pseudo: a suped-up replacement for fakeroot+fakechroot.
- 2016‑07‑20:
UK Internet report: reachability of ISP core routers.
- 2016‑07‑19:
On the unusual effectiveness of logic in computer science.
- 2016‑07‑19:
Significant accidents and close calls in human space flight. (interactive graphic)
- 2016‑07‑19:
Vulkan tutorial: successor to OpenGL.
- 2016‑07‑19:
Inter-procedural optimization and C++ inline functions.
- 2016‑07‑18:
Stackless coroutines in LLVM (WIP).
- 2016‑07‑18:
HTTPoxy: exploiting the fact that CGI scripts and HTTP clients both use the HTTP_PROXY environment variable.
- 2016‑07‑18:
How the UK halved its teenage pregnancy rate.
- 2016‑07‑18:
Android N will make raw GPS measurements available to apps.
- 2016‑07‑18:
An Internet packet radio experiment in a Silcon Valley beer garden in 1976.
- 2016‑07‑18:
Choose boring technology.
- 2016‑07‑18:
A wait-free queue as fast as fetch-and-add.
- 2016‑07‑18:
Passport index.
- 2016‑07‑18:
Does 1+2+3... really equal -1/12?
- 2016‑07‑17:
J-core open SuperH compatible processor.
- 2016‑07‑16:
hydrogen: Run code inline in Atom using Jupyter kernels.
- 2016‑07‑15:
How technology disrupted the truth.
- 2016‑07‑15:
Up to 70% of people in developed countries got no richer between 2005-2014.
- 2016‑07‑15:
Creating 3D models with HTML and CSS (and without JavaScript).
- 2016‑07‑14:
Everything you need to know about international brexit negotiations.
- 2016‑07‑14:
Sinking giggling into the sea: the ineffectiveness of anti-establishment satire.
- 2016‑07‑14:
Calculating the power of the Trinity atom bomb by isotopic analysis of trinitite, 70 years later.
- 2016‑07‑13:
CTEs are optimization fences in PostgreSQL.
- 2016‑07‑13:
ejson: encrypt secrets using nacl for storage in git.
- 2016‑07‑12:
Windows point-and-print driver malware insertion.
- 2016‑07‑12:
TypeScript 2.0 beta.
- 2016‑07‑12:
THOR: synchronized trades to beat HFT.
- 2016‑07‑12:
A hedge fund has a patent on using atomic clocks to beat high-frequency traders.
- 2016‑07‑12:
The mysterious syndrome impairing astronauts' sight.
- 2016‑07‑11:
Systemd logind RemoveIPC=yes can break PostgreSQL.
- 2016‑07‑11:
Cross-reference Theresa May's speech and voting record. Did she mean anything she said?
- 2016‑07‑11:
Fundamental limits on invisibility cloaks.
- 2016‑07‑11:
A history of infographics and data visualization.
- 2016‑07‑11:
Algorithmic emoji suggestions in Dango.
- 2016‑07‑11:
History of the URL: path, fragment, query, auth.
- 2016‑07‑11:
History of the URL: domain, protocol, and port.
- 2016‑07‑11:
Why CERN can't scale up the LHC to probe quantum gravity.
- 2016‑07‑11:
Rust vs C vs asm in the *ring* crypto library.
- 2016‑07‑11:
microG: a free software replacement for Android Google Play Services.
- 2016‑07‑10:
Writing REST API clients in Rust.
- 2016‑07‑09:
Areas with low immigration voted mainly for brexit.
- 2016‑07‑09:
corrode: C to Rust translator.
- 2016‑07‑09:
Bee Bread: pollen stored in the hive.
- 2016‑07‑08:
A second brexit referendum is probably legally required.
- 2016‑07‑08:
Yesterday's NeWS.
- 2016‑07‑08:
Green sky: global warming, hydrogen sulphide, and mass extinction.
- 2016‑07‑07:
cq (code query): extract parts of JavaScript programs using CSS-style selectors.
- 2016‑07‑07:
Acorn and Amstrad.
- 2016‑07‑07:
Brexit: a coup by one set of public schoolboys against another.
- 2016‑07‑07:
For the first time in my life, I feel ashamed to be British.
- 2016‑07‑07:
Why don't people trust experts?
- 2016‑07‑07:
Source code for Lucasfilm's Habitat.
- 2016‑07‑07:
The lessons of Lucasfilm's Habitat.
- 2016‑07‑07:
Descriptions of the Speaking Clock from 1937 and 1954.
- 2016‑07‑07:
Why does pepperoni curl?
- 2016‑07‑07:
Unpleasant design and hostile urban architecture.
- 2016‑07‑06:
Say no to Venn diagrams when explaining SQL joins.
- 2016‑07‑06:
Make a Sugihara circle/square optical illusion out of paper.
- 2016‑07‑06:
Horrifying PDF experiment: Breakout.
- 2016‑07‑06:
The hazard of Tesla's approach to driverless cars (as opposed to Google's).
- 2016‑07‑06:
When you can average percentiles.
- 2016‑07‑05:
NetBox: IP address management (IPAM) and data center infrastructure management (DCIM) tool.
- 2016‑07‑05:
Brexit voters are not the left behind.
- 2016‑07‑05:
ICANN's new domain transfer policy is a lot more secure.
- 2016‑07‑04:
The psychology of voting for brexit.
- 2016‑07‑04:
Disaster capitalism: how the Tories will use Brexit to roll back the state.
- 2016‑07‑04:
The moral economy of tech.
- 2016‑07‑04:
Dozens of banks have been compromised; hundreds of millions of dollars have been stolen via SWIFT.
- 2016‑07‑04:
MRI software bugs could upend years of research.
- 2016‑07‑04:
Gigabytes per wafer of DRAM are growing faster than the market's demand.
- 2016‑07‑04:
"How I cracked a keylogger and ended up in someone's inbox."
- 2016‑07‑03:
Ciphering: personalized generative jewellery.
- 2016‑07‑03:
etcd3: a new etcd.
- 2016‑07‑03:
Labour: a coup without a clue.
- 2016‑07‑03:
On Brexit: stabbed in the eye.
- 2016‑07‑03:
Heavy metal and natural language processing.
- 2016‑07‑02:
The Daredevil camera: images from a microphone array.
- 2016‑07‑02:
WireGuard: fast, modern, secure VPN tunnel.
- 2016‑07‑02:
What happens when you try to publish a failure to replicate in 2015/2016.
- 2016‑07‑01:
Growth of cities, going back 6,000 years. (video map)
- 2016‑07‑01:
Anniversary of record breaking 1976 heatwave.
- 2016‑07‑01:
Hillary Clinton says a fond farewell to The Toast.
- 2016‑07‑01:
The really big one: a magnitude 9ish earthquake in the Cascadia subduction zone.
- 2016‑06‑30:
StartEncrypt considered harmful.
- 2016‑06‑30:
Butter consumption is not correlated with chronic disease or mortality.
- 2016‑06‑30:
Anomalous traffic on the root DNS servers on 2016-06-25.
- 2016‑06‑30:
Machine pong: when a TFTP server falls in love with a DNS server.
- 2016‑06‑30:
USE Method: Linux performance checklist.
- 2016‑06‑30:
Looking behind the Brexit anger.
- 2016‑06‑29:
How can I decent feminist ideas if I'm terrible at arguing?
- 2016‑06‑29:
Are US millennial men just as sexist as their dads?
- 2016‑06‑29:
Sugar causes heart attacks.
- 2016‑06‑28:
The languages which almost became CSS.
- 2016‑06‑28:
Open plan offices are basically terrible in every way.
- 2016‑06‑28:
Sqitch: database change management.
- 2016‑06‑27:
Scalable run-time detection of uninitialized memory reads and data races with LLVM sanitizers.
- 2016‑06‑27:
Brexit lies are opening up a terrifying new opportunity for the far-right in Britain.
- 2016‑06‑27:
Ludicrously cheap HDMI capture for Linux.
- 2016‑06‑27:
H-day: when Sweden swapped to driving on the right.
- 2016‑06‑27:
British Army 77th Brigade information warfare unit.
- 2016‑06‑27:
The "Cobra Effect" that is disabling paste on password fields.
- 2016‑06‑26:
The problem with reinforced concrete.
- 2016‑06‑26:
Typography for user interfaces.
- 2016‑06‑26:
Alresfordism: hell is other Britons.
- 2016‑06‑26:
Why American politics really went insane.
- 2016‑06‑26:
On the mistrust of science.
- 2016‑06‑25:
Brexit is about more than the EU: it's about class, inequality, and voters feeling excluded from politics.
- 2016‑06‑25:
Scientific journal subscription costs in Finland 2010-2015.
- 2016‑06‑25:
Thoughts on the sociology of brexit.
- 2016‑06‑25:
The process of withdrawing from the EU. (House of Lords Europe cttee)
- 2016‑06‑25:
The ABCs of socialism (from an American perspective).
- 2016‑06‑25:
How American politics became so ineffective.
- 2016‑06‑25:
H2O HTTP/2 server 2.0.1 / 2.1.0-beta1 released, with new features and performance optimizations
- 2016‑06‑24:
The Scottish / British / European political singularity.
- 2016‑06‑24:
Brexit wins. An illusion dies. What now for the radical left in Labour and beyond?
- 2016‑06‑24:
Lancaster innovation hub cardboard office. (WebGL + Google Cardboard)
- 2016‑06‑24:
Fire in microgravity.
- 2016‑06‑24:
Unicode power symbol: how a comment on HackerNews lead to 4½ new characters.
- 2016‑06‑24:
Unlocking ordered parallelism with the Swarm architecture.
- 2016‑06‑24:
MIT Swarm processor makes parallel programs run many times faster with one-tenth the code.
- 2016‑06‑23:
Comodo is attempting to improperly register trademarks for Let's Encrypt.
- 2016‑06‑23:
Rem Koolhaas EU barcode flag.
- 2016‑06‑22:
The new Panama Canal: a risky bet.
- 2016‑06‑22:
Patrick Stewart sketch: what has the ECHR ever done for us? (YouTube)
- 2016‑06‑22:
Gun manufacturer Remington is trying to seal its marketing documents in the Sandy Hook lawsuit.
- 2016‑06‑22:
Silicon Valley's bloody plant burger smells, tastes, and sizzles like meat.
- 2016‑06‑22:
Ethereum is doomed.
- 2016‑06‑21:
Where geek girls come from.
- 2016‑06‑21:
Building a strandbeest walking bicycle.
- 2016‑06‑21:
Tire pressure: stop guessing and read the science.
- 2016‑06‑21:
APFS in detail.
- 2016‑06‑21:
CAR: clock with adaptive replacement, a cache replacement policy inspired by ARC.
- 2016‑06‑21:
Suspension losses confirmed: very hard tires don't go faster.
- 2016‑06‑21:
You don't need JavaScript for that.
- 2016‑06‑21:
Press embargoes: a threat from the shadows to open access.
- 2016‑06‑21:
Executive summary of the independent report on e-voting in Estonia.
- 2016‑06‑21:
Traffic lights in 's-Hertogenbosch: an interview.
- 2016‑06‑21:
Open access: All human knowledge is there, so why can't everybody access it?
- 2016‑06‑21:
Holloways: roads sunk into the earth by time.
- 2016‑06‑20:
The management myth: the MBA vs the philosopher.
- 2016‑06‑20:
The Independent State of Greater Cambridge.
- 2016‑06‑19:
How to publish a scientific comment in 1 2 3 easy steps.
- 2016‑06‑19:
Ethererum and the DAO: thinking about smart contract security.
- 2016‑06‑19:
Field notes on ElasticSearch at petabyte scale on AWS.
- 2016‑06‑19:
The DAO's etherium smart contract was dumb.
- 2016‑06‑19:
Y Combinator's Xerox Alto: restoring the legendary 1970s GUI computer.
- 2016‑06‑19:
Small-memory JVM techniques for microservice sidecars.
- 2016‑06‑18:
rans_static: another rANS coder.
- 2016‑06‑18:
ryg_rans: simple rANS encoder/decoder.
- 2016‑06‑18:
Finite State Entropy: a new breed of entropy coder.
- 2016‑06‑18:
Apple data compression library documentation.
- 2016‑06‑18:
Asymmetric numeral systems (ANS): the theory behind finite state entropy (lzfse).
- 2016‑06‑18:
lzfse: Apple's finite state entropy compressor.
- 2016‑06‑18:
FiniteStateEntropy: combines the speed of Huffman encoding with the effectiveness of arithmetic encoding.
- 2016‑06‑17:
Godwin's Law was created in 1990, but it wasn't a prediction, it was a warning.
- 2016‑06‑17:
What is `git diff --histogram`?
- 2016‑06‑17:
A heavily fragmented file in an NTFS volume may not grow beyond a certain size.
- 2016‑06‑17:
How the earth moves. (YouTube)
- 2016‑06‑17:
HTTP header injection and request smuggling in Python urllib.
- 2016‑06‑16:
Tail recursion and debugging.
- 2016‑06‑16:
The Russian guide to brexit.
- 2016‑06‑16:
GoDaddy wins lawsuit to declare RPost's patents on email invalid.
- 2016‑06‑16:
The 8 stages of genocide.
- 2016‑06‑16:
It's time to secure Microsoft Office macros.
- 2016‑06‑16:
Samsung acquires Joyent.
- 2016‑06‑16:
Microsoft extended volatile semantics for C.
- 2016‑06‑16:
A guide to server setup for user data security.
- 2016‑06‑16:
We can already see a post-Brexit economy emerging. It's grim.
- 2016‑06‑15:
Britain's decline: its causes and consequences. (1979)
- 2016‑06‑15:
Microsoft wants to turn LinkedIn profiles into a central identity for the workplace.
- 2016‑06‑15:
How to POST documents to validator.w3.org for checking.
- 2016‑06‑15:
How three dots changed JavaScript.
- 2016‑06‑15:
Reagents: lock-free programming for the masses.
- 2016‑06‑15:
ZFS: Apple's new filesystem that wasn't
- 2016‑06‑15:
Checked C: a language extension that adds bounds checking to C.
- 2016‑06‑15:
What is differential privacy?
- 2016‑06‑14:
Among climate scientists gloom has set in. It's worse than we think, but they can't really talk about it.
- 2016‑06‑14:
Network support for TCP fast open: middleboxes break it for 20% of users.
- 2016‑06‑14:
1.5 million households in America have an income of less than $2 per person per day.
- 2016‑06‑14:
ISC.org is considering a licence change of BIND to the MPL.
- 2016‑06‑14:
Signed overflow in an early edition of the C Reference Manual.
- 2016‑06‑14:
Finding pearls fuzzing ClamAV.
- 2016‑06‑14:
English Dialect Dictionary.
- 2016‑06‑14:
A new revised version of Johnston's London Underground typeface for its 100th anniversary.
- 2016‑06‑14:
How to write service status updates.
- 2016‑06‑13:
Effective learning strategies for programmers, and others: growing skills not fixed aptitudes.
- 2016‑06‑13:
Digging into the dev documentation for APFS, Apple's new file system.
- 2016‑06‑13:
How to spy on a Ruby program.
- 2016‑06‑13:
Riot finds workplace toxicity correlates with bad behaviour when playing League Of Legends.
- 2016‑06‑13:
ldc 1.0.0: a D programming language front-end for LLVM.
- 2016‑06‑12:
The end of the router?
- 2016‑06‑12:
A useful new strace feature: -y translates file descriptors to paths.
- 2016‑06‑11:
An open letter to Wired about ad blockers and malvertising.
- 2016‑06‑10:
Why you should not share confidential links on Facebook.
- 2016‑06‑10:
Bytebeat.
- 2016‑06‑10:
Asynchronous I/O on Windows is terrible.
- 2016‑06‑10:
National Library of Scotland browsable online map archive.
- 2016‑06‑10:
1961 Ordnance survey map of Cambridge and Ely.
- 2016‑06‑10:
Asynchronous disk I/O is terrible.
- 2016‑06‑10:
Heapsort, quicksort, and entropy.
- 2016‑06‑10:
Coelacanth: Lessons from Doom.
- 2016‑06‑09:
Lightweight affine static capabilities for implementing TLS in Rust.
- 2016‑06‑09:
$1,884 to quote 300 words from The New York Times in a book: Two authors try to stand up for fair use.
- 2016‑06‑09:
Moby: long ambients.
- 2016‑06‑09:
Typosquatting programming language package managers.
- 2016‑06‑09:
Twinklr: a modern music box.
- 2016‑06‑08:
Tracking issue for implementing headless mode for Chrome.
- 2016‑06‑08:
Headless Chromium.
- 2016‑06‑08:
SlimerJS: a headless browser (compatible with CasperJS).
- 2016‑06‑08:
Nightmare.js: a headless browser.
- 2016‑06‑08:
DB-19: resurrecting an obsolete connector.
- 2016‑06‑08:
The state of SourceForge since its acquisition in January 2016.
- 2016‑06‑08:
Why you should never use MongoDB.
- 2016‑06‑08:
Hunting HiPPOs: tips to avoid executive randomization from the Highest Paid Person's Opinion.
- 2016‑06‑08:
Wells Fargo will introduce an API to replace screen scraping by third party accounting services.
- 2016‑06‑08:
'Doesn't Mary have a lovely bottom?': Catholicism, sex and girls in Father Ted.
- 2016‑06‑07:
MBAs are everywhere, yet the industries where you find fewer of them tend to be the most successful.
- 2016‑06‑07:
Cloudflare: Making the internet a little bit faster, for a select group of people.
- 2016‑06‑07:
Crouching tiger, hidden DNS: inconsistent parsing allows malware to hide in Windows DNS settings.
- 2016‑06‑07:
NoScript website hosts malware ads?
- 2016‑06‑06:
Autoclave: a pressure cooker for programs. Stress-test to find intermittent bugs.
- 2016‑06‑06:
A 3.2km beer pipeline in Bruges.
- 2016‑06‑06:
Disadvantages of purely functional programming.
- 2016‑06‑06:
Prime after prime: correlations in consecutive primes.
- 2016‑06‑06:
Enabling polyhedral optimizations in Julia.
- 2016‑06‑06:
The Condorcet Paradox at work? Rock-paper-scissors in the EU referendum.
- 2016‑06‑06:
Criticisms of systemd-resolved.
- 2016‑06‑06:
Common shell script mistakes.
- 2016‑06‑06:
Colout: multicolour search result highlighting.
- 2016‑06‑06:
WTF is operations? #serverless #devops #sre
- 2016‑06‑05:
The Desscriptor: a definition of the Burroughs B5000 information processing system.
- 2016‑06‑05:
A new approach to the functional design of a digital computer: the Burroughs B5000.
- 2016‑06‑04:
Water from tinned chickpeas can be used as a vegan substitute for egg whites in meringue.
- 2016‑06‑04:
How Mark Zuckerberg led Facebook's war to crush Google Plus.
- 2016‑06‑04:
How Microsoft lost its mojo: Steve Ballmer and corporate America's most spectacular decline.
- 2016‑06‑04:
Some C#/.NET generics research project history: the MSR Cambridge white paper from mid-1999.
- 2016‑06‑04:
Why is a Rust executable large? An exploration of build options and big libraries.
- 2016‑06‑03:
Starting an ISP in a developing country.
- 2016‑06‑03:
Microbe-linked solar panels are 10x better than plants at converting sunlight to energy.
- 2016‑06‑03:
https reduces ad revenue.
- 2016‑06‑03:
Newspaper industry asks FTC to investigate "deceptive" adblockers.
- 2016‑06‑03:
UK at risk of web blacklist false positives, warns human rights watchdog.
- 2016‑06‑03:
Promises, observables, async and await in JavaScript.
- 2016‑06‑02:
BPF hardware offload.
- 2016‑06‑02:
Hedge funds are planning to do a George Soros bet on Sterling on EU referendum day.
- 2016‑06‑02:
How to win at Monopoly (and lose all your friends).
- 2016‑06‑01:
Holopainting combines light painting, stop motion, and hyperlapse.
- 2016‑06‑01:
The world is drawing battle lines against American tech giants.
- 2016‑06‑01:
Cable One uses credit scores to determine quality of customer service.
- 2016‑06‑01:
Police are filing warrants for Google's vast store of Android location data.
- 2016‑06‑01:
The invention of the paper bag was a triumph of feminism.
- 2016‑06‑01:
Israeli hacking company Ability compromised SS7 to spy on any phone on the planet.
- 2016‑06‑01:
Nonce-disrespecting adversaries: practical forgery attacks on GCM in TLS.
- 2016‑06‑01:
Postgres meet Andl.
- 2016‑06‑01:
How Daylight Saving Time came to Ireland.
- 2016‑06‑01:
New cores underpin Cavium's Thunder X2.
- 2016‑06‑01:
Intel benchmarks Cavium ThunderX ARM against Xeon.
- 2016‑05‑31:
Protected bike lanes reduce risk of injury by 90%
- 2016‑05‑31:
Geared unicycles: riding faster on one wheel.
- 2016‑05‑31:
How not to reclaim social media from abuse.
- 2016‑05‑31:
Iridium / Satelles / Boeing satellite time and location service white paper.
- 2016‑05‑31:
Iridium now provides a satellite time and location service with a stronger signal than GPS.
- 2016‑05‑31:
Full-Text RSS: convert redacted feeds or multipage articles to properly useful RSS.
- 2016‑05‑30:
ARM Cortex A73 "Artemis" unveiled.
- 2016‑05‑30:
LLVM EfficiencySanitizer.
- 2016‑05‑30:
A tour of some physical infrastructure for the Internet, including a transatlantic cable landing site.
- 2016‑05‑30:
How big an issue is nausea caused by virtual reality headsets?
- 2016‑05‑29:
How to generate secure random numbers in various programming languages.
- 2016‑05‑29:
Returning from the "threshold of misery".
- 2016‑05‑29:
Just two factors explain post-PhD gender pay gap.
- 2016‑05‑29:
Harvey OS: an effort to port Plan 9 to compile with gcc and clang.
- 2016‑05‑29:
The glorious horror of TECO.
- 2016‑05‑28:
cppp: a C partial preprocessor, like unifdef.
- 2016‑05‑28:
The delightful perversity of Quebec's Roman Catholic swearing.
- 2016‑05‑28:
Sarah Guppy gave her design for the Clifton suspension bridge to Brunel.
- 2016‑05‑28:
systemd developers ask tmux to add a workaround for a bug in systemd.
- 2016‑05‑28:
An Internet cable will soon cross the Arctic from Britain to Japan via Alaska.
- 2016‑05‑28:
Google is making the same mistake on iOS that Microsoft did on Mac OS in the 1990s.
- 2016‑05‑28:
Hacking Transcend WiFi SD cards.
- 2016‑05‑28:
systemd breaks screen and tmux by killing background processes after user logs out.
- 2016‑05‑27:
A 200TB computer-assisted proof of the Boolean Pythagorean triples problem.
- 2016‑05‑27:
The tootsie-pop model for unsafe code in Rust.
- 2016‑05‑27:
Dr Heimlich uses his Heimlich manoeuvre for the first time aged 96.
- 2016‑05‑27:
Star Wars episode IV vs VII comparable shots. (Vimeo)
- 2016‑05‑27:
Realization of a timescale with an accurate optical lattice clock.
- 2016‑05‑26:
The path to Rust.
- 2016‑05‑26:
exwm: Emacs X11 window manager.
- 2016‑05‑25:
La grotte de Bruniquel, un site archéologique exceptionnel. (Neanderthal)
- 2016‑05‑25:
Neanderthal constructions and fire found in a cave in France.
- 2016‑05‑25:
IPv6 excuses.
- 2016‑05‑24:
Logswan: a fast Web log analyzer using probabilistic data structures.
- 2016‑05‑24:
Fizzbuzz in tensorflow.
- 2016‑05‑24:
The godless outnumber Christians in England and Wales.
- 2016‑05‑24:
The diminishing volume of higher-dimensional balls.
- 2016‑05‑24:
Policing whipped cream: Home Office publishes advice for Psychoactive Substances Act.
- 2016‑05‑24:
Behind the master controls of GPS.
- 2016‑05‑24:
clojure.spec: type annotations for documentation and testing.
- 2016‑05‑24:
Failure to archive: institutional silences and the digital dark age.
- 2016‑05‑23:
Why CERN made cling.
- 2016‑05‑23:
Cling: C++ interpreter (interactive compiler) based on clang and LLVM.
- 2016‑05‑23:
ClusterHAT: four Pi Zeroes mounted on a Raspberry Pi.
- 2016‑05‑22:
Autonomous mini rally car teaches itself to powerslide.
- 2016‑05‑22:
TOTP ssh port fluxing.
- 2016‑05‑22:
The de editor: a mixture of vi and acme.
- 2016‑05‑22:
Setting up Raspberry Pi Zero OTG with just a µSD card, µUSB cable, and a host computer.
- 2016‑05‑22:
Oric-1 repair: reset circuitry.
- 2016‑05‑22:
Rendering a Buddhabrot at 4K and other bad ideas.
- 2016‑05‑22:
Automation should be like Iron Man, not Ultron.
- 2016‑05‑22:
The eternal mainframe.
- 2016‑05‑22:
binwalk: firmware analysis and reverse engineering tool.
- 2016‑05‑22:
Reverse engineering a mysterious UDP stream in a hotel.
- 2016‑05‑22:
"Anguish": esoteric programming with invisible Unicode characters.
- 2016‑05‑22:
Security vulnerabilities due to "ignorable" characters in HFS+ filenames on Mac OS.
- 2016‑05‑21:
SCP Foundation: special containment procedures for hazardous paranormal anomalous objects.
- 2016‑05‑21:
Web development best practices are killing mobile web performance.
- 2016‑05‑21:
The French invasion of London 800 years ago.
- 2016‑05‑21:
For champion Nigerian Scrabble players, SHORT Tops SHORTER.
- 2016‑05‑21:
Universal.css: The only CSS you will ever need.
- 2016‑05‑21:
Trello CSS guide.
- 2016‑05‑21:
CSS coding techniques.
- 2016‑05‑21:
How (not) to write a paper.
- 2016‑05‑20:
DJB's sarcastic notes on writing papers.
- 2016‑05‑20:
Programming the ENIAC: an example of why computer history is hard.
- 2016‑05‑20:
An exact value for the Planck constant: why reaching it took 100 years.
- 2016‑05‑20:
#!/proc/self/exe
- 2016‑05‑20:
#! abuse
- 2016‑05‑20:
How I accidentally captured the SpaceX Falcon 9 landing. (Great night-time photos!)
- 2016‑05‑20:
A history of spam bots.
- 2016‑05‑20:
libsixel: bitmap graphics for DEC terminals (and xterm).
- 2016‑05‑20:
Persistent clocks for batteryless sensing devices: using SRAM decay as an hourglass.
- 2016‑05‑20:
Cycling fallacies.
- 2016‑05‑20:
Improving Docker with Unikernels: Introducing HyperKit, VPNKit and DataKit.
- 2016‑05‑20:
Project GREAT 2016a: testing general relativity time dilation by taking atomic clocks up a mountain.
- 2016‑05‑20:
Google TPU: TensorFlow machine learning accelerator chip.
- 2016‑05‑20:
Perfect Security: unpickable locks only existed for about 70 years.
- 2016‑05‑20:
Two approaches to x86 memory encryption.
- 2016‑05‑20:
Publishing code without a license is a much more radical statement than the GPL.
- 2016‑05‑19:
How to create an unfair coin and prove it with math.
- 2016‑05‑19:
FORTH vs the 6502 indirect JMP.
- 2016‑05‑19:
Is the moon full? Just ask the CERN LHC operators.
- 2016‑05‑19:
CERN LEP collider measurements confirm train time tables.
- 2016‑05‑19:
Using the failure ratio to debug an ASN.1 interop problem.
- 2016‑05‑19:
Debugging behind the Iron Curtain.
- 2016‑05‑19:
Computer-related horror stories, folklore, and anecdotes.
- 2016‑05‑19:
The car that was allergic to vanilla ice cream.
- 2016‑05‑19:
85% of people running red lights in Dublin are motorists.
- 2016‑05‑18:
Kung fu motion visualization.
- 2016‑05‑18:
Multicore OCaml.
- 2016‑05‑18:
The Flambda IR: a better inliner for OCaml.
- 2016‑05‑18:
Survival analysis of hard disk drive failure data.
- 2016‑05‑17:
A breakthrough in the theory of random number generation.
- 2016‑05‑17:
Stoned drivers are a lot safer than drunk ones, says US government data.
- 2016‑05‑17:
All-knowing DNS: synthetic forward and reverse DNS for IPv6 SLAAC.
- 2016‑05‑17:
The MOnSter 6502: a microprocessor made from discrete components.
- 2016‑05‑16:
The bank job: security analysis of a mobile banking app.
- 2016‑05‑16:
The evolution of programming languages designed for children.
- 2016‑05‑16:
How to make caramel without melting sugar.
- 2016‑05‑16:
"I fly 747s for a living. Here are the amazing things I see every day."
- 2016‑05‑16:
Don't blame Sykes-Picot for the mess in the Middle East.
- 2016‑05‑16:
The Warburg effect, and metabolic approaches to treating cancer.
- 2016‑05‑16:
Lambda expressions in C++11, C++14, and C++17.
- 2016‑05‑16:
Glasgow's high mortality rate blamed on Westminster social engineering.
- 2016‑05‑15:
NPL open house, Tuesday 2016-05-17.
- 2016‑05‑15:
Why is the lambda calculus named after that Greek letter? Randomness, not typography.
- 2016‑05‑15:
git secret: gpg encrypt data in a git repository.
- 2016‑05‑15:
The EFF's Let's Encrypt client renamed to certbot.
- 2016‑05‑15:
Building and scaling the Fastly network, part 1: Fighting the FIB.
- 2016‑05‑15:
On the "right fix": Mozilla's "Slaughterhouse" project and the Bugzilla security breach.
- 2016‑05‑15:
Taking Rust everywhere: cross-compiling with rustup.
- 2016‑05‑15:
Neo900: a crowdsourced Maemo device.
- 2016‑05‑15:
Fancy Rust development with Emacs.
- 2016‑05‑15:
London became Britain's capital after Boudicca's revolt.
- 2016‑05‑15:
The many ways of handling TCP RST packets.
- 2016‑05‑13:
Warning signs: a checklist for recognising attempts to undermine cryptography.
- 2016‑05‑13:
A history of SHOUTING WITH CAPITAL LETTERS.
- 2016‑05‑13:
Electronic mail at MIT in the 1960s.
- 2016‑05‑13:
The curious case of the military flail, a weapon that didn't exist.
- 2016‑05‑13:
A home-made camera to take pictures with light beyond the visible spectrum.
- 2016‑05‑11:
The death of TRILL, routing bridges for large ethernets.
- 2016‑05‑11:
Druid: a fast column-oriented distributed data store, good for time series.
- 2016‑05‑11:
PostgreSQL scalability: towards a million or more TPS.
- 2016‑05‑11:
The Sourceware Operating System proposal: what if Sun went open source 10 years earlier?
- 2016‑05‑10:
Why do old statues have small penises?
- 2016‑05‑10:
A history of breakfast.
- 2016‑05‑10:
Elm 0.17: a farewell to FRP.
- 2016‑05‑10:
Proposed WebUSB API. What could possibly go wrong?
- 2016‑05‑10:
How a dildo-shaped malachite stalactite relates to the municipal water poisoning disaster in Flint.
- 2016‑05‑10:
Doppio: a JVM in JavaScript.
- 2016‑05‑10:
JavaPoly.js: Java in the browser without a plugin.
- 2016‑05‑10:
True Colour (16 million colours) support in various terminal applications and terminals.
- 2016‑05‑09:
Learning from Lancaster's winter storm power cuts.
- 2016‑05‑09:
Magnets and marbles! A Rube Goldberg machine. (YouTube)
- 2016‑05‑08:
Why suburbia sucks.
- 2016‑05‑08:
Which countries study which languages in DuoLingo?
- 2016‑05‑08:
A bit of background on compilers exploiting signed overflow undefined behaviour.
- 2016‑05‑08:
Pragmatic Debian packaging.
- 2016‑05‑08:
Lagom LCD monitor test pages.
- 2016‑05‑08:
sshguard: a C program to automatically firewall off brute force login attacks.
- 2016‑05‑08:
Writing a DIY ssh client for fun and profit.
- 2016‑05‑08:
Performance checklists for SREs.
- 2016‑05‑08:
A collection of Linux sysadmin/devops interview questions.
- 2016‑05‑08:
Preventing Debian / Ubuntu / systemd from starting daemons when a package is installed.
- 2016‑05‑07:
tq: command line HTML lookup by CSS selector.
- 2016‑05‑06:
Cambridge Museum of Technology funding campaign.
- 2016‑05‑06:
Empirically testing Godwin's law with data from Reddit.
- 2016‑05‑06:
Rebel without a call: control of communications technology was a key target in the Easter Rising.
- 2016‑05‑05:
The Apple Music subscription service will delete your music.
- 2016‑05‑05:
Simple guided fuzzing for libraries using LLVM's libFuzzer.
- 2016‑05‑05:
Address Sanitizer is not a security hardening feature.
- 2016‑05‑05:
Some memory safety tools for C.
- 2016‑05‑05:
The Brix System: modular handcrafted wooden electronic devices inspired by LEGO.
- 2016‑05‑04:
Oracle PeopleSoft: still a threat for enterprises.
- 2016‑05‑04:
The economics of long-term data storage, after the end of Kryder's law.
- 2016‑05‑04:
Performance impact of ECMAscript 6 features.
- 2016‑05‑04:
The Futhark programming language: purely functional data-parallel array programming on the GPU.
- 2016‑05‑04:
glium: Safe OpenGL wrapper for the Rust language.
- 2016‑05‑04:
ImageTragick details.
- 2016‑05‑04:
Weep for graphics programming: stringly-typed CPU/GPU interfaces.
- 2016‑05‑03:
ImageTragick: remote code execution vulnerability in ImageMagick. (with cute name, vanity domain, and logo)
- 2016‑05‑03:
Stratified Synthesis: automatically learning a formal semantics of the x86-64 instruction set.
- 2016‑05‑03:
Using DNSSEC and DNSCrypt in Debian.
- 2016‑05‑03:
How we found that the Linux nios2 memset() implementation had a bug!
- 2016‑05‑03:
More RAM: an LD_PRELOAD malloc() wrapper hack to use GPU memory when mmap() fails.
- 2016‑05‑03:
ElastAlert: easy and flexible alerting with ElasticSearch/LogStash/Kibana.
- 2016‑05‑03:
GNU make jobserver implementation.
- 2016‑05‑03:
OpenSSH plans to eliminate support for SSH protocol 1.
- 2016‑05‑03:
Ubuntu LTS: which packages actually get long-term support?
- 2016‑05‑03:
A review of Showstopper! a book about Dave Cutler and the creation of Windows NT.
- 2016‑05‑03:
libressl progress report with "more vague promises".
- 2016‑05‑03:
Previously ambivalent, now a systemd convert.
- 2016‑05‑02:
Some programming quips.
- 2016‑05‑02:
What happened to Google Maps?
- 2016‑05‑01:
The design of the RISC-V instruction set architecture.
- 2016‑05‑01:
Six simple web accessibility tests.
- 2016‑05‑01:
Grains vs tubers and their different consequences for civilisation and economic development.
- 2016‑05‑01:
Myths and legends about integer overflow in Rust.
- 2016‑05‑01:
TAL: typed assembly language.
- 2016‑04‑30:
A field guide to the North American utility pole.
- 2016‑04‑30:
Claude Shannon, the father of the information age, turns 1100100.
- 2016‑04‑30:
Variable assignments in POSIX make are Turing complete.
- 2016‑04‑30:
Why you can't rely on exercise to lose weight, explained with 60+ studies.
- 2016‑04‑30:
Lua target for Haxe.
- 2016‑04‑30:
Who's downloading pirated papers? Usage data from Sci-Hub.
- 2016‑04‑30:
On the (small) number of atoms in the universe.
- 2016‑04‑29:
An integer bignum formula for Fibonacci numbers.
- 2016‑04‑29:
Why are America's most innovative companies still stuck in 1950s suburbia?
- 2016‑04‑29:
Inside "emojigeddon", the fight over the future of the Unicode consortium.
- 2016‑04‑29:
SIL: Swift intermediate language.
- 2016‑04‑28:
Introducing MIR, the Rust compiler mid-level intermediate representation.
- 2016‑04‑28:
Gambit Scheme compiles to portable C.
- 2016‑04‑28:
Chez Scheme: formerly commercial optimising compiler, now under Apache licence.
- 2016‑04‑28:
Larceny: optimising research compiler for Scheme.
- 2016‑04‑28:
An opinionated guide to scheme implementations.
- 2016‑04‑28:
Extend Python, don't embed Python.
- 2016‑04‑27:
Lots of resources for learning about Kalman filters and robot movement control.
- 2016‑04‑27:
How Uber conquered London.
- 2016‑04‑27:
klaus: a simple git web server. (Python WSGI)
- 2016‑04‑27:
git-remote-dropbox: use a Dropbox (shared) folder as a git server.
- 2016‑04‑27:
Whether it's tea or sex, consent is not actually that complicated.
- 2016‑04‑27:
Cisco IOS XR 6.0 replaces QNX with Linux.
- 2016‑04‑26:
Fortuna-based /dev/random patch for Linux.
- 2016‑04‑26:
On the difference between engineering in theory and in practice.
- 2016‑04‑25:
China's WeChat is the state of the art in conversational user interfaces.
- 2016‑04‑25:
QBE: quick compiler backend, 70% of the features with 10% of the code.
- 2016‑04‑25:
On the timing of time zone changes.
- 2016‑04‑23:
630,000 cars recalled in Germany due to widespread cheating on diesel emissions regulations.
- 2016‑04‑23:
Naming poll failures - I like the "Fred Durst society for humanities and arts" :-)
- 2016‑04‑23:
The financial insecurity of middle-class Americans.
- 2016‑04‑23:
Boaty McBoatface and the false promise of democracy.
- 2016‑04‑23:
The rise of academic pirate libraries.
- 2016‑04‑22:
Woodward's strange thrust device.
- 2016‑04‑22:
Doubts about McCulloch's EmDrive explanation.
- 2016‑04‑22:
The curious link between the fly-by anomaly and the "impossible" EmDrive thruster.
- 2016‑04‑21:
How to derive Vose's alias method for sampling from a discrete probability distribution in O(1).
- 2016‑04‑20:
SystemInfoKit: a more elaborate Apple SMC etc. Objective C library. (GPL)
- 2016‑04‑20:
SMCWrapper: an Objective C library for talking to an Apple SMC. (GPL)
- 2016‑04‑20:
SMCKit: a Swift library and tool for talking to the Apple SMC.
- 2016‑04‑20:
A complete guide to the Apple SMC for programmers.
- 2016‑04‑20:
CoCCA SRS domain registry software.
- 2016‑04‑20:
FRED: free registry software for ENUM and domains.
- 2016‑04‑20:
On the insignificance of the gyroscopic effect when riding a bicycle.
- 2016‑04‑18:
Cycling and feminism.
- 2016‑04‑18:
Apple iOS pre-9.3.1 can be bricked by spoofed pre-1970 NTP responses.
- 2016‑04‑17:
How to build an economic model in your spare time: advice on assembling and presenting your ideas.
- 2016‑04‑17:
The best versions of QuickCheck in every programming language.
- 2016‑04‑17:
Britain's scientists must be allowed to criticise the government.
- 2016‑04‑17:
sysdig troubleshooting cheatsheet: comparisons with strace, htop, lsof, tcpdump, iftop.
- 2016‑04‑17:
Linux network metrics: why you should use nstat instead of netstat.
- 2016‑04‑17:
How to use vim in a pipe (with big caveats).
- 2016‑04‑17:
Flyboard Air: a real jet-powered hoverboard?
- 2016‑04‑17:
Studying the language and structure in non-programmers' solutions to programming problems.
- 2016‑04‑16:
MNT VA2000, an Amiga 2000 Graphics Card (Zorro II), written in Verilog.
- 2016‑04‑16:
The vigilante who hacked Hacking Team explains how he did it.
- 2016‑04‑16:
A review of Terry Pratchett's memorial event.
- 2016‑04‑16:
Neil Gaiman on Terry Pratchett's memorial, his screen adaptation of Good Omens, his nonfiction book, and his baby.
- 2016‑04‑16:
CESG advises against forcing regular password expiry.
- 2016‑04‑16:
First on-chip non-magnetic RF circulator allowing full-duplex radio with a single antenna.
- 2016‑04‑16:
Honouring David MacKay's contribution to sustainable energy: "being pro-arithmetic".
- 2016‑04‑16:
A basic introduction to NumPy's einsum function.
- 2016‑04‑16:
A revolutionary discovery of ancient texts in China.
- 2016‑04‑16:
A guide to naming variables.
- 2016‑04‑16:
Protesters who blockaded London arms trade fair acquitted after judge sees evidence of illegal weapons on sale.
- 2016‑04‑16:
Introducing Ignition: the new CoreOS machine provisioning utility.
- 2016‑04‑16:
Brewster Kahle's "Distributed Web" proposal.
- 2016‑04‑16:
Introducing Facebook's new terrestrial connectivity systems: Terragraph and Project ARIES.
- 2016‑04‑16:
An introduction to code review with Gerrit.
- 2016‑04‑15:
Lawyers who won "happy birthday" copyright case sue to free "we shall overcome".
- 2016‑04‑15:
Lead and crime: another look.
- 2016‑04‑15:
Cheap Docker images with Nix.
- 2016‑04‑15:
China upgrades Tianhe-2 supercomputer with home-grown ARM processors.
- 2016‑04‑15:
Nominet sets sights on .org after its Minds+Machines registry takeover.
- 2016‑04‑15:
Remake: a fork of GNU make with comprehensible tracing and a debugger.
- 2016‑04‑15:
Neoliberalism: the ideology at the root of all our problems.
- 2016‑04‑15:
A systematic analysis of the Juniper Dual EC DRBG backdoor.
- 2016‑04‑15:
How Candy Japan got credit card fraud somewhat under control.
- 2016‑04‑15:
The Linux scheduler: a decade of wasted cores.
- 2016‑04‑15:
Using jemalloc to get to the bottom of a Java memory leak.
- 2016‑04‑14:
Safer Unix programming with Rust.
- 2016‑04‑14:
Capitalism excels at innovation but is failing at maintenance, and for most lives it is maintenance that matters more.
- 2016‑04‑14:
Velocipedia: realistic renderings of badly-drawn bikes.
- 2016‑04‑14:
Google compute engine BGP anycast outage postmortem.
- 2016‑04‑13:
In almost every way imaginable, the car, as it is deployed and used today, is insane.
- 2016‑04‑13:
A one-transistor SRAM.
- 2016‑04‑13:
It's the rheo thing: measurements showing ketchup is thixotropic.
- 2016‑04‑13:
Records found in a dusty basement undermine decades of dietary advice.
- 2016‑04‑13:
An analysis of OpenSSL's random number generator.
- 2016‑04‑13:
USB3 interference with 2.4GHz WiFi and Bluetooth devices.
- 2016‑04‑12:
How to deal a hand from a deck of 2^64 cards: the best algorithm no-one knows about.
- 2016‑04‑12:
Another proleptic UTC: what if leap seconds were extended into the distant past?
- 2016‑04‑12:
Hot-desking offices wreck productivity.
- 2016‑04‑12:
Average history: how the mean triumphed over the median.
- 2016‑04‑11:
The curious case of the unexpectedly aborted slow transfers.
- 2016‑04‑11:
Bolstering https security.
- 2016‑04‑11:
Leap second behaviour of NTP servers.
- 2016‑04‑11:
Space weapons (including nukes in space and Project Orion)
- 2016‑04‑11:
Why the UK has the worst electoral integrity in Europe.
- 2016‑04‑11:
Notes on Google's site reliability engineering book.
- 2016‑04‑11:
Bad interaction between Tor, Unbound, and GoDaddy breaks DNS resolution.
- 2016‑04‑11:
GoDaddy's selective DNS blackout policy.
- 2016‑04‑11:
Architecture of database management systems.
- 2016‑04‑11:
Following a SELECT statement through Postgres internals.
- 2016‑04‑10:
How MaxMind fingered a farm in the centre of the USA as the location for all sorts of online badness.
- 2016‑04‑10:
Film dialogue from 2,000 screenplays, broken down by gender and age.
- 2016‑04‑10:
Security officer rigged lottery random number generator to fraudulently claim millions.
- 2016‑04‑10:
Inigo Quilez: fractals, computer graphics, mathematics, demoscene and more.
- 2016‑04‑10:
The Book of Shaders.
- 2016‑04‑10:
The Erlang 19.0 garbage collector.
- 2016‑04‑09:
It's possible to reduce prejudice by canvassing: a story of scientific fraud and experimental validation.
- 2016‑04‑09:
In-jokes and injunctions: how the British press deal with forced secrecy.
- 2016‑04‑09:
HIV overcomes CRISPR gene-editing attack.
- 2016‑04‑09:
Anti-adblock killer: avoid malvertising on sites that try to block ad blockers.
- 2016‑04‑08:
s3git: git for AWS cloud storage.
- 2016‑04‑08:
End-to-end security for sleepy smart object networks.
- 2016‑04‑08:
Crypto performance and the Internet of Things.
- 2016‑04‑08:
The Windows subsystem for Linux is not as good as Interix was.
- 2016‑04‑08:
WinObjC: Objective-C for Windows / Windows Bridge for iOS.
- 2016‑04‑08:
Ubuntu on Windows is now available.
- 2016‑04‑08:
Kakoune: a code editor inspired by vim.
- 2016‑04‑08:
vis: a vim-like text editor.
- 2016‑04‑07:
GCHQ intervenes to stop catastrophically insecure smart meter plan.
- 2016‑04‑07:
MetaLibm: parameterized code generation for libm.
- 2016‑04‑07:
Google BeyondCorp: hard and crunchy security all the way through, without IP-based access control.
- 2016‑04‑07:
The sugar conspiracy.
- 2016‑04‑07:
What is a "good job"?
- 2016‑04‑07:
Cloud Git: a git storage system using OpenStack, redis, and JGit.
- 2016‑04‑07:
Introducing DGit: GitHub's dynamically distributed git storage system.
- 2016‑04‑07:
Not 'going dark': 15 out of 15 recent EU terrorists were known to the authorities in multiple ways.
- 2016‑04‑06:
A review of DNS-OARC 24.
- 2016‑04‑06:
Intel SSD denial of service vulnerability.
- 2016‑04‑06:
Ganeti: open source VM cluster manager.
- 2016‑04‑06:
The design and implementation of Debian code search.
- 2016‑04‑05:
Linux networks stack latency spikes with large numbers of listening sockets.
- 2016‑04‑05:
The Terminator theme tune has a time signature of 13/16.
- 2016‑04‑04:
AWS Lambda: back to stored procedures.
- 2016‑04‑04:
A history of Dick: Batman and Robin's gay subtext.
- 2016‑04‑04:
ChaCha20-Poly1305 in TLS.
- 2016‑04‑04:
An update on the Revolv smart home hub: Google will brick all the devices.
- 2016‑04‑04:
DNS zombies.
- 2016‑04‑04:
OpenToonz: the Studio Ghibli animation software available as open source.
- 2016‑04‑04:
An introduction to tmux.
- 2016‑04‑04:
bcc: dynamic tracing tools for Linux-4.1+ eBPF.
- 2016‑04‑04:
Lwan: lightweight asynchronous web server.
- 2016‑04‑04:
The Association for Computational Heresy, home of the SIGBOVIK 1st April conference.
- 2016‑04‑04:
How to build your own rogue GSM BTS for fun and profit.
- 2016‑04‑04:
Reading "The City and the City" as an international lawyer: territoriality, jurisdiction and transnationality.
- 2016‑04‑04:
Meet the founder of SciHub, Alexandra Elbakyan.
- 2016‑04‑04:
Not IEEE754: a radical approach to computation with real numbers.
- 2016‑04‑04:
Blood tests and the tampon of the future.
- 2016‑04‑04:
An introduction to distributed systems.
- 2016‑04‑04:
Propositions as filenames; builds as proofs: the essence of make.
- 2016‑04‑04:
Joi Ito on disobedience.
- 2016‑04‑04:
How to gracefully step down from being a volunteer organizer.
- 2016‑04‑04:
A paper model Enigma cipher machine.
- 2016‑04‑04:
Psychoactive Substances Act delayed while the Home Office works out what it has banned.
- 2016‑04‑04:
A decade of container control at Google.
- 2016‑04‑04:
Containers are not VMs.
- 2016‑04‑04:
Failure and recovery of a 1.7 PB Lustre filesystem.
- 2016‑03‑31:
Why trust beats hierarchy: civil service culture and the prisoners' dilemma.
- 2016‑03‑30:
You can run Ubuntu Linux ELF userland binaries on Windows 10.
- 2016‑03‑30:
The design principles of Konrad Zuse's mechanical computers.
- 2016‑03‑29:
fermi paradox by mercury: 64K demo competition winner. (Video)
- 2016‑03‑29:
The December 2015 root DNS server DDoS was not aimed at the root servers.
- 2016‑03‑29:
On pockets, and the gendered nature of being unencumbered.
- 2016‑03‑29:
Why women's clothes have useless pockets: a history.
- 2016‑03‑29:
tis-interpreter: a C interpreter for detecting undefined behaviour.
- 2016‑03‑29:
tel: a remote login wrapper for routers and other devices.
- 2016‑03‑29:
Structurally fixing string injection bugs. (LangSec)
- 2016‑03‑29:
CRT NTSC TV simulation in Super Win the Game.
- 2016‑03‑29:
Why we think terrorism is scarier than it really is (and we probably always will).
- 2016‑03‑29:
String types in Rust.
- 2016‑03‑29:
Anxiety and depression are symptoms, not diseases.
- 2016‑03‑28:
Beyond the sea: great circle arcs from coastal viewpoints.
- 2016‑03‑28:
Caring for file formats: making them secure and future proof.
- 2016‑03‑28:
Levi Strauss are opening up their methods for making jeans with less water.
- 2016‑03‑28:
Poem codes: WWII cryptography.
- 2016‑03‑27:
Flag stories: infographics comparing national flags.
- 2016‑03‑27:
The sky is the limit: human powered cranes and lifting devices.
- 2016‑03‑27:
"Women in computing" as problematic: a summary.
- 2016‑03‑27:
Gravitational Teleport: ssh for clusters and teams.
- 2016‑03‑27:
Zero downtime upgrade with Ansible and HAProxy.
- 2016‑03‑27:
Rspamd spam filtering system.
- 2016‑03‑27:
ASA2PDF: line printer emulator.
- 2016‑03‑27:
Microsoft Tay was toxic even before human contact.
- 2016‑03‑26:
How to make a chat bot that isn't racist.
- 2016‑03‑26:
When did porn become sex ed?
- 2016‑03‑26:
Ocean farmers on the front line of climate change.
- 2016‑03‑26:
Confirmshaming: passive-aggressive spam confirmation popups.
- 2016‑03‑26:
Hey, Microsoft, the Internet made my bot racist too.
- 2016‑03‑26:
Fibonacci flim-flam.
- 2016‑03‑26:
Why anti-authoritarians are diagnosed as mentally ill.
- 2016‑03‑26:
Jasper: control everything with your voice.
- 2016‑03‑26:
Build your own Amazon Echo with a Raspberry Pi.
- 2016‑03‑26:
ECDSA key extraction from mobile devices via nonintrusive physical side channels.
- 2016‑03‑25:
Julius open-source large vocabulary speech recognition engine.
- 2016‑03‑25:
CMU Sphinx open source voice recognition toolkit.
- 2016‑03‑25:
Citus unforks from PostgreSQL and goes open source.
- 2016‑03‑25:
Houdini: towards programmable CSS and browser rendering polyfills.
- 2016‑03‑24:
Why didn't my protocol get adopted by the IETF?
- 2016‑03‑24:
On Dan Bernstein's impending cryptography monoculture.
- 2016‑03‑24:
An administrator accidentally deleted the production database, and other disaster stories.
- 2016‑03‑23:
MongoDB: the Frankenstein monster of NoSQL databases.
- 2016‑03‑23:
In Angola, free access to Wikipedia is being used for copyright piracy.
- 2016‑03‑23:
How to backdoor Diffie-Hellman.
- 2016‑03‑23:
Intel says tick-tock is over.
- 2016‑03‑23:
Battle short: disable electrical safety features during critical operations.
- 2016‑03‑23:
Don't give up on TDD.
- 2016‑03‑22:
HIV genes successfully edited out of immune cells.
- 2016‑03‑22:
Measuring SMTP STARTTLS deployment quality.
- 2016‑03‑22:
Legalize it all: how to win the war on drugs.
- 2016‑03‑22:
Newegg comes to the rescue in foam arrow patent troll case.
- 2016‑03‑22:
Transcranial neurostimulation: better living through electrochemistry.
- 2016‑03‑22:
StartSSL domain validation bypass vulnerability.
- 2016‑03‑22:
A C++ almost-never-auto style conversion tool.
- 2016‑03‑22:
A C++ almost-always-auto style conversion tool.
- 2016‑03‑22:
Why we are upset with the NYTimes Paris terrorist article.
- 2016‑03‑22:
Paris terrorists used burner phones, not encryption, to evade detection.
- 2016‑03‑22:
Strange Maps: the shipping forecast.
- 2016‑03‑21:
Mind-blowing magic polymagnets! "maxels", magnetic pixels. (YouTube)
- 2016‑03‑21:
When will the last all-male clubs admit women? A portrait of institutional upper-class misogyny.
- 2016‑03‑21:
OS6: an operating system for a small computer. (1972)
- 2016‑03‑21:
There was no concept of pathnames in PDP-7 Unix.
- 2016‑03‑21:
Thank you for blocking ads: reminiscences of an adtech operator.
- 2016‑03‑21:
Whose phone number is 2^31-1?
- 2016‑03‑21:
Falsehoods frogrammers believe about ...
- 2016‑03‑21:
Falsehoods programmers believe about geography.
- 2016‑03‑21:
Falsehoods programmers believe about phone numbers.
- 2016‑03‑21:
The failures of introductory TDD.
- 2016‑03‑21:
Courgette: Google Chrome update diff / patch algorithm.
- 2016‑03‑21:
Ironsides: DNS server written in Ada / SPARK.
- 2016‑03‑21:
Statically recompiling NES games into native executables with LLVM and Golang.
- 2016‑03‑21:
Postmortem of a PostgreSQL autovaccum-related outage at Joyent.
- 2016‑03‑21:
No more full-table vacuums in PostgreSQL.
- 2016‑03‑18:
Atmospheric methane feedback loop.
- 2016‑03‑17:
What the AlphaGo team learned from the Go match against Lee Sedol.
- 2016‑03‑17:
WG14 preliminary C2x charter.
- 2016‑03‑17:
NANOG discussion of collectd and alternatives for network traffic graphs.
- 2016‑03‑17:
NeuStar runs a private DNS root to support GSM mobile roaming.
- 2016‑03‑17:
Three Golang landmines.
- 2016‑03‑16:
Blackberry 10 QNX security architecture.
- 2016‑03‑16:
The 9 circles of testing crypto code.
- 2016‑03‑16:
The encryption debate enters phase two: if not backdoors, then what?
- 2016‑03‑16:
Git Ketch: a fault-tolerant multi-master git server based on jgit and raft.
- 2016‑03‑16:
Wikipedia and the momentum of tiny edits: why are some articles longer than others?
- 2016‑03‑16:
What ISPs can see when snooping your Internet traffic.
- 2016‑03‑16:
ispc: Intel SPMD Program Compiler.
- 2016‑03‑16:
Previewing WebAssembly experiments in Microsoft Edge.
- 2016‑03‑16:
pytest-nodev: a test-driven search engine for Python code.
- 2016‑03‑16:
APNIC DNSSEC outage 16th March 2016.
- 2016‑03‑16:
Experimental support for WebAssembly in the V8 JavaScript engine.
- 2016‑03‑16:
A WebAssembly milestone: experimental support in multiple browsers.
- 2016‑03‑15:
The Broderers of St Paul's Cathedral.
- 2016‑03‑15:
Remote code execution vulnerability in git < 2.7.1: CVE-2016-2324, CVE-2016‑2315.
- 2016‑03‑15:
RFC 7754: technical considerations for Internet service blocking and filtering.
- 2016‑03‑15:
All research papers should be free.
- 2016‑03‑15:
GitHub pages for non-Rubyists.
- 2016‑03‑15:
Docker security.
- 2016‑03‑15:
What happens when a Linux / systemd machine boots with a corrupt /bin/sh.
- 2016‑03‑15:
The strict aliasing situation in C and C++ is pretty bad.
- 2016‑03‑15:
ICANN agrees multistakeholder governance model to replace US DoC oversight.
- 2016‑03‑15:
The strong law of small numbers: you can't tell by looking.
- 2016‑03‑14:
Despair fatigue: how British political hopelessness got boring.
- 2016‑03‑14:
The "premature optimization is the root of all evil" myth.
- 2016‑03‑14:
Rbitrary standards: a FAQ about R.
- 2016‑03‑14:
Mathematicians discover a prime number conspiracy.
- 2016‑03‑14:
Odroid C2 vs Raspberry Pi 3.
- 2016‑03‑14:
LXD 2.0: introduction to the Linux container daemon.
- 2016‑03‑14:
Discussion of Dropbox Magic Pocket.
- 2016‑03‑14:
Dropbox's Magic Pocket exabyte-scale storage infrastructure.
- 2016‑03‑14:
The story of Dropbox's move off Amazon AWS.
- 2016‑03‑14:
Some reasons why Dropbox are using Rust.
- 2016‑03‑14:
The European weather forecasting model is the world's best, and it just got better.
- 2016‑03‑14:
The first images from direct observation of a hydrogen atom's wave function.
- 2016‑03‑14:
According to the US govt, a "data center" is any room containing one or more servers (including test or dev servers).
- 2016‑03‑14:
Benjamin Franklin's striking sundial.
- 2016‑03‑14:
Orthoprint: DIY plastic tooth realignment.
- 2016‑03‑14:
Why are we fighting the crypto wars again?
- 2016‑03‑13:
Flow: static checker with gradual typing for JavaScript.
- 2016‑03‑13:
State of the art JavaScript in 2016.
- 2016‑03‑13:
Facebook's new front-end server hardware improves performance per watt.
- 2016‑03‑12:
Ten years of curve 25519.
- 2016‑03‑12:
Pouring molten salt into water - explosion! (YouTube)
- 2016‑03‑12:
Ineffective Java and Android TLS X.509 certificate pinning implementations.
- 2016‑03‑12:
A world map that scales country size to number of ccTLD registrations.
- 2016‑03‑12:
Time to rethink mandatory password changes.
- 2016‑03‑12:
Windows filtering platform: what those binary blobs in the registry do.
- 2016‑03‑12:
A trip through the graphics pipeline. (2011)
- 2016‑03‑12:
How OpenGL works: a software renderer in 500 lines of code.
- 2016‑03‑11:
How to build static checking systems using orders of magnitude less code.
- 2016‑03‑11:
10 lessons from 10 years of AWS.
- 2016‑03‑11:
Map of the world's nuclear power plants.
- 2016‑03‑10:
bind() before connect() for TCP scaling on Linux.
- 2016‑03‑10:
Systemd vs. Docker.
- 2016‑03‑09:
L-root DNS server IPv6 renumbering.
- 2016‑03‑09:
Debugging why ping was broken inside Docker.
- 2016‑03‑09:
Self-documenting makefiles.
- 2016‑03‑09:
Ansible vs Chef.
- 2016‑03‑09:
How they flipped a large introductory biostatistics course at Calgary.
- 2016‑03‑09:
conserver: serial console multiplexer and logger.
- 2016‑03‑09:
Freetserv: open-source hardware terminal server built around a Raspberry Pi.
- 2016‑03‑09:
ARIN DNSSEC outage 8th March 2016.
- 2016‑03‑09:
PDP-7 Unix in action.
- 2016‑03‑09:
New spaceship speed c/10 in Conway's Game of Life.
- 2016‑03‑09:
New small c/10 orthogonal spaceship discovered in Conway's Game of Life.
- 2016‑03‑09:
char-rnn: multi-layer recurrent neural networks for character-level language models.
- 2016‑03‑09:
Xterm and UTF-8 on OpenBSD.
- 2016‑03‑09:
Fast fully automated paper airplane gun.
- 2016‑03‑08:
The Nefertiti 3D scan heist is a hoax.
- 2016‑03‑08:
Power wastage on a Windows laptop.
- 2016‑03‑08:
Cloning performance optimization in Mercurial 3.6.
- 2016‑03‑08:
Google's internal controls strictly limit staff access to private user data.
- 2016‑03‑08:
Cyclops 𐙀 is a programming language written in Linear A.
- 2016‑03‑08:
There's something fishy about the surreptitious 3D scan of the Other Nefertiti.
- 2016‑03‑08:
A brief history of how America was sold toxic lead.
- 2016‑03‑07:
You can unlock a fingerprint-protected phone with an inkjet printer and conductive ink.
- 2016‑03‑07:
The possibility of secure non-secret digital encryption: James Ellis's GCHQ paper on public key crypto.
- 2016‑03‑07:
Silicon Valley Time: the predictable press narrative of a startup.
- 2016‑03‑07:
Summary of the December 2015 DDoS attack on the .tr TLD.
- 2016‑03‑07:
CHAOSNET address support in BIND: the DNS CLASS field is only for tecno necromancy?
- 2016‑03‑07:
Dragons with unusual hoards.
- 2016‑03‑07:
How to build stable systems.
- 2016‑03‑07:
The car century was a mistake. It's time to move on.
- 2016‑03‑07:
A differential approach to undefined behaviour detection.
- 2016‑03‑07:
abc: a compiler for the B programming language.
- 2016‑03‑05:
All New York city streets are not created equal.
- 2016‑03‑05:
Golang channels are bad.
- 2016‑03‑04:
Underground mathematics: A-level resources for exploring the connections that underpin maths.
- 2016‑03‑03:
Wintergatan Marble Machine. (YouTube)
- 2016‑03‑03:
Andrews Air Force Base EMSEC emissions security guide.
- 2016‑03‑03:
Funtenna: radio transmission from a cheap printer.
- 2016‑03‑03:
Analog and Digital TV (DVB-T) signal generation from a VGA card.
- 2016‑03‑03:
System Bus Radio transmits radio on computers without radio transmitting hardware.
- 2016‑03‑02:
HighwayHash is significantly faster than SipHash for all measured input sizes.
- 2016‑03‑02:
The unbearable asymmetry of bullshit.
- 2016‑03‑01:
The network industry is stuck in the 1980s: Cisco's embrace of complexity.
- 2016‑03‑01:
Attack of the week: DROWN.
- 2016‑03‑01:
The DROWN attack: using SSLv2 as a decryption oracle for snooped TLS traffic.
- 2016‑03‑01:
The wrong way to teach mathematics.
- 2016‑03‑01:
10 things to avoid in Docker containers.
- 2016‑03‑01:
Plan 9 on the Raspberry Pi.
- 2016‑03‑01:
rust-stm: Haskell-style software transactional memory for Rust.
- 2016‑02‑29:
Four pitfalls of A/B test hill climbing.
- 2016‑02‑29:
CloudFlare secure DNS registrar.
- 2016‑02‑29:
CVE-2015-7547: you can't prevent a glibc exploit by restricting DNS message size.
- 2016‑02‑29:
NTPsec: code review and cleanup of the NTP reference implementation.
- 2016‑02‑29:
ActorDB: a distributed SQL database.
- 2016‑02‑29:
PostgreSQL replication and Bucardo.
- 2016‑02‑29:
Bucardo: asynchronous PostgreSQL replication system.
- 2016‑02‑29:
Outlook 2016's new POP3 bug deletes your emails!
- 2016‑02‑29:
SSD reliability in the real world: Google's experience.
- 2016‑02‑28:
Towards an exploratory medium for mathematics.
- 2016‑02‑28:
A robot that can 3D print a bridge in mid-air.
- 2016‑02‑28:
Anatomy of a SQL index.
- 2016‑02‑28:
PostgreSQL indexes: first principles.
- 2016‑02‑28:
Doing mathematics differently: Leibniz, elegance, incompleteness, complexity.
- 2016‑02‑28:
Pentium? Core i5? Core i7? Making sense of Intel's convoluted CPU lineup.
- 2016‑02‑28:
Why maps are inaccurate in China.
- 2016‑02‑28:
MentalHealthError: an exception occurred.
- 2016‑02‑27:
rqlite: SQLite replicated with Raft consensus.
- 2016‑02‑27:
Some advantages of documentation driven development.
- 2016‑02‑27:
Sci-Hub as necessary, effective civil disobedience for Open Access.
- 2016‑02‑26:
DIY Dog: BrewDog's beer recipes published free online.
- 2016‑02‑25:
A report on the 26th Jan 2016 GPS glitch.
- 2016‑02‑25:
How does it feel to be a French person living in London?
- 2016‑02‑25:
Nissan LEAF vehicle remote control API is unauthenticated and completely open.
- 2016‑02‑24:
Hacking the Zsun WiFi SD card reader.
- 2016‑02‑24:
bind_exporter: stats collection from BIND to Prometheus.
- 2016‑02‑24:
GitLab 8.5 release notes.
- 2016‑02‑24:
Using Facebook's Infer static analyser to audit the Argon2 password hash competition winner.
- 2016‑02‑23:
Putting out the Twitter trashfire.
- 2016‑02‑23:
Neuro-hit or neuro-myth? What science has to say about education and the brain.
- 2016‑02‑23:
C compiler "optimizations" based on undefined behaviour can hurt performance.
- 2016‑02‑23:
What's next in computing?
- 2016‑02‑23:
Refurbishing a 1927 telephone operator switchboard.
- 2016‑02‑22:
A comparison of hard-state and soft-state signalling protocols.
- 2016‑02‑22:
Recursion: it is what it is (and nothing else).
- 2016‑02‑22:
Debugging a memory leak: why 2008-06-14 23:29:20 Z is HTTP time.
- 2016‑02‑22:
The update, the vent, and the disaster: on weekly 1:1 meetings.
- 2016‑02‑22:
Nonfiction writing advice.
- 2016‑02‑22:
WebKit's B3 JIT: a bare-bones backend to replace LLVM.
- 2016‑02‑22:
A computer-generated border treaty between Canada and Denmark.
- 2016‑02‑22:
SoftLayer uses network-wide IP address blocks to enforce US trade sanctions.
- 2016‑02‑22:
Lamdu: live, type-safe, effect-aware programming.
- 2016‑02‑22:
Modern makers are bringing back ham radio.
- 2016‑02‑22:
International free and open source software law book.
- 2016‑02‑22:
An iptables extension module for DNS filtering.
- 2016‑02‑21:
Umberto Eco's anti-library.
- 2016‑02‑21:
How undefined behaviour for signed integer overflow in C helps optimization in gcc.
- 2016‑02‑21:
Republishing a book when all you have is a book.
- 2016‑02‑21:
Artists covertly scanned the bust of Nefertiti and released the data free online.
- 2016‑02‑21:
Cheap Bluetooth buttons and Linux.
- 2016‑02‑21:
The joy and agony of Haskell in production.
- 2016‑02‑20:
Breaking homegrown crypto.
- 2016‑02‑20:
Early effects of Letsencrypt measured using data from Certificate Transparency logs.
- 2016‑02‑20:
A typographic analysis of Apple's San Francisco typeface.
- 2016‑02‑20:
555 timer teardown: inside the world's most popular IC.
- 2016‑02‑20:
Simple, safe multimethods in Racket.
- 2016‑02‑20:
CVE-2015-7547 glibc DNS bug: a skeleton key of unknown strength.
- 2016‑02‑20:
3Blue1Brown: animated mathematics.
- 2016‑02‑20:
Mandelbrot pertubation theory glitch improvement.
- 2016‑02‑20:
Superfractalthing maths: fast rendering of deep Mandelbrot zooms with much less multiprecision arithmetic.
- 2016‑02‑19:
How to make your text look futuristic.
- 2016‑02‑18:
Wikipedia's list of lists of lists.
- 2016‑02‑18:
Deny capabilities for safe, fast actors.
- 2016‑02‑18:
netbsd-libcurses ported to Linux / musl-libc.
- 2016‑02‑17:
jsbeeb: an in-browser BBC Micro emulator.
- 2016‑02‑17:
US/Israel malware attack against Iran went well beyond Stuxnet.
- 2016‑02‑17:
Dijkstra's set comprehension notation.
- 2016‑02‑17:
New warning options in gcc 6.
- 2016‑02‑17:
Stack Overflow architecture, 2016 edition.
- 2016‑02‑17:
How to safely store passwords in 2016.
- 2016‑02‑17:
Modern microprocessors: a 90 minute guide.
- 2016‑02‑17:
Against security nihilism.
- 2016‑02‑17:
Put down all behaviour hurtful to productive informality!
- 2016‑02‑17:
CharybdeFS: a failt-injecting FUSE filesystem for software testing.
- 2016‑02‑17:
Sparse integer sets: using uninitialized memory for fun and profit.
- 2016‑02‑16:
Getting clean the Tudor way.
- 2016‑02‑16:
Pascal's triangle and prime numbers.
- 2016‑02‑16:
The NSA's SKYNET drone warfare program may be killing thousands of innocent people based on metadata and bogus AI.
- 2016‑02‑16:
Ordnance Survey map of Mars.
- 2016‑02‑16:
Two Malthusian scares in the last 50 years.
- 2016‑02‑16:
trapperkeeper: ingest SNMP traps and hold them for use by stateful monitoring services.
- 2016‑02‑16:
China moves 10,000 people to make a radio-quiet region around FAST, the Five hundred metre Aperture Spherical radio Telescope.
- 2016‑02‑16:
New model of turbulence may explain heat loss in fusion reactors.
- 2016‑02‑15:
UK Environment Agency LIDAR open data allows archaeologisis to locate lost Roman roads.
- 2016‑02‑15:
Kotlin 1.0 released! A pragmatic language for the JVM and Android.
- 2016‑02‑15:
Carbon3D: continuous liquid interface production (CLIP) cures a photosensitive resin with a UV projector.
- 2016‑02‑14:
Australian birds may be deliberately spreading fire.
- 2016‑02‑14:
Diary of Anne Frank is still restricted by copyright in the USA.
- 2016‑02‑14:
Choose GitLab for your next open source project.
- 2016‑02‑14:
The discovery of Apache ZooKeeper's poison packet.
- 2016‑02‑14:
Linux containers virtual ethernet TCP checksum failure.
- 2016‑02‑13:
gertty: a command line interface to Gerrit code review.
- 2016‑02‑12:
So you want to write a package manager?
- 2016‑02‑12:
The cost of false positives.
- 2016‑02‑12:
Unicode emoji ZWJ sequences considered harmful.
- 2016‑02‑12:
Unicode emoji ZWJ (zero-width joiner) sequences.
- 2016‑02‑11:
der-ascii: a reversible ASN.1 pretty-printer.
- 2016‑02‑11:
HOW TO WRITE TELEGRAMS PROPERLY STOP
- 2016‑02‑11:
Design lessons from the amazing 1980s Usborne books that taught kids to code.
- 2016‑02‑11:
ESlint considers moving away from GitHub.
- 2016‑02‑11:
What you will learn from running an open source project.
- 2016‑02‑11:
Rustic coding tips.
- 2016‑02‑11:
Change the (S)Channel! Deconstructing a Microsoft TLS session resumption bug.
- 2016‑02‑11:
Redlock discussion.
- 2016‑02‑11:
A Pirate Bay for scientific papers.
- 2016‑02‑11:
Humans are the only animals with chins, and no-one knows why.
- 2016‑02‑11:
The Zen of Erlang.
- 2016‑02‑10:
Static and Ahead of Time (AOT) compiled Julia.
- 2016‑02‑10:
Advantages and disadvantages of various syslog alternatives.
- 2016‑02‑10:
Deadlock Empire: Slay dragons! Master concurrency!
- 2016‑02‑10:
HTTP response splitting vulnerability in node.js: root cause analysis.
- 2016‑02‑10:
Warner Music pays $14 million to end 'Happy Birthday' lawsuit, and agrees it is in the public domain.
- 2016‑02‑10:
Sourceforge has been acquired, and has stopped intentionally distributing malware.
- 2016‑02‑10:
Gender bias in open source: acceptance of GitHub pull requests by men and women.
- 2016‑02‑10:
The bitter rivalry behind the world's smallest chess program.
- 2016‑02‑10:
Is Redlock safe?
- 2016‑02‑09:
Twitter represents everything wrong with corporate America.
- 2016‑02‑09:
Not-so-secret atomic tests: Why the photographic film industry knew what the American public didn't.
- 2016‑02‑09:
Midori's error model.
- 2016‑02‑08:
A brief history of cheese.
- 2016‑02‑08:
Redlock: how (not) to do distributed locking.
- 2016‑02‑08:
Of mansplaining and mastectomies.
- 2016‑02‑08:
Colour blindness and network reliability.
- 2016‑02‑08:
A lambda is not (necessarily) a closure.
- 2016‑02‑08:
Junction: new concurrent hash maps for C++.
- 2016‑02‑08:
Let's remember Alexandre Dumas this Black History Month.
- 2016‑02‑08:
So you want to understand Hindley-Milner?
- 2016‑02‑07:
Usborne 1980s computer books free to download.
- 2016‑02‑07:
Mbox: a lightweight sandbox for any unprivileged user on commodity operating systems.
- 2016‑02‑07:
Diesel: a safe, extensible ORM and SQL query builder for Rust.
- 2016‑02‑07:
Frinkiac: The Simpsons screenshot search engine.
- 2016‑02‑07:
Hacking the battery DRM on a Lenovo laptop.
- 2016‑02‑06:
The myth of shared space.
- 2016‑02‑06:
How to fix over-complicated code based on the wrong abstraction.
- 2016‑02‑06:
Learn enough Git to be dangerous.
- 2016‑02‑06:
Recreating Aerodynamic by Daft Punk in Sonic Pi.
- 2016‑02‑06:
Faking Fissile Material: the underhanded C competition winner.
- 2016‑02‑06:
Zip files all the way down!
- 2016‑02‑06:
After 100 years, scientists are finally closing in on gravity waves.
- 2016‑02‑05:
"Woohoo!" email stokes rumor that gravitational waves have been spotted.
- 2016‑02‑05:
crontab guru.
- 2016‑02‑05:
155-year-old mouse trap claims its latest victim.
- 2016‑02‑05:
The keybase filesystem.
- 2016‑02‑05:
GCHQ's spam problem.
- 2016‑02‑05:
Great Fire: The grid system for London that never happened.
- 2016‑02‑05:
The Fitzwilliam Museum is 200 today!
- 2016‑02‑05:
French spelling reform says «oignon» is now «ognon».
- 2016‑02‑04:
Chipophone: a homemade 8-bit synthesizer built into an old electric organ.
- 2016‑02‑04:
Report on the k-root DNS traffic flood on 30 Nov - 1 Dec 2015.
- 2016‑02‑03:
Postmortem of GitHub's outage on 28th Jan.
- 2016‑02‑03:
The spreading plague of ghastly façadism.
- 2016‑02‑03:
Snowden intelligence docs reveal UK spooks' malware checklist.
- 2016‑02‑03:
A review of the Julia programming language.
- 2016‑02‑03:
GPS glitch broke DAB digital radio broadcasts in the UK.
- 2016‑02‑03:
AnywhereUSB: network-attached USB-over-IP hub.
- 2016‑02‑03:
Airconsole: serial console adaptors.
- 2016‑02‑03:
DNS at FOSDEM.
- 2016‑02‑02:
6 lessons to forget before you start learning to code.
- 2016‑02‑02:
Octopus stinkhorn: cthuloid horror fungus.
- 2016‑02‑02:
A 15 hour spatial reasoning course boosts retention of women in undergrad engineering by 20%-30%.
- 2016‑02‑02:
Where is the borderline between adopting slang and cultural appropriation?
- 2016‑02‑02:
CERT VU#714121 incorrect NXDOMAIN responses from AAAA queries could cause denial-of-service.
- 2016‑02‑01:
The renewables revolution is now unstoppable.
- 2016‑02‑01:
A brief history of markup languages.
- 2016‑02‑01:
Matrix.org FAQ: open decentralized instant messaging / pub-sub over http+json.
- 2016‑02‑01:
GPS glitch caused outages, and fuels arguments for a backup service.
- 2016‑02‑01:
A history of grep.
- 2016‑02‑01:
Comparison of C/POSIX standard library implementations for Linux.
- 2016‑01‑31:
Map of building ages around the UK.
- 2016‑01‑31:
18F CSS style guide.
- 2016‑01‑31:
The twelve days of crisis: a retrospective on Linode's holiday DDoS attacks.
- 2016‑01‑30:
The automation paradox: computerizing jobs often increases the need for human employees.
- 2016‑01‑30:
The design of a modern cache.
- 2016‑01‑30:
Rethinking weight loss and the reasons we're 'Always Hungry'.
- 2016‑01‑30:
Schema evolution in Avro, Protocol Buffers and Thrift.
- 2016‑01‑29:
Pssst! Your PGP is leaking metadata.
- 2016‑01‑29:
There's wifi in the only place in the USA where wifi is forbidden.
- 2016‑01‑29:
Code from Kernighan & Pike, The Practice of Programming. (with Markov programs)
- 2016‑01‑29:
Scientists open the 'black box' of schizophrenia with dramatic genetic discovery.
- 2016‑01‑29:
McCullough effect: visual after-effects that can last months.
- 2016‑01‑29:
Panama disease will kill the Cavendish banana like it did the Gros Michel.
- 2016‑01‑29:
USA rejects better font for highway signs.
- 2016‑01‑28:
Typesetting mathematics according to the ISO standard.
- 2016‑01‑28:
RabbitMQ internals.
- 2016‑01‑28:
ENTRADA: .nl's Hadoop platform for analyzing DNS traffic.
- 2016‑01‑28:
IETF documents describing the future RFC format.
- 2016‑01‑28:
Glittering Blue.
- 2016‑01‑27:
AlphaGo: mastering the game of Go with machine learning.
- 2016‑01‑27:
Why the calorie is broken.
- 2016‑01‑27:
The rising sophistication of network scanning: how to discover and probe unpublished random IPv6 addresses.
- 2016‑01‑26:
UK rail travel station usage map, 1997-2015.
- 2016‑01‑26:
Why Lancaster's main electrical substation is near the river.
- 2016‑01‑26:
What happens when there is a lengthy power cut in a modern city.
- 2016‑01‑26:
Cxx.jl: Julia C++ ffi.
- 2016‑01‑26:
Irish postcodes.
- 2016‑01‑26:
Michael Lewis: the sourge of Wall Street.
- 2016‑01‑25:
A DIY electronic bee counter.
- 2016‑01‑25:
Godwin's law of Hitler comparisons helps prod glib online rhetoric into something more thoughtful.
- 2016‑01‑25:
The creator of Mercurial is winding down from leading the project.
- 2016‑01‑25:
Why the Web beat Gopher in the battle for protocol mindshare.
- 2016‑01‑25:
Herbie: rewrite arithmetic expressions to minimize floating-point precision errors.
- 2016‑01‑24:
How Target's Canadian expansion failed.
- 2016‑01‑24:
Counting legal positions in the game of Go.
- 2016‑01‑24:
Statesman or skatesman?
- 2016‑01‑23:
Unikernels are unfit for production.
- 2016‑01‑23:
Institutionally constrained technology adoption: why England's enemies didn't copy the longbow.
- 2016‑01‑22:
The most metal \m/ deaths in Middle Earth, ranked.
- 2016‑01‑22:
How do bank payments actually work in the UK?
- 2016‑01‑22:
So you're learning OCaml...
- 2016‑01‑22:
6 quick ways to spot fake news.
- 2016‑01‑22:
TinEye reverse image search.
- 2016‑01‑22:
So you have a a Git mess on your hands...
- 2016‑01‑20:
Building John Harrison's impossibly accurate pendulum clock.
- 2016‑01‑20:
Efficient optional blocking of advertising domains in PowerDNS Recursor 4.0.0.
- 2016‑01‑19:
Unboxed values in Guile.
- 2016‑01‑19:
Rethinking John Wanamaker in the age of adtech and adblockers.
- 2016‑01‑17:
Raspberry Pi bare metal hello world in Rust.
- 2016‑01‑17:
How many times can I re-use deep frying oil?
- 2016‑01‑17:
Tranquility: nighttime light adjustment for Mac OS X.
- 2016‑01‑16:
Christoph Laimer's 3D printed tourbillon pocket watch.
- 2016‑01‑15:
So you think you can program an elevator.
- 2016‑01‑15:
Elevator Saga: the elevator programming game.
- 2016‑01‑15:
Ansible 2.0 porting guide.
- 2016‑01‑15:
ShellCheck: a static analysis tool for shell scripts.
- 2016‑01‑15:
How a fraudster used the prison library to expose the Stingray cell-site simulator secret.
- 2016‑01‑15:
How to write a version check. (How to be compatible with Python 4!)
- 2016‑01‑15:
Adding a complete C++ FFI to a language basically means embedding a complete C++ compiler.
- 2016‑01‑14:
Why are Pluto and Charon so different?
- 2016‑01‑14:
Fast regex matching in Rust using Aho-Corasick.
- 2016‑01‑13:
Towards an understanding of technical debt.
- 2016‑01‑12:
Ingrid Burrington's article series about Internet infrastructure.
- 2016‑01‑12:
The true meaning of "turn the other cheek".
- 2016‑01‑12:
It's time for Europe to turn the tables on bullying Britain.
- 2016‑01‑12:
An interview with the author of The Global Transformation of Time.
- 2016‑01‑12:
Introducing optical lattice clocks; more precise than caesium fountain atomic clocks.
- 2016‑01‑12:
A brief history of modern timekeeping.
- 2016‑01‑12:
Europol makes arrests in "DD4BC" DDoS for Bitcoin extortion case.
- 2016‑01‑11:
Allegro: a game programming library.
- 2016‑01‑11:
Blynk is a platform with iOS and Android apps to control your own IoT devices.
- 2016‑01‑11:
In 2015, the dark forces of the Internet became a counterculture.
- 2016‑01‑10:
Fast multi-thread event-driven socket servers.
- 2016‑01‑09:
Another Maunder Minimum starting in the 2030s?
- 2016‑01‑09:
Curtin University meteorite discovery could hold clues to solar system creation.
- 2016‑01‑09:
Britain, immigration, and brexit.
- 2016‑01‑09:
How to cultivate the art of serendipity.
- 2016‑01‑09:
dumb-init: PID 1 for Docker containers.
- 2016‑01‑08:
FreeBSD jails the hard way.
- 2016‑01‑08:
Raspberry Pi Zero USB gadget mode.
- 2016‑01‑06:
PCIe non-volatile storage: implications of the performance of storage-class memory.
- 2016‑01‑06:
rumps: ridiculously uncomplicated Mac OS X Python status bar apps.
- 2016‑01‑06:
AnyBar: display a modifiable coloured dot in the Mac OS X menu bar.
- 2016‑01‑06:
BitBar: put the output of a program in the Mac OS X menu bar.
- 2016‑01‑05:
Freezing water drops. (YouTube)
- 2016‑01‑05:
Open journals that piggyback on arXiv gather momentum.
- 2016‑01‑05:
Galloping Gertie: the struggle to understand the strange, spectacular collapse of the Tacoma Narrows bridge.
- 2016‑01‑05:
Kart: key alteration for radix tries.
- 2016‑01‑04:
FreeRouter: a routing daemon written in Java.
- 2016‑01‑04:
Stories about compiler optimization on the PDP11 and VAX.
- 2016‑01‑03:
Using flame graphs to find why your code is blocking on Linux.
- 2016‑01‑03:
GPU text rendering with vector textures.
- 2016‑01‑03:
github-backup: keep you own copy of data on GitHub.
- 2016‑01‑03:
52 concepts for your cognitive toolkit.
- 2016‑01‑03:
End-of-buffer checks in decompressors: relaxing an invariant and milking it for all it's worth.
- 2016‑01‑02:
A brief history of generative models for power-law and lognormal distributions.
- 2016‑01‑02:
CPython development will move to GitHub.
- 2016‑01‑02:
Why Facebook won, and other hard truths about blogging.
- 2015‑12‑31:
Introducing Guesstimate, a spreadsheet for things that aren't certain.
- 2015‑12‑31:
pgcli: a REPL for PostgreSQL.
- 2015‑12‑31:
pgweb: web-based PostgreSQL database browser written in Golang.
- 2015‑12‑31:
DBeaver: universal database manager.
- 2015‑12‑31:
pgAdmin: PostgreSQL administration and management tools.
- 2015‑12‑31:
SQL Tabs: rich Postgres console.
- 2015‑12‑30:
The open source software developers who helped end the Ebola epidemic in Sierra Leone.
- 2015‑12‑30:
Conceptual debt is worse than technical debt.
- 2015‑12‑30:
The missing 11th of the month.
- 2015‑12‑29:
Guide to awesome Mac OS X command line tools.
- 2015‑12‑29:
Miami is flooding. (Not just Miami.)
- 2015‑12‑29:
DLL hijacking just won't die.
- 2015‑12‑29:
The Grammar of Graphics. (free edition)
- 2015‑12‑29:
OLEOutlook: bypass executable email attachment checks.
- 2015‑12‑28:
The Feynman lectures on physics, free online.
- 2015‑12‑27:
Discussion of the 0th Edition Unix manual.
- 2015‑12‑27:
Unix 0th edition manual / technical report.
- 2015‑12‑27:
printbf: brainfuck translated to printf format strings.
- 2015‑12‑27:
Raspberry Pi vs SPARCstation 20.
- 2015‑12‑25:
The weirdest natural languages.
- 2015‑12‑25:
Normalization of deviance.
- 2015‑12‑25:
Debunking the periodic table showing incorrect "relative abundance" of elements on Earth.
- 2015‑12‑25:
Direct left-recursive parsing expression grammars. (PEGs)
- 2015‑12‑25:
Open letter to Mozilla: bring back Persona.
- 2015‑12‑25:
VisUAL: an ARM emulator for teaching assembly language programming.
- 2015‑12‑24:
A warm and sunny Christmas to all.
- 2015‑12‑24:
The problem with Friendly C.
- 2015‑12‑23:
Why spinlocks are bad on iOS and Mac OS X.
- 2015‑12‑23:
Rayon: safe data parallelism in Rust.
- 2015‑12‑23:
libsnark: succinct zero-knowledge proofs.
- 2015‑12‑23:
A proposal for a secure stateless laptop.
- 2015‑12‑23:
RK808 clock has 31 days in November.
- 2015‑12‑23:
Andrea Rossi E-cat scam.
- 2015‑12‑23:
Why do scientists dismiss the possibility of cold fusion?
- 2015‑12‑23:
Subtleties of the C standard.
- 2015‑12‑23:
The encryption/terrorism delusion.
- 2015‑12‑22:
Quantum cryptography can be broken with ordinary light.
- 2015‑12‑22:
African countries are planting a great green wall to beat back the Sahara desert.
- 2015‑12‑22:
Background on the SpaceX Falcon 9 launch and landing.
- 2015‑12‑22:
On the Juniper crypto backdoor.
- 2015‑12‑22:
boringcc: a proposal for a C compiler without undefined behaviour.
- 2015‑12‑22:
There should be a customary semantics of C.
- 2015‑12‑21:
Two swans come and ask to be disentangled. (YouTube)
- 2015‑12‑21:
Untethered lowRISC: getting closer to a free system-on-chip.
- 2015‑12‑21:
What it's like to be Noam Chomsky's assistant.
- 2015‑12‑21:
Safe native code in Midori (a Microsoft research operating system).
- 2015‑12‑21:
RIPE DNSSEC algorithm roll-over.
- 2015‑12‑21:
Juniper ScreenOS ssh backdoor.
- 2015‑12‑21:
Deadly sins of project estimation.
- 2015‑12‑21:
The Iraqi who saved Norway from oil.
- 2015‑12‑21:
Waterstone's is thriving.
- 2015‑12‑20:
Postgres BDR: bi-directional asynchronous multi-master replication.
- 2015‑12‑20:
Emacs fireplace.
- 2015‑12‑20:
Mac OS X system font patcher.
- 2015‑12‑20:
The long, incredibly tortuous, and fascinating process of creating a Chinese font.
- 2015‑12‑20:
Juniper: a government backdoor gone rogue?
- 2015‑12‑19:
Xen XSA 155: hidden double fetches in C switch() cause vulnerabilities in virtual devices.
- 2015‑12‑18:
Open source IP address management software.
- 2015‑12‑18:
Varnish replaced by Nginx at the BBC.
- 2015‑12‑17:
Verign's perspective on the recent root DNS server DDoS attacks.
- 2015‑12‑17:
IETF mailing lists are a spam magnet.
- 2015‑12‑17:
George Hotz made a self-driving car by himself.
- 2015‑12‑16:
The call of the sad whelkfins: the continued relevance of How To Suppress Women's Writing.
- 2015‑12‑16:
On the reception and detection of pseudo-profound bullshit.
- 2015‑12‑16:
How they replaced GitHub's merge feature.
- 2015‑12‑16:
Generating good syntax errors with bison using examples.
- 2015‑12‑15:
A British astronaut FAQ.
- 2015‑12‑15:
Draft Investigatory Powers bill factsheets.
- 2015‑12‑15:
Secure private collaboration tools we need but do not have.
- 2015‑12‑15:
Voight-Kampff empathy test 2015.
- 2015‑12‑15:
Very fast reservoir sampling.
- 2015‑12‑14:
Leslie Lamport on computer science and state machines.
- 2015‑12‑14:
Dave Prosser's standard C preprocessing algorithm.
- 2015‑12‑14:
In the 1700s books looked like smartphone screens.
- 2015‑12‑14:
Gaffer: GCHQ's large-scale graph database optimised for retrieving data on nodes of interest.
- 2015‑12‑14:
git appraise: distributed code review.
- 2015‑12‑14:
Why I don't use my campus email address.
- 2015‑12‑14:
Lego difference engine.
- 2015‑12‑14:
Skrot: customizable compression for short strings.
- 2015‑12‑14:
Root DNS server operators: diversity is the key.
- 2015‑12‑13:
Top 10 DTrace scripts for Mac OS X.
- 2015‑12‑13:
Filesystem reliability is hard.
- 2015‑12‑13:
Cephalopod GIFs.
- 2015‑12‑13:
Many outstanding interactive maps of 2015.
- 2015‑12‑13:
TimeToAnywhere: travel time maps.
- 2015‑12‑12:
A Zulu and Xhosa negotiation tactic brought the Paris climate-change summit to consensus.
- 2015‑12‑12:
UK IPO says digital copies of public domain works are also public domain.
- 2015‑12‑12:
Help! My sin() is slow and my FPU is inaccurate!
- 2015‑12‑12:
earth: a global multi-projection map of wind, weather, and ocean conditions.
- 2015‑12‑11:
A philosophy of science book reading list.
- 2015‑12‑11:
Placebo effects are weak: regression to the mean is the main reason ineffective treatments appear to work.
- 2015‑12‑11:
What got us into the SHA1 deprecation mess.
- 2015‑12‑11:
Seymour Cray and the development of supercomputers.
- 2015‑12‑11:
DNS censorship as seen by RIPE Atlas probes.
- 2015‑12‑11:
Ada Lovelace 200!
- 2015‑12‑10:
How to pronounce hexadecimal.
- 2015‑12‑10:
First plasma in Wendelstein 7-X.
- 2015‑12‑10:
OpenFastPath: user-space TCP/IP stack.
- 2015‑12‑09:
Boxing clever: Crossrail at Paddington.
- 2015‑12‑09:
Gender bias simulator.
- 2015‑12‑09:
$1bn bullion shipwreck caught in three-way court battle.
- 2015‑12‑09:
Theremin's bug: how the Soviet Union spied on the US Embassy for 7 years.
- 2015‑12‑08:
The juggling font.
- 2015‑12‑08:
ISC Kea DHCP server to be released under Mozilla Public Licence.
- 2015‑12‑08:
How a buggy Hitler-obsessed Soviet AI nearly caused World War III in the 1980s.
- 2015‑12‑08:
Root DNS server query floods on 2015-11-30 and 2015-12-01.
- 2015‑12‑08:
The moral character of cryptographic work.
- 2015‑12‑08:
Volunteers aid pioneering Edsac computer rebuild.
- 2015‑12‑08:
Choosing an HTTP status code.
- 2015‑12‑06:
Letsencrypt stats.
- 2015‑12‑06:
The quantum source of space-time.
- 2015‑12‑05:
England's immigrants 1330 - 1550.
- 2015‑12‑05:
caddy: a simple web server with automatic letsencrypt TLS provisioning.
- 2015‑12‑05:
acme-tiny: minimal letsencrypt client.
- 2015‑12‑05:
Get HTTPS for free! Browser-based letsencrypt client.
- 2015‑12‑05:
simp_le: simple letsencrypt client.
- 2015‑12‑04:
The Turkey City lexicon of sf tropes.
- 2015‑12‑04:
Access denied: disintermediation is changing journalism.
- 2015‑12‑04:
Dooring alert systems.
- 2015‑12‑04:
Fuzzing math: miscalculations in OpenSSL BN_mod_exp. (CVE-2015-3193)
- 2015‑12‑04:
The oncoming train of enterprise container deployments.
- 2015‑12‑04:
Visual gate-level simulation of the ARM1.
- 2015‑12‑04:
Raspberry Pi A and Pi Zero USB OTG gadget mode - discussion and links to bug reports.
- 2015‑12‑03:
Developing and benchmarking Python HDBSCAN against the reference implementation in Java.
- 2015‑12‑02:
The CMU/FBI deanonymization attack on Tor.
- 2015‑12‑02:
Economists tested 7 welfare programs to see if they made people lazy. They didn't.
- 2015‑12‑01:
kcc: an executable formal semantics of C.
- 2015‑12‑01:
The C standard formalized in Coq.
- 2015‑12‑01:
Hammerspoon: script Mac OS X with Lua.
- 2015‑12‑01:
Notmuch, just an email system.
- 2015‑11‑30:
Chris Hadfield and Randall Munroe in conversation.
- 2015‑11‑30:
Earth impact database.
- 2015‑11‑30:
Contributor Covenant: a code of conduct for open source projects.
- 2015‑11‑30:
Inclusiveness and hacker culture.
- 2015‑11‑28:
FlexSC: flexible system call scheduling with exception-less system calls.
- 2015‑11‑28:
A retrospective on Butler Lampson's 1999 views on what has worked in computer science.
- 2015‑11‑28:
DRAM rowbuffer side channel attacks.
- 2015‑11‑28:
Stalk anyone on Telegram.
- 2015‑11‑27:
Jagubox A/UX software archive.
- 2015‑11‑27:
Shoebill: a Macintosh II emulator that runs A/UX.
- 2015‑11‑27:
How not to execute a trillion lines of PHP when launching the $5 Raspberry Pi Zero.
- 2015‑11‑27:
Raspberry Pi USB driver probably broken in OTG device mode.
- 2015‑11‑27:
Raspberry Pi Linux kernel forces USB OTG host mode.
- 2015‑11‑27:
40 Linux-friendly hacker SBCs. (December 2014)
- 2015‑11‑27:
Haute circuits: Boldport shows off jewellery with custom PCBs.
- 2015‑11‑27:
House of keys: industry-wide private key reuse endangers millions of devices worldwide.
- 2015‑11‑27:
Raspberry Pi boot from USB.
- 2015‑11‑27:
Fun and games with the Videocore IV quad processor units.
- 2015‑11‑27:
vc4asm: macro assembler for Broadcom VideoCore IV.
- 2015‑11‑26:
Testing the IPv4 evil bit.
- 2015‑11‑26:
Magspoof: contactless magstripe emulator.
- 2015‑11‑26:
Macbook charger teardown.
- 2015‑11‑24:
What can a technologist do about climate change?
- 2015‑11‑24:
Maxwell's equations: 150 years of light.
- 2015‑11‑24:
What is HPKP for?
- 2015‑11‑23:
On Proebsting's law: compilers double the performance of generated code every 18 years.
- 2015‑11‑23:
Leapsecond announcements via DNS.
- 2015‑11‑22:
The CA's role in fighting phishing and malware.
- 2015‑11‑20:
Forget paleo, go mid-Victorian: it's the healthiest diet you've never heard of.
- 2015‑11‑19:
Even the LastPass will be stolen.
- 2015‑11‑19:
On APIs: Cars, not assembly lines.
- 2015‑11‑19:
Engineers are much more likely to become fundamentalist terrorists.
- 2015‑11‑19:
The earliest known abecedary.
- 2015‑11‑19:
Trackography: who's tracking what you're reading online?
- 2015‑11‑18:
Array layouts for comparison-based searching.
- 2015‑11‑18:
Cache-friendly binary search.
- 2015‑11‑17:
How C-Reduce uses unifdef to help pin down compiler bugs.
- 2015‑11‑17:
Anne Frank foundation upsets Anne Frank museum by trying to prevent her diary entering the public domain.
- 2015‑11‑17:
The advertising bubble.
- 2015‑11‑16:
We need less powerful programming languages.
- 2015‑11‑16:
nom 1.0 is here! A parser combinator library for Rust.
- 2015‑11‑16:
More privacy, less latency: improved handshakes in TLS-1.3.
- 2015‑11‑16:
English is weirdly different from other languages.
- 2015‑11‑13:
The design philosophy of the DARPA Internet protocols.
- 2015‑11‑13:
Innovative features of Hypothesis property-based testing.
- 2015‑11‑13:
Introducing theft: property-based testing for C.
- 2015‑11‑13:
Anecdotes vs property-based testing.
- 2015‑11‑13:
A quasipolynomial-time algorithm for graph isomorphism.
- 2015‑11‑13:
SoftEther VPN, with IP-over-ICMP and IP-over-DNS.
- 2015‑11‑13:
Google Maps lite mode.
- 2015‑11‑12:
How the western diet has damaged our gut microflora.
- 2015‑11‑12:
Alarm design: From nuclear power to WebOps.
- 2015‑11‑12:
A history of sugar - the food nobody needs, but everyone craves.
- 2015‑11‑12:
SerializeKiller: scan a lot of servers for the Java deserialization vulnerability.
- 2015‑11‑12:
Fossil fuel failures are driving the UK towards power blackouts.
- 2015‑11‑11:
Malicious LuaJIT bytecode.
- 2015‑11‑11:
eM Client: mail and calendaring software for Windows.
- 2015‑11‑10:
Which language has the brightest potential as a replacement for C and why?
- 2015‑11‑10:
A big result on graph isomorphism: reduced from exponential to quasipolynomial time.
- 2015‑11‑10:
Investigatory powers bill: the juicy bits.
- 2015‑11‑10:
Viral sheet music: the creative notation of John Stump and others.
- 2015‑11‑10:
Window-TinyLFU cache replacement policy.
- 2015‑11‑09:
Software configuration management and revision control security.
- 2015‑11‑09:
PowerDNS security status polling.
- 2015‑11‑09:
How computers broke science and how we can fix it.
- 2015‑11‑09:
Embracing Conway's law.
- 2015‑11‑09:
3D-printed digital sundial.
- 2015‑11‑09:
tz maps: a set of shapefiles for the Olson timezone database.
- 2015‑11‑09:
iOS 9 security features from the hacker point of view.
- 2015‑11‑09:
Translating gender: Ancillary Justice in five languages.
- 2015‑11‑08:
1729: Ramanujan surprises again.
- 2015‑11‑08:
Obesogens.
- 2015‑11‑07:
The triumph of the UK surveillance state.
- 2015‑11‑07:
What do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and your application have in common? This vulnerability.
- 2015‑11‑07:
Opaleye's sugar on top: SQL in the type system where it belongs. (Haskell)
- 2015‑11‑07:
The best way to learn math is to learn how to fail productively.
- 2015‑11‑06:
Password security: past, present, future.
- 2015‑11‑06:
How could Volkswagen's top engineers not have known?
- 2015‑11‑06:
First thoughts on the draft Investigatory Powers Bill.
- 2015‑11‑05:
Smoothing data with Julia's @generated functions.
- 2015‑11‑05:
Characterizing people as non-linear, first-order components in software development.
- 2015‑11‑04:
A few billion lines of code later: Coverity uses static analysis to find bugs.
- 2015‑11‑04:
Ireland to 'decriminalise' small amounts of drugs, including heroin, cocaine and cannabis, for personal use.
- 2015‑11‑04:
Universal Basic Income as the Social Vaccine of the 21st Century.
- 2015‑11‑04:
Cycling and the Dutch: an ever-growing love affair.
- 2015‑11‑04:
Entire editorial staff of Elsevier journal Lingua resigns over its high price and lack of open access.
- 2015‑11‑04:
The road to 2 million websocket connections in Phoenix.
- 2015‑11‑04:
Helping students overcome command-line bullshittery.
- 2015‑11‑03:
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication.
- 2015‑11‑03:
New ISPs getting off the ground without IPv4?
- 2015‑11‑03:
Software is made of decisions.
- 2015‑11‑02:
An architectural overview of QNX.
- 2015‑11‑02:
Back to the futu-rr-e: deterministic debugging with rr.
- 2015‑11‑02:
No need for black chambers: testing TLS in the e-mail ecosystem at large.
- 2015‑11‑02:
Human computation: algorithmic upper bounds and complexity theoretic lower bounds for calculating in your head. (video)
- 2015‑11‑02:
Structural and semantic deficiencies in the systemd architecture.
- 2015‑11‑01:
Coffee reduces the risk of some cancers.
- 2015‑11‑01:
The art of picking Intel registers.
- 2015‑11‑01:
SF's Hugo Awards and the battle for pop culture's soul.
- 2015‑10‑31:
Three quarters of cars stolen in France 'electronically hacked'.
- 2015‑10‑31:
Clifford's device.
- 2015‑10‑31:
Qflow: open source digital circuit synthesis tool suite.
- 2015‑10‑31:
Project IceStorm open source FPGA synthesis.
- 2015‑10‑30:
Understanding silicon circuits: inside the ubiquitous 741 op amp.
- 2015‑10‑30:
You advocate a ________ approach to calendar reform...
- 2015‑10‑30:
So you want to abolish time zones?
- 2015‑10‑29:
PostgreSQL on the command line.
- 2015‑10‑29:
Network link conditioner: simulate low bandwidth / high delay networks on Mac OS X.
- 2015‑10‑28:
Google punishes Symantec for generating 2622 naughty test X.509 certificates.
- 2015‑10‑28:
Wendelstein 7-X stellarator: €1 billion German fusion experiment.
- 2015‑10‑28:
Evil maid attacks: leaving laptops in hotel rooms is a bad idea.
- 2015‑10‑28:
letsencrypt-nosudo: python script to walk through the ACME protocol without root privilege.
- 2015‑10‑28:
Britain is heading for another crash like 2008.
- 2015‑10‑28:
Neither snow nor rain nor MITM... an empirical analysis of email delivery security.
- 2015‑10‑27:
A short guide to Linux kernel debugging.
- 2015‑10‑27:
Contractors fined for data centre electrocution death in London.
- 2015‑10‑27:
Intel x86 considered harmful / untrustworthy.
- 2015‑10‑27:
Berlin Fernsehturm Sonnenuhr.
- 2015‑10‑26:
MAGIC: malicious aging in circuits/cores. Software acceleration of hardware failure.
- 2015‑10‑26:
Using genetically optimized AIs to find gameplay flaws in strategy games.
- 2015‑10‑26:
Escape from Mercator.
- 2015‑10‑26:
Command-line control of the Mac OS X application layer firewall.
- 2015‑10‑26:
vim insertion is quadratic.
- 2015‑10‑26:
primesieve: fast prime number generator for numbers up to 2^64.
- 2015‑10‑26:
How much can your computer do in a second?
- 2015‑10‑26:
Benchmarking a 1986 Mac Plus vs a 2007 dual core PC.
- 2015‑10‑25:
Swarm v. Fleet v. Kubernetes v. Mesos.
- 2015‑10‑25:
zxcvbn: password strength estimator.
- 2015‑10‑22:
MiNID: miniature programmable network interface device in an SFP sleeve.
- 2015‑10‑22:
Graph of memory prices decreasing with time.
- 2015‑10‑21:
Hell of a handshake: abusing TCP for reflective amplification DDoS attacks.
- 2015‑10‑20:
hyperscan: high performance multiple regex matching library for deep packet inspection.
- 2015‑10‑20:
Just a brown hand.
- 2015‑10‑20:
Mythryl status update.
- 2015‑10‑20:
Some notes on BoringSSL.
- 2015‑10‑20:
GDM: git dependency manager.
- 2015‑10‑19:
All your modem are belong to us. (Radio DSP in GNU Octave.)
- 2015‑10‑19:
iOS apps caught using private APIs.
- 2015‑10‑18:
Fixing the core memory in a vintage IBM 1401 mainframe.
- 2015‑10‑17:
The magic resampling kernel.
- 2015‑10‑17:
66% of VPN's do not in fact have weak DH parameters.
- 2015‑10‑17:
Mapping FinFisher's continuing proliferation.
- 2015‑10‑16:
DavMail: proxy standard protocols to Exchange.
- 2015‑10‑16:
What we know about spreadsheet errors.
- 2015‑10‑16:
Atul Gawande on the checklist. (2007)
- 2015‑10‑16:
Benchmarking CRC32 and PopCnt instructions.
- 2015‑10‑15:
Advanced R.
- 2015‑10‑15:
R vs Python head-to-head for data analysis.
- 2015‑10‑14:
BeagleBoard X15 preview.
- 2015‑10‑14:
dn42: a big VPN for learning BGP and other networking technology.
- 2015‑10‑14:
NetApp wins $1.4M costs from patent troll Acacia.
- 2015‑10‑14:
Discrepancies in new definition of the kilogram resolved at last.
- 2015‑10‑14:
LIDAR map of England.
- 2015‑10‑13:
Environment Agency LIDAR survey of England available as open data.
- 2015‑10‑13:
Six myths of product (and software) development.
- 2015‑10‑13:
Benchmarking radix tree / crit-bit trie / red-black tree / qp trie.
- 2015‑10‑13:
Distribution of English letters towards the beginning, middle, and end of words.
- 2015‑10‑12:
Internet-wide scan data repository.
- 2015‑10‑12:
Majestic Million list of top web sites.
- 2015‑10‑12:
Billionaires don't drive economic growth, and crony billionaires strangle it.
- 2015‑10‑11:
Python, wat?!
- 2015‑10‑10:
Bugzilla CVE-2015-4499: MySQL truncation allows email address spoofing.
- 2015‑10‑10:
Britain's missing voters: effect of changes to electoral registration.
- 2015‑10‑10:
Beware the builtins: bad bit-banging by gcc.
- 2015‑10‑09:
Fuzzing Raft for fun and publication.
- 2015‑10‑09:
Gene patents probably dead worldwide following Australian court decision.
- 2015‑10‑09:
The Honeywell Heat Generator enhanced central heating systems with a pot of mercury.
- 2015‑10‑08:
DP World London Gateway: Inside the megaport you didn't know existed.
- 2015‑10‑08:
Everything you did not want to know about Unicode in Python 3.
- 2015‑10‑08:
Parallelism, concurrency, and asynchrony in Perl 6.
- 2015‑10‑08:
The shappening: freestart collisions for SHA-1.
- 2015‑10‑08:
Why Intel added cache partitioning.
- 2015‑10‑07:
Read-log-update: a lightweight synchronization mechanism for concurrent programming.
- 2015‑10‑06:
James Bond illustrates Perl 6 macros.
- 2015‑10‑06:
In defense of X.509 client certificates.
- 2015‑10‑06:
UK IPv6 Council meeting September 2015.
- 2015‑10‑06:
Handy tips on getting info about FTTC DSL out of BT.
- 2015‑10‑05:
Deckard: a DNS software test harness.
- 2015‑10‑05:
Has the routability of prefixes longer than /24 changed?
- 2015‑10‑05:
Introduction to content-addressable memory.
- 2015‑10‑05:
Tagged pointers in Rust.
- 2015‑10‑04:
Watch uranium emit radiation.
- 2015‑10‑04:
Bill Nye's solar noon clock at Cornell.
- 2015‑10‑04:
A new map of the differences between standard time and mean solar time.
- 2015‑10‑04:
Rust's type system is accidentally Turing complete.
- 2015‑10‑04:
FRACTRAN.
- 2015‑10‑04:
Surprisingly Turing complete.
- 2015‑10‑03:
Matters Computational: bit twiddling hacks and other cunning algorithms.
- 2015‑10‑03:
FLIF: free lossless image format.
- 2015‑10‑01:
Knot DNS Recursive goes beta.
- 2015‑09‑30:
Engineering effectiveness at Twitter: let 1000 flowers bloom, then rip 999 out by the roots.
- 2015‑09‑29:
Particle.io: prototyping tools for the internet of things.
- 2015‑09‑29:
Error Prone: Java static analyser.
- 2015‑09‑28:
How different team topologies influence devops culture.
- 2015‑09‑28:
Modernizing the BSD networking stack.
- 2015‑09‑27:
Is there a CAP theorem for durability?
- 2015‑09‑27:
Running Rust on the Rumprun unikernel.
- 2015‑09‑27:
Lazy Redis is better Redis.
- 2015‑09‑26:
The inside story behind MS08-067.
- 2015‑09‑25:
Vannevar Bush: as we may think. (with annotations by Doug Engelbart)
- 2015‑09‑25:
Ted Nelson: computer lib / dream machine.
- 2015‑09‑24:
Ams-IX traffic passes 4Tbit/sec.
- 2015‑09‑24:
A new universal caption for New Yorker cartoons.
- 2015‑09‑24:
Amazon AWS DynamoDB service disruption postmortem.
- 2015‑09‑24:
Uber uses customer phones as their primary data store.
- 2015‑09‑24:
What really went wrong at Addenbrooke's hospital.
- 2015‑09‑24:
Duktape: small embeddable JavaScript interpreter.
- 2015‑09‑23:
nginScript: a JavaScript subset for scripting nginx.
- 2015‑09‑23:
What shape is the internet? (according to diagrams in patents.)
- 2015‑09‑23:
What happens next will amaze you: adtech vs adblock.
- 2015‑09‑23:
ScyllaDB: fast C++ NoSQL column store database replacement for Apache Cassandra.
- 2015‑09‑22:
Counting objects efficiently in Git.
- 2015‑09‑22:
Using GitHub in Education.
- 2015‑09‑22:
Brotli: a new compression algorithm.
- 2015‑09‑22:
Second-hand IPv4 addresses reaping big bucks.
- 2015‑09‑22:
The VW Turbo Diesel Injection scandal.
- 2015‑09‑22:
Pigfucking and paedophilia: how power is whipped into control by the British elite.
- 2015‑09‑22:
A function decorator to add goto support to Python.
- 2015‑09‑22:
Optimizing allocation memory bandwidth in the Azul Vega CPU.
- 2015‑09‑22:
A critique of the CAP theorem.
- 2015‑09‑21:
Inside Shoreditch's disused Tube trains.
- 2015‑09‑21:
Very long-term backup: a modern Rosetta Stone.
- 2015‑09‑21:
cmix: highest lossless compression ratio with very large CPU and memory requirements.
- 2015‑09‑20:
C++ core guidelines.
- 2015‑09‑20:
Subresource integrity: protection against compromised CDNs.
- 2015‑09‑20:
The world's human-powered speed record is now 86.5 mph.
- 2015‑09‑20:
Freezing requirements for fish intended to be eaten raw or lightly cooked.
- 2015‑09‑19:
Winds of change at Dyson.
- 2015‑09‑19:
Transport for London geographical train and tube map.
- 2015‑09‑19:
Statistics for programmers.
- 2015‑09‑19:
Bare-metal Rust on an ARM microcontroller.
- 2015‑09‑19:
Time on multi-core, multi-socket servers.
- 2015‑09‑19:
Microsoft Azure Cloud Switch based on Linux.
- 2015‑09‑18:
Ten years of DNSSEC at .se!
- 2015‑09‑18:
Some old lists of root DNS servers.
- 2015‑09‑17:
WarGames: a look back.
- 2015‑09‑17:
"Hackers" at 20.
- 2015‑09‑16:
How to write a git commit message.
- 2015‑09‑16:
The C++ FQA is now on GitHub.
- 2015‑09‑16:
gdb curses text user interface.
- 2015‑09‑16:
gdb dashboard in Python.
- 2015‑09‑16:
Envelope: write web applications with just JS, HTML, and SQL on Postgres.
- 2015‑09‑16:
Windows Server 2012 R2 DNS logging and diagnostics.
- 2015‑09‑16:
Concurrency Kit: concurrency primitives and non-blocking data structures in C.
- 2015‑09‑15:
The asshole filter.
- 2015‑09‑15:
Spotify account hijacking via incomplete Unicode canonicalization.
- 2015‑09‑15:
Dark corners of Unicode.
- 2015‑09‑15:
How to squeeze a lexicon: efficiently create a minimal DFA from a finite language.
- 2015‑09‑15:
Army of lame ducks: is copyright irrelevant in the viral age?
- 2015‑09‑14:
Sharp regrets: top 10 worst C# features mostly inherited from C.
- 2015‑09‑14:
Don't teach a man to fish. Just give him the goddamn fish.
- 2015‑09‑14:
Designing your website to work best with 1Password.
- 2015‑09‑14:
Reddit discussion of YouTube connectivity and performance.
- 2015‑09‑13:
On the wrong-headed advice of Strunk & White.
- 2015‑09‑13:
A Disney artist's deceptive VR demo still heralds a new digital art future.
- 2015‑09‑13:
Getting rid of women's periods with contraception is perfectly safe.
- 2015‑09‑13:
Object oriented programming considered harmful.
- 2015‑09‑12:
Best night club scene ever! (Youtube mashup)
- 2015‑09‑12:
An information age glossary.
- 2015‑09‑11:
OpenOffice is insecure abandon ware; use LibreOffice instead.
- 2015‑09‑11:
voicecode: advanced voice control for use with Dragon Dictate.
- 2015‑09‑11:
How SoundCloud ended up with microservices.
- 2015‑09‑11:
How the net was won: MERIT, NSFNET, and the birth of the Internet.
- 2015‑09‑11:
From random polygon to ellipse.
- 2015‑09‑11:
K&R C.
- 2015‑09‑11:
Labour day: why taxes, unions, and quotas are good.
- 2015‑09‑10:
Homo Naledi: 6 cavers, 15 skeletons, and an amazing new species of ancient Human.
- 2015‑09‑09:
Steve Albini's punk rock approach to business.
- 2015‑09‑09:
Moore's law ended in 2005.
- 2015‑09‑09:
CESG blog article on passwords.
- 2015‑09‑09:
CESG/CPNI password system design guidelines.
- 2015‑09‑08:
Flame Warriors: a guide to the Internet's argumentative inhabitants.
- 2015‑09‑08:
The True Size: drag countries around a map to see how bad the Mercator projection is.
- 2015‑09‑08:
Social Decay: tweets can predict the death of an app.
- 2015‑09‑08:
6 problems with caches.
- 2015‑09‑07:
Munich contributes to open source to support their Linux workstations.
- 2015‑09‑07:
The scalable commutativity rule: designing APIs that do not hinder software performance.
- 2015‑09‑07:
Some ethernet cables can accidentally cause a hard reset on a 48 port Cisco Catalyst 3650 or 3850.
- 2015‑09‑06:
DataHand keyboard.
- 2015‑09‑06:
Type is not in Type, demonstrated using JonPRL.
- 2015‑09‑06:
Circular rainbow.
- 2015‑09‑05:
The mystery of the fifteen-millisecond breakpoint instruction.
- 2015‑09‑05:
Software: Immaculate, fetid and grimy.
- 2015‑09‑05:
redhook: write LD_PRELOAD hacks in Rust.
- 2015‑09‑05:
The History of Cartography available free online.
- 2015‑09‑05:
A bibliography of BSD-related books and papers.
- 2015‑09‑05:
Madoko: markdown + LaTeX.
- 2015‑09‑04:
Eleanor Rigby.
- 2015‑09‑04:
McSweeney's interactive guide to ambiguous grammar.
- 2015‑09‑04:
How to write a great error message.
- 2015‑09‑03:
Stateless zlib compression: when full fat zlib is too big.
- 2015‑09‑03:
Salad is bad.
- 2015‑09‑03:
World airports voronoi.
- 2015‑09‑03:
The Murray Gell-Mann amnesia effect.
- 2015‑09‑03:
Factoring RSA keys by attacking TLS forward secrecy.
- 2015‑09‑02:
A png with the most pixels in the fewest bytes.
- 2015‑09‑02:
C on the JVM for JRuby extensions.
- 2015‑09‑02:
GitHub: Scaling on Ruby, with a nomadic tech team.
- 2015‑09‑02:
Cydia app store for jailbroken iPhones is riven with nasty malware.
- 2015‑09‑02:
Exploiting Ripple transaction ordering for fun and profit.
- 2015‑09‑01:
The Cavendish lab, Britain's most important historic laboratory, to be redeveloped.
- 2015‑09‑01:
Mac OS X Yosemite security and privacy guide.
- 2015‑09‑01:
wmutils: command line X11 window manager.
- 2015‑09‑01:
Samsung Pay's magstripe NFC.
- 2015‑08‑31:
Tufte in R.
- 2015‑08‑31:
Save OS X: binary pkgsrc distribution.
- 2015‑08‑31:
Useful Mac OS X commands.
- 2015‑08‑30:
Algorithmic botany.
- 2015‑08‑30:
How the ballpoint pen changed handwriting.
- 2015‑08‑30:
Charlesproxy: web debugging proxy.
- 2015‑08‑29:
How recursion got into programming: a comedy of errors.
- 2015‑08‑29:
Lock-freedom without garbage collection in Rust.
- 2015‑08‑28:
Taking Apple's NAT64 implementation for a spin.
- 2015‑08‑28:
A tale of three failed backdoors.
- 2015‑08‑28:
Dr. Memory: memory debugger for Windows and Linux.
- 2015‑08‑28:
Fuzzing capstone using AFL persistent mode.
- 2015‑08‑28:
Omega and why maths has no TOEs.
- 2015‑08‑27:
watchman: multi-platform file change notifications.
- 2015‑08‑26:
Cutting 200ms off every POST request: Nagle vs delayed ack vs short writes.
- 2015‑08‑26:
Jiscom: commercial access to JANET.
- 2015‑08‑25:
vim on a mechanical typewriter.
- 2015‑08‑25:
Behind four walls: Barcelona's lost utopia.
- 2015‑08‑25:
The bugs we have to kill: parsers, weird machines, verification and types.
- 2015‑08‑24:
The network is Turing complete: emulating Rule 110 on a statically configured network.
- 2015‑08‑24:
What's new in CPUs since the 1980s, and how does it affect programmers?
- 2015‑08‑23:
Remora compiler.
- 2015‑08‑23:
Remora: an array-oriented language with static rank polymorphism.
- 2015‑08‑23:
A collection of debugging stories.
- 2015‑08‑22:
How to port-scan all of IPv4 every day.
- 2015‑08‑22:
Jitsu: just-in-time summoning of unikernels in response to DNS queries.
- 2015‑08‑22:
Cake anti-bufferbloat queue discipline for Linux.
- 2015‑08‑21:
An analysis of TLS handshake proxying, aka CloudFlare Keyless SSL.
- 2015‑08‑21:
Automatic patch-based exploit generation.
- 2015‑08‑20:
FreeBSD's security features make hacking the PlayStation 4 difficult.
- 2015‑08‑20:
Schiphol baggage handling video.
- 2015‑08‑20:
Kubernetes reserves 10.0.0.0/8 for itself.
- 2015‑08‑20:
pmem.io: persistent memory programming on Linux.
- 2015‑08‑19:
Technical details of the Amazon Dash Button.
- 2015‑08‑18:
The Turing digital archive.
- 2015‑08‑18:
Actively measuring 50% of the DNS namespace every day.
- 2015‑08‑18:
On the meaning of "respect".
- 2015‑08‑18:
Cecilia Payne determined the composition of the sun, and that hydrogen is the most abundant element.
- 2015‑08‑18:
"Why I don't talk about race with white people."
- 2015‑08‑18:
Decertifying the worst voting machine in the US.
- 2015‑08‑18:
How to hack Amazon's $5 WiFi button to track baby data.
- 2015‑08‑18:
Baby names in England and Wales since 1996.
- 2015‑08‑18:
The strange death of Labour Britain has a Liberal precedent.
- 2015‑08‑18:
The dustbin of geography: the WGS84 meridian at Greenwich.
- 2015‑08‑18:
Use VLC to fix movies that are really quiet, then REALLY LOUD.
- 2015‑08‑18:
RPC portmapper is the new UDP DDoS reflection amplifier.
- 2015‑08‑17:
SQLBong: apply sqlite to CSV files.
- 2015‑08‑17:
csvkit: utilities for converting to and working with CSV.
- 2015‑08‑17:
q: SQL for CVS/TSV files.
- 2015‑08‑17:
xsv: index, slice, analyze, split, and join CSV files.
- 2015‑08‑17:
Miller: like sed, awk, cut, join, and sort for name-indexed data such as CSV.
- 2015‑08‑16:
PEP 0383: Python's UTF-8B handling of binary in filenames etc.
- 2015‑08‑16:
libutf8b: UTF-8B codecs for C and Python.
- 2015‑08‑16:
UTF-8B: lossless handling of binary data by unicode readers and writers.
- 2015‑08‑16:
Rust in 2016.
- 2015‑08‑14:
GSMem: transmitting from a computer memory bus over GSM frequencies.
- 2015‑08‑14:
Hypothesis: QuickCheck for Python.
- 2015‑08‑13:
Why the Greenwich meridian moved.
- 2015‑08‑13:
Making Travis CI a family-friendly place to work: parental leave for US employees.
- 2015‑08‑12:
Insider trading on every company by hacking the news wire press release services.
- 2015‑08‑12:
Security compromise at OpenSRS.
- 2015‑08‑12:
Copyright lawsuits against breakbeat percussion loops.
- 2015‑08‑12:
How to register a death without anyone dying, or register a birth without a baby.
- 2015‑08‑12:
Frequent spicy meals linked to human longevity.
- 2015‑08‑12:
Attack on the pentagon reveals new way to tile the plane.
- 2015‑08‑12:
Google reveals details about its data centre networks.
- 2015‑08‑12:
Jupiter Rising: A decade of Clos topologies and centralized control in Google's datacenter network.
- 2015‑08‑11:
Reordering git commits with git-commit-tree.
- 2015‑08‑11:
A brief history of time.
- 2015‑08‑11:
XMPP myths.
- 2015‑08‑11:
Big list of naughty strings for testing user input.
- 2015‑08‑11:
SecLists: lists of input strings for application security testing.
- 2015‑08‑11:
Database versioning best practices.
- 2015‑08‑10:
A collection of outage postmortems.
- 2015‑08‑10:
Belgian government friently phishing test goes offtrack.
- 2015‑08‑09:
Zone Vision: inspect DNS zones like a superhero.
- 2015‑08‑08:
Bringhurst's elements of typographic style applied to the web.
- 2015‑08‑08:
Recommendations for typography on the web.
- 2015‑08‑08:
Netflix streaming performance test video.
- 2015‑08‑07:
Tufte CSS.
- 2015‑08‑07:
Emacs multi-term.
- 2015‑08‑07:
Emacs is my X11 window manager.
- 2015‑08‑07:
exwm: turn Emacs into a tiling X11 window manager.
- 2015‑08‑06:
Principles of traditional animation applied to 3D computer animation. (Pixar, 1987)
- 2015‑08‑05:
How to set up and use a private PyPI repo.
- 2015‑08‑05:
Python Wheels.
- 2015‑08‑05:
Python on wheels.
- 2015‑08‑05:
The paranoid style in American politics. (1964)
- 2015‑08‑05:
A journalist crashed a Wall Street secret society.
- 2015‑08‑05:
PostgreSQL when it's not your job.
- 2015‑08‑05:
Use the index, Luke! A guide to database performance for developers.
- 2015‑08‑04:
Comparison of different SQL implementations.
- 2015‑08‑04:
libFirm: an optimising C compiler.
- 2015‑08‑03:
LLVM for grad students.
- 2015‑08‑03:
Duncan Campbell's life unmasking GCHQ.
- 2015‑08‑03:
GitXiv: collaborative open computer science. arXiv+GitHub+links+discussion.
- 2015‑08‑02:
How to a destroy a library's special collections with social media.
- 2015‑08‑02:
Using Kotlin on Android.
- 2015‑08‑02:
Talking To Vula: secret communications in the struggle against apartheid.
- 2015‑08‑02:
Security economics: The market for silver bullets.
- 2015‑08‑02:
dns-fuzzing: unique DNS packets for seeding AFL.
- 2015‑08‑02:
High school student proves professor was wrong to deny existence of anti-Irish racism.
- 2015‑08‑02:
Microsoft's new small print: how your personal data is (ab)used.
- 2015‑08‑02:
96 MacBook Pro's in one rack.
- 2015‑08‑02:
How to fuzz a DNS server with AFL.
- 2015‑08‑02:
Crack Brink's CompuSafe with a keyboard masher to escape Windows XP kiosk mode.
- 2015‑08‑02:
Meshtag: drawable QR codes.
- 2015‑08‑02:
Filmmakers fighting "Happy Birthday" copyright find their smoking gun.
- 2015‑08‑02:
SWITCH.ch RPZ DNS Firewall.
- 2015‑08‑02:
In praise of the AK-47.
- 2015‑08‑02:
The stamp collector: a parable about objectivism.
- 2015‑08‑02:
Vegetable calligraphy. (YouTube)
- 2015‑08‑02:
GUNMAN: how the Soviets bugged typewriters in U.S. embassies.
- 2015‑08‑02:
Rowhammer.js: software-induced hardware fault attack in JavaScript.
- 2015‑08‑02:
Hacking Team: a zero-day market case study.
- 2015‑08‑02:
A discussion about modern JavaScript tooling.
- 2015‑08‑02:
Meet the master of old-school IBM model M refurbished clicky keyboards.
- 2015‑08‑02:
JerryScript: JavaScript engine for microcontrollers.
- 2015‑08‑02:
Websites, please stop blocking password managers!
- 2015‑08‑02:
Detecting VPN and proxy users on the server.
- 2015‑08‑02:
Receiving weather satellite images with an £8 SDR dongle.
- 2015‑08‑02:
sregex: a non-backtracking regex engine.
- 2015‑08‑02:
vsftpd-3.0.3 and the horrors of FTP over SSL.
- 2015‑08‑02:
libmill: golang concurrency for C.
- 2015‑08‑02:
HTTPS/FTPS protocol confusion leads to XSS.
- 2015‑08‑02:
Plasma: KDE-based software for mobile phones.
- 2015‑08‑02:
Why Kotlin is a good alternative to Java.
- 2015‑08‑02:
The essence of FRP.
- 2015‑08‑02:
pgcli: a command-line interface for Postgres with autocompletion and syntax highlighting.
- 2015‑08‑02:
Why is it so hard to get a great bagel in California?
- 2015‑08‑02:
Augustine and the "mathematicians".
- 2015‑08‑02:
bocker: Docker implemented in 100 lines of bash.
- 2015‑08‑02:
Engine placement in jet aircraft.
- 2015‑08‑02:
Drawing the Mandelbrot set in SQL and other languages.
- 2015‑08‑02:
Thoughts arising from CircleCI's July 2015 outage.
- 2015‑08‑02:
Mac OS X 10.10 DYLD_PRINT_TO_FILE local privilege escalation vulnerability.
- 2015‑08‑02:
Vim cheat-sheet.
- 2015‑08‑02:
Web design: the first 100 years.
- 2015‑08‑02:
Petition for a referendum on electoral reform like the one in New Zealand.
- 2015‑08‑02:
Recovering a bricked Netgear DGN3500 via JTAG.
- 2015‑08‑02:
Argon2 is the winner of the password hashing competition.
- 2015‑08‑02:
EnChroma: colour for the colourblind.
- 2015‑08‑02:
The end of capitalism has begun.
- 2015‑08‑02:
Jay Leno's Doble E-20 steam car. (YouTube)
- 2015‑08‑02:
Condensers and boilers for steam-powered cars.
- 2015‑08‑02:
The New York Times bestseller that didn't exist.
- 2015‑08‑02:
The last great steam car.
- 2015‑08‑02:
Why are we so afraid of radiation?
- 2015‑08‑02:
Custom daisy-chained SATA power cables.
- 2015‑08‑02:
Bad male gamers are more likely to be hostile towards female gamers.
- 2015‑08‑02:
A mathematical glossary.
- 2015‑08‑02:
Firehose: handle 40Mpps on one core.
- 2015‑08‑02:
UK report details what happens when police spying goes wrong.
- 2015‑08‑02:
Cycling in Britain is a joke.
- 2015‑08‑02:
How do types affect programming productivity and correctness?
- 2015‑08‑02:
Kafkapocalypse: a cascade failure postmortem.
- 2015‑08‑02:
The OpenZFS write throttle.
- 2015‑08‑02:
Hack your Mazda 3 infotainment system.
- 2015‑08‑02:
The potato paradox and other food-related maths.
- 2015‑08‑02:
High Court rules UK government surveillance is unlawful.
- 2015‑08‑02:
The not-planets.
- 2015‑08‑02:
Intelligence and criminal behavior in a total birth cohort.
- 2015‑08‑02:
From zero to Docker: how NewRelic migrated an existing service.
- 2015‑08‑02:
"I ate 40 teaspoons of sugar a day. This is what happened."
- 2015‑07‑30:
Why Docker is not yet succeeding widely in production.
- 2015‑07‑28:
Metal CAPTCHA: are you a metalhead or a bot?
- 2015‑07‑28:
Depict: a browser add-on that helps the visually-impaired understand images on the web.
- 2015‑07‑27:
SleepWatcher: run a command when your Mac sleeps or wakes.
- 2015‑07‑20:
Initial report on loss of connectivity to Cambridge University due to flooding.
- 2015‑07‑19:
Golang 1.5 garbage collector.
- 2015‑07‑19:
Why you don't need two-factor authentication.
- 2015‑07‑15:
Cookie decryption attack on RC4 now takes less than three days.
- 2015‑07‑15:
Ordnance Survey Code-Point Open: location of every postcode.
- 2015‑07‑15:
Outlier detection at Netflix.
- 2015‑07‑15:
Identify trees by leaf.
- 2015‑07‑13:
Things your language should steal from Perl.
- 2015‑07‑12:
3D maps of every London Underground station.
- 2015‑07‑11:
Doing something about the "impossible problem" of abuse in online games.
- 2015‑07‑08:
The early history of Smalltalk.
- 2015‑07‑07:
DNS resolver DDOS mitigation.
- 2015‑07‑06:
Hermann Zapf obituary.
- 2015‑07‑06:
Leap second at NICT in Japan, 2015. (YouTube)
- 2015‑07‑06:
Leap second at NICT in Japan, 2012. (YouTube)
- 2015‑07‑03:
Misfeatures Rust does not have.
- 2015‑07‑02:
Graffiti: pressure wash or paint red?
- 2015‑07‑01:
RedMonk rpogramming language rankings June 2015.
- 2015‑07‑01:
Tetris as a C++ template metaprogram.
- 2015‑07‑01:
NTP pool accuracy before and after leap second. 10% failed to leap.
- 2015‑07‑01:
Shit Academics Say: the story behind a social media experiment.
- 2015‑07‑01:
Numeronyms.
- 2015‑07‑01:
Ordnance Survey open data.
- 2015‑07‑01:
NIST draft guide for DNS-based secured email.
- 2015‑06‑30:
f5 BIG-IP reboots when it gets an NTP leap second indication.
- 2015‑06‑30:
s2n: a small C99 implementation of TLS from Amazon.
- 2015‑06‑30:
Blocking-resistant https with domain fronting.
- 2015‑06‑30:
HTML_CodeSniffer: web page coding standard checker in JavaScript.
- 2015‑06‑30:
tota11y: accessibility visualization for websites.
- 2015‑06‑30:
There was a time before Mathematica...
- 2015‑06‑29:
US government best practices for the leap second tomorrow.
- 2015‑06‑28:
John Locke against freedom.
- 2015‑06‑28:
Covariance and Contravariance: a fresh look at an old issue, with examples in Perl 6.
- 2015‑06‑28:
Blind return-oriented programming.
- 2015‑06‑28:
Sigreturn-oriented programming.
- 2015‑06‑28:
Return-oriented programming.
- 2015‑06‑28:
SafeStack documentation for LLVM / clang.
- 2015‑06‑28:
Code pointer integrity. (SafeStack for LLVM)
- 2015‑06‑27:
Graphs in Rust using vector indices.
- 2015‑06‑27:
Graphs and arena allocation in Rust.
- 2015‑06‑27:
The Unsafe Rust Programming Language.
- 2015‑06‑26:
Visualizing git concepts with D3.
- 2015‑06‑26:
Time in Erlang.
- 2015‑06‑25:
What is C in practice? Survey conclusions.
- 2015‑06‑25:
M-Lab: a better measurement tool provides more data on Internet peering congestion.
- 2015‑06‑24:
Adobe Type Manager PostScript Charstring security vulnerabilities.
- 2015‑06‑24:
Angular commit message style.
- 2015‑06‑24:
Ditch verbal mike-based Q&A sessions and use written questions instead.
- 2015‑06‑24:
An algorithmic approach to data center cabling.
- 2015‑06‑24:
NAPALM: network automation and programmability abstraction layer with multivendor support. (Ansible support for routers.)
- 2015‑06‑23:
Did Watson and Crick really steal Rosalind Franklin's data?
- 2015‑06‑23:
A monadic Pratt parser.
- 2015‑06‑22:
Empty symlinks and full POSIX compliance.
- 2015‑06‑22:
Mega-processor: an 8-bit computer made from discrete transistors and LEDs.
- 2015‑06‑21:
codeface: typefaces for source code beautification.
- 2015‑06‑21:
Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation.
- 2015‑06‑21:
Folly Futures for C++11 at Facebook.
- 2015‑06‑20:
LF Examiner: large format film projection.
- 2015‑06‑19:
Introduction to WebKit content blockers.
- 2015‑06‑19:
Quantitative analysis of issues found by afl in mandoc.
- 2015‑06‑19:
crt.sh: certificate transparency log searcher.
- 2015‑06‑19:
IPv6 leakage and DNS hijacking in commercial VPN clients.
- 2015‑06‑19:
New policy on browser autocomplete vulnerabilities.
- 2015‑06‑19:
Major roads of Great Britain.
- 2015‑06‑19:
Whitaker's WORDS on GitHub.
- 2015‑06‑19:
Whitaker's WORDS: a Latin-English dictionary program.
- 2015‑06‑17:
WebAssembly FAQ.
- 2015‑06‑17:
From asm.js to WebAssembly: bytecode for browsers.
- 2015‑06‑17:
When Solid State Drives are not that solid: TRIM bugs.
- 2015‑06‑15:
CppMem: an interactive C/C++ memory model explorer.
- 2015‑06‑15:
System integrity protection in Mac OS X.
- 2015‑06‑15:
HTTP/2 implementation status.
- 2015‑06‑15:
Why I dislike systemd.
- 2015‑06‑15:
The Chaos: Gerard Nolst Trenité on English pronunciation.
- 2015‑06‑15:
Transparent and accountable governance in 10 words.
- 2015‑06‑14:
Global cybercrime has infected the very soul of capitalism.
- 2015‑06‑14:
Japan's biggest optical disc manufacturer will stop production this year.
- 2015‑06‑13:
Wifibroadcast: analog-like transmission of live video data.
- 2015‑06‑13:
Why did the Universe start off with Hydrogen, Helium, and not much else?
- 2015‑06‑11:
Every noise at once.
- 2015‑06‑11:
Mythic Beasts' view of IPv6 growth.
- 2015‑06‑10:
Kaspersky finds new nation-state attack malware in its own network.
- 2015‑06‑10:
Akamai's view of IPv6 growth.
- 2015‑06‑10:
A tale of two file names: FAT 8.3 long name mangling.
- 2015‑06‑10:
xhyve: lightweight virtualization on OS X based on bhyve.
- 2015‑06‑10:
The danger of anti-virus vendors still relying on MD5.
- 2015‑06‑10:
A sundial for the blind.
- 2015‑06‑08:
Rogue IPv6 addresses with 4006 prefix in home network.
- 2015‑06‑08:
Chemical dependency is not the main cause of addiction.
- 2015‑06‑08:
Crash course on notation in programming language theory.
- 2015‑06‑08:
The Batteriser examined.
- 2015‑06‑08:
Philadelphia train crash investigation derailed by muddled time zones.
- 2015‑06‑07:
How Plex is doing HTTPS for all its users.
- 2015‑06‑07:
Speaker style bingo: 10 presentation anti-patterns.
- 2015‑06‑07:
A large-scale study of flash storage failures at Facebook.
- 2015‑06‑06:
The end of HTML.
- 2015‑06‑06:
Some notes on HAProxy.
- 2015‑06‑06:
Three months of Rust.
- 2015‑06‑04:
SSDs: A gift and a curse.
- 2015‑06‑04:
A world of languages, and how many speak them.
- 2015‑06‑03:
Which Unicode character should represent the English apostrophe? (And why the Unicode committee is very wrong.)
- 2015‑06‑03:
60th anniversary of the atomic clock.
- 2015‑06‑03:
Batch-GCDing Github SSH keys.
- 2015‑06‑03:
Auditing GitHub users' SSH key quality.
- 2015‑06‑02:
Joule thief.
- 2015‑06‑02:
Batteriser is a $2.50 gadget that extends alkaline battery life 800%
- 2015‑06‑02:
Five different ways to handle the leap second with NTP.
- 2015‑06‑02:
The intuition behind why a randomly networked data center works.
- 2015‑06‑02:
How Rust achieves thread safety.
- 2015‑06‑01:
Exploring 1Password's crypto in golang.
- 2015‑06‑01:
Running an oncall rota.
- 2015‑05‑30:
"Mahna Mahna": How a ditty from a soft-core Italian movie became the Muppets' catchiest tune.
- 2015‑05‑30:
Animography: animated typefaces.
- 2015‑05‑30:
How not to seed a random number generator: Blockchain.info's Android Wallet.
- 2015‑05‑30:
A guide to the regional ramen of Japan.
- 2015‑05‑30:
databranches: using git as a database.
- 2015‑05‑30:
swift: a multiparty transport protocol - BitTorrent at the transport layer.
- 2015‑05‑30:
Announcing GitTorrent: a decentralized git service.
- 2015‑05‑29:
Spy in the sandbox: practical cache sidechannel attacks in Javascript.
- 2015‑05‑29:
The Kindle finally gets typography that doesn't suck.
- 2015‑05‑29:
VAT rules for food. (much bogglement)
- 2015‑05‑29:
Null Island.
- 2015‑05‑29:
The Republic of Null Island.
- 2015‑05‑29:
After FBI domain expires, seized domains serve up malware.
- 2015‑05‑28:
KUNG FURY (YouTube)
- 2015‑05‑28:
What I learned from six months of GMO research: None of it matters.
- 2015‑05‑28:
Railway oriented programming, or, error handling with the Either monad.
- 2015‑05‑28:
Rust for Python programmers.
- 2015‑05‑28:
Inside Google's war against ad fraud.
- 2015‑05‑28:
lsyncd: live filesystem sync / mirror daemon.
- 2015‑05‑27:
How to fool journalists into saying chocolate helps weight loss.
- 2015‑05‑27:
Five lists of six things about Rust.
- 2015‑05‑26:
Elements of scale: composing and scaling data platforms.
- 2015‑05‑25:
CAP: if all you have is a timeout, everything looks like a partition.
- 2015‑05‑25:
A plea for culinary modernism.
- 2015‑05‑25:
Saving coffee from extinction due to global warming.
- 2015‑05‑25:
Australia's Defence Trade Control Act could criminalise teaching cryptography.
- 2015‑05‑25:
There is no link between saturated fat and heart disease.
- 2015‑05‑25:
Top-down operator precedence. (remastered)
- 2015‑05‑25:
La famille TGV, guide d'identification.
- 2015‑05‑25:
Letter to a young Haskell enthusiast.
- 2015‑05‑25:
Capstone: the ultimate disassembly framework.
- 2015‑05‑25:
Snowman: ARM/x86/AMD64 to C/C++ decompiler.
- 2015‑05‑25:
Python 3 typecheck-decorator.
- 2015‑05‑25:
The medieval 'New England': an Anglo-Saxon colony on the north-eastern Black Sea coast.
- 2015‑05‑25:
Typography shapes our perception of truth.
- 2015‑05‑24:
Extracting audio from pictures.
- 2015‑05‑24:
Mach7: pattern matching for C++.
- 2015‑05‑24:
Duncan Campbell talks to GCHQ (interception not required).
- 2015‑05‑23:
What IBM Watson AI chef told me to cook.
- 2015‑05‑23:
Greaseless autonomous decentralised bearings eliminate sliding friction.
- 2015‑05‑22:
Australian stock exchange leap second plans.
- 2015‑05‑21:
Public Toilets and the magic of open data.
- 2015‑05‑21:
Cambridgeshire traffic congestion monitoring interactive map.
- 2015‑05‑20:
Free open source code signing certificates.
- 2015‑05‑19:
Ceilings of Deus Ex.
- 2015‑05‑19:
How a frame is rendered in Deus Ex: Human Revolution.
- 2015‑05‑19:
Amazon implements linear leap smear for AWS (except EC2) for the coming leap second.
- 2015‑05‑19:
About the supposed factoring of a 4096 bit RSA PGP key.
- 2015‑05‑19:
Linux signalfd is useless.
- 2015‑05‑18:
SCIpher: a scholarly message encoder based on SCIgen.
- 2015‑05‑17:
Julia issue #8839: Jeff Bezanson's PhD thesis: abstraction in technical computing.
- 2015‑05‑16:
Sourdough crumpets.
- 2015‑05‑16:
A taste of Rust.
- 2015‑05‑16:
eBPF: programmable tracing for Linux.
- 2015‑05‑15:
Poor man's stack trace profiler.
- 2015‑05‑15:
Amazon AWS tips.
- 2015‑05‑15:
This British bill of rights could end the UK.
- 2015‑05‑14:
Linux futex_wait() lockup bug.
- 2015‑05‑14:
Geoff Huston's review of the DNS-OARC workshop.
- 2015‑05‑14:
India's experiment in basic income grants.
- 2015‑05‑13:
BIND 9 internals documentation.
- 2015‑05‑12:
Accidentally Quadratic: `puppet apply`.
- 2015‑05‑12:
The tree of old-world language families.
- 2015‑05‑12:
“Politics of fear” to blame for Lib Dem collapse, says former Cambridge MP Julian Huppert.
- 2015‑05‑12:
Six ways Nick Clegg led the Liberal Democrats to disaster.
- 2015‑05‑11:
Detecting Malware Based on DNS Graph Mining.
- 2015‑05‑11:
Tory plan to repeal the Human Rights Act faces almost insurmountable odds.
- 2015‑05‑11:
PowerDNS review of the DNS-OARC Spring Workshop 2015.
- 2015‑05‑11:
The first microprocessor: the F15 central air data computer.
- 2015‑05‑11:
Texas Instruments TMX 1795: an 8008 clone produced before the Intel 8008.
- 2015‑05‑10:
Lego brick street view.
- 2015‑05‑10:
Thoughts on the way forward for the Lib Dems.
- 2015‑05‑10:
The 14 worst human rights myths.
- 2015‑05‑10:
Paris plans to line the Seine with parks instead of cars.
- 2015‑05‑10:
All about this in JavaScript.
- 2015‑05‑10:
Scroll Back: theory and practice of camera focus in side-scrolling games.
- 2015‑05‑10:
How to solve chronic homelessness.
- 2015‑05‑09:
Scale errors in funding public benefit activities.
- 2015‑05‑09:
How the measles vaccine reduces mortality from other infectious diseases.
- 2015‑05‑08:
opmsg: an alternative to pgp.
- 2015‑05‑08:
The discovery of Apache ZooKeeper's poison packet.
- 2015‑05‑07:
The Whig party.
- 2015‑05‑06:
Centimetre-accurate GPS for mobile phones.
- 2015‑05‑06:
DHCP, RPF verify, HSRP and ECMP: when protocols collide.
- 2015‑05‑05:
How Amsterdam became the bicycle capital of the world.
- 2015‑05‑04:
Parental choice led to decline in standard of Swedish education.
- 2015‑05‑04:
Animal fat mayonnaise.
- 2015‑05‑03:
Corpus of Historical American English (400 million words).
- 2015‑05‑03:
The search for a more perfect kilogram.
- 2015‑05‑03:
What would happen if the EU opened its borders to everyone?
- 2015‑05‑02:
Project MF: blue-box phreaking with an Asterisk PBX.
- 2015‑05‑01:
Wallpapered: maps for walls.
- 2015‑05‑01:
Reprojected raster map tiles.
- 2015‑05‑01:
GDAL: geospatial data abstraction library.
- 2015‑05‑01:
Cartographic map projections.
- 2015‑05‑01:
Natural Earth: public domain map data.
- 2015‑05‑01:
Printing a wall-sized world map.
- 2015‑05‑01:
Functional education: strengths and weaknesses of various Haskell teaching materials.
- 2015‑04‑30:
David P. Reed on the invention of UDP.
- 2015‑04‑30:
Can your static type system handle linear algebra?
- 2015‑04‑29:
Static checking of units in Servo using Rust phantom types.
- 2015‑04‑29:
Measurements of Newton's gravitational constant and the length of day.
- 2015‑04‑29:
Eight lessons learned hacking on GitHub Pages for six months.
- 2015‑04‑29:
Bye bye Labour.
- 2015‑04‑29:
The austerity delusion: The case for cuts was a lie. Why does Britain still believe it?
- 2015‑04‑28:
How well do you know Cambridge? A population statistics quiz.
- 2015‑04‑28:
Bad forensic "science".
- 2015‑04‑28:
Reenix: implementing a toy Unix in Rust.
- 2015‑04‑28:
ShellCheck script analyzer.
- 2015‑04‑28:
Crash Boys: the weird flash crash case against Navinder Singh Sarao.
- 2015‑04‑27:
Teenager cuts nearly a third of a second off Rubik's Cube world record.
- 2015‑04‑27:
What it is like to have half a million followers on Twitter.
- 2015‑04‑27:
MySQL gotchas.
- 2015‑04‑26:
Non-constant constant-expressions in C++.
- 2015‑04‑26:
rust-bindgen: automatic API converter for Rust.
- 2015‑04‑26:
Rust once, run everywhere: FFI and interop with other languages.
- 2015‑04‑25:
How photography was optimized for pale skin.
- 2015‑04‑25:
28 words to use instead of "awesome".
- 2015‑04‑25:
What every programmer should know about solid-state drives.
- 2015‑04‑24:
A brief history of /proc
- 2015‑04‑24:
Verifone credit card terminals have used same password since 1990s.
- 2015‑04‑24:
Google Safe Browsing observes the GreatFire / GitHub Chinese DDoS.
- 2015‑04‑24:
Games on a hyperbolic plane.
- 2015‑04‑24:
HyperRogue: a roguelike on a hyperbolic plane.
- 2015‑04‑23:
Holt-Winters forecasting applied to poisson processes in real time.
- 2015‑04‑23:
Lessons learned in software development.
- 2015‑04‑23:
Make your own digital sundial.
- 2015‑04‑23:
K-root DNS server expansion plans.
- 2015‑04‑22:
1ML: uniting ML's core and modules into a single language.
- 2015‑04‑21:
What is C in practice? (a survey)
- 2015‑04‑21:
Martin Burgess / John Harrison "Clock B".
- 2015‑04‑20:
Liberty Reserve: bank of the underworld.
- 2015‑04‑20:
ub-canaries: a collection of programs that detect compiler exploitation of undefined behaviour.
- 2015‑04‑20:
Burgess Regulator: modern construction of John Harrison's last clock design.
- 2015‑04‑19:
John Harrison's last clock is accurate to less than one second in 100 days.
- 2015‑04‑19:
Notational Velocity: Mac note-taking app.
- 2015‑04‑19:
Semantic linefeeds in document markup: one line per sentence or clause.
- 2015‑04‑18:
30 logos that have a hidden message.
- 2015‑04‑18:
Lots of emacs tips.
- 2015‑04‑18:
Spacemacs: emacs configuration framework based round evil-mode.
- 2015‑04‑18:
Chord progressions of 25 000 songs.
- 2015‑04‑17:
Why an academic historian wrote a book in plain text (with pandoc).
- 2015‑04‑17:
A complement to blame: an overview of the blame calculus for gradual typing.
- 2015‑04‑17:
Anatomy of an account hijack
- 2015‑04‑17:
Yes, you can catch insanity: infectious disease and mental health.
- 2015‑04‑17:
eight: Python 2 to the power of 3.
- 2015‑04‑16:
For good measure: estimating undiscovered vulnerabilities.
- 2015‑04‑16:
Optimizing TLS for high bandwidth applications on FreeBSD.
- 2015‑04‑16:
11 proverbs for the digital age.
- 2015‑04‑15:
The American middle class is no longer the richest in the world.
- 2015‑04‑15:
Miura-Ori map fold.
- 2015‑04‑15:
The bones beneath London: Crossrail archaeology.
- 2015‑04‑15:
Remote code execution vulnerability in IIS on Windows: HTTP byte range parsing error.
- 2015‑04‑15:
Reverse-engineered WipEout WebGL track viewer.
- 2015‑04‑15:
Lots of leap second bug reports.
- 2015‑04‑14:
Moore's Law at 50: Its past and its future.
- 2015‑04‑14:
Finding bugs in SQLite with afl.
- 2015‑04‑14:
The Hobsbawm File. (Radio 4)
- 2015‑04‑14:
Protecting infrastructure secrets with Keywhiz.
- 2015‑04‑14:
Usability of voter-verifiable, end-to-end voting systems: Helios, Prêt À Voter, and Scantegrity II.
- 2015‑04‑14:
British viagra spammers sent to prison.
- 2015‑04‑14:
What's wrong with statistics in Julia?
- 2015‑04‑13:
Rockwell retro-encabulator. (YouTube)
- 2015‑04‑13:
git fanfic.
- 2015‑04‑13:
Insurance jingle fanfic.
- 2015‑04‑13:
How to fix rootpipe privilege escalation vulnerability in Mac OS X 10.9 Mavericks.
- 2015‑04‑13:
Indexes beat actively managed funds again in S&P study.
- 2015‑04‑13:
The mutual fund industry is a huge scam that costs investors billions of dollars a year.
- 2015‑04‑13:
Electricity distribution map of the East of England.
- 2015‑04‑13:
National risk register of civil emergencies. (2015 edition)
- 2015‑04‑13:
London's lost pneumatic railway: the second underground.
- 2015‑04‑12:
Experiments in columnar joints in drying corn starch.
- 2015‑04‑12:
Why neovim is better than vim.
- 2015‑04‑12:
Benefit sanctions: Britain's secret penal system.
- 2015‑04‑12:
The Analytical Engine In Glorious Technicolour!
- 2015‑04‑12:
The multiple lives of Moore's law: how it survived for 50 years.
- 2015‑04‑12:
1K colours on CGA: How it is done.
- 2015‑04‑11:
Out of print? How to regain copyright and make your book more available.
- 2015‑04‑11:
Codes that Changed the World: a history of programming languages on Radio 4.
- 2015‑04‑11:
Detailled London rail map.
- 2015‑04‑11:
How are Rust Traits different from Golang Interfaces?
- 2015‑04‑10:
VeinViewer means no more poking people with needles repeatedly.
- 2015‑04‑10:
Extracting the private key from a TREZOR bitcoin safe with a $70 oscilloscope.
- 2015‑04‑10:
Fearless concurrency with Rust.
- 2015‑04‑10:
Hidden backdoor API to root privileges in Apple Mac OS X.
- 2015‑04‑10:
Windows concurrent IO API zoo.
- 2015‑04‑10:
TCP OOB sends Chrome and Node.js into infinite loops due to OS X kqueue bug.
- 2015‑04‑10:
ExaBGP: routing swiss army knife. (Used by RIPE for anycast.)
- 2015‑04‑10:
nsec3map: DNSSEC zone enumerator.
- 2015‑04‑10:
How can life exist on a planet without a star?
- 2015‑04‑09:
Wall Street fees wipe out $2.5 billion in New York City pension funds.
- 2015‑04‑09:
Software interrupts and realtime Linux.
- 2015‑04‑09:
T-pylon foundations.
- 2015‑04‑09:
First new-style T-pylon has been installed.
- 2015‑04‑08:
What kind of talks and papers are wanted at USENIX LISA.
- 2015‑04‑08:
Tendermint: consensus without mining.
- 2015‑04‑08:
Stellar Consensus Protocol: proof and code.
- 2015‑04‑08:
Differential calculus with datatypes.
- 2015‑04‑08:
BeagleBone Black timer capture driver for precise PPS interrupts.
- 2015‑04‑08:
Various GeoIP checking and bug reporting links.
- 2015‑04‑08:
Inside 8088 MPH: we break all your emulators.
- 2015‑04‑08:
Breaking XML signature and encryption.
- 2015‑04‑07:
How to own any Windows network with group policy hijacking attacks.
- 2015‑04‑07:
How Heartbleed could have been found with afl and address sanitizer.
- 2015‑04‑07:
Contranyms, holophrasms and negaffirmatives: when "no" is positive.
- 2015‑04‑07:
Treating British tourists in Europe costs five times more than treating foreign visitors in the UK.
- 2015‑04‑07:
Never doubt that a small group of deranged trolls can ruin anything (even the Washington Monument and the Hugo Awards).
- 2015‑04‑07:
Gil Tene's basic settings to reduce latency spikes on Linux.
- 2015‑04‑07:
Cheese changed the course of Western civilization.
- 2015‑04‑06:
The puppy-free Hugo award voter's guide.
- 2015‑04‑06:
Is 10% of the population really gay?
- 2015‑04‑06:
Why the name? Etymologies of Unix and Linux programs.
- 2015‑04‑05:
8088 MPH: a demo for the original IBM PC with CGA adapter.
- 2015‑04‑04:
Why, after all these years, don't we have something better than latex for condoms?
- 2015‑04‑04:
Linux's bad disk scheduling causes long GC pauses on the JVM.
- 2015‑04‑03:
Reviewing the second year of OCaml Labs in 2014.
- 2015‑04‑03:
Pin-pointing China's attack against GitHub.
- 2015‑04‑02:
Google Chrome will not trust any new CNNIC X.509 certificates.
- 2015‑04‑02:
Mozilla will be distrusting new CNNIC X.509 certificates.
- 2015‑04‑01:
Terry Pratchett, guilty of literature, vs. VATMOSS. (Ansible 333)
- 2015‑04‑01:
Ignore the 'pro-business' rhetoric: a pro-rich government is anti-business.
- 2015‑04‑01:
Crypto algorithm confusion vulnerabilities in JSON Web Token libraries.
- 2015‑04‑01:
China's man-on-the-side attack on GitHub.
- 2015‑03‑31:
My quantified self email analysis experiment: a failure.
- 2015‑03‑31:
Chinese authorities compromise millions in cyberattacks on GitHub and GreatFire.
- 2015‑03‑31:
The real story of how America became an economic superpower.
- 2015‑03‑30:
Metaprogramming beyond decency in Python.
- 2015‑03‑30:
Hypothesis: QuickCheck-style property-based testing for Python.
- 2015‑03‑30:
systemd will require a specially patched Linux kernel.
- 2015‑03‑29:
"Turing got a pardon. I want one, too."
- 2015‑03‑29:
Why Baidu has been hijacked to attack Github.
- 2015‑03‑29:
VHDL 101: a minimal 16 bit stack-based CPU.
- 2015‑03‑29:
Debunking the myth of the job-stealing immigrant.
- 2015‑03‑28:
The myth of Europe's "little ice age".
- 2015‑03‑28:
KaTeX: the fastest math typesetting library for the web.
- 2015‑03‑28:
Paper review: "an analysis of production failures in distributed data-intensive systems"
- 2015‑03‑28:
Baidu's traffic hijacked to DDoS GitHub.com.
- 2015‑03‑27:
Porno copyright troll Perfect 10 hit with $5.6M in fees after failed Usenet lawsuit.
- 2015‑03‑27:
UK Court of Appeal issues game changing judgment in Google / Safari privacy case.
- 2015‑03‑27:
The horror of document.write in JavaScript.
- 2015‑03‑25:
Cap'n Proto security advisory, and how to catch integer overflows with template metaprogramming.
- 2015‑03‑25:
A comprehensive study of convergent and commutative replicated data types.
- 2015‑03‑25:
pg_rewind in PostgreSQL 9.5: better replication and failover.
- 2015‑03‑24:
Telstra runs out of IPv4 addresses.
- 2015‑03‑24:
Which clang warning options control which warning messages?
- 2015‑03‑24:
Which UK constituencies have ever elected someone who is not a white man?
- 2015‑03‑23:
Popcorn Time: the piracy party that Hollywood cannot stop.
- 2015‑03‑23:
Real ale vs craft beer: a battle for the soul of booze.
- 2015‑03‑21:
Why the human retina is wired back-to-front.
- 2015‑03‑21:
Google's distributed cron service.
- 2015‑03‑21:
12 minute Mandelbrots on a 50 year old IBM 1401 mainframe.
- 2015‑03‑21:
Negative criticism and ineffective feedback.
- 2015‑03‑21:
The science of protecting people's feelings: why we pretend all opinions are equal.
- 2015‑03‑21:
Mac OS X drivers for CH340 / CH341 / PL2303 USB serial devices.
- 2015‑03‑21:
Monodraw: UTF8 art drawing tool for Mac.
- 2015‑03‑21:
Replacing Photoshop with NSString: ASCII art connect-the-dots rendering.
- 2015‑03‑21:
Why does the International Space Station have such a weird shape?
- 2015‑03‑20:
GoDaddy accounts vulnerable to social engineering.
- 2015‑03‑20:
Windows 10 will allow hardware vendors to lock out alternate operating systems.
- 2015‑03‑20:
Dolaucothi Roman gold mines.
- 2015‑03‑20:
Las Médulas roman gold mines.
- 2015‑03‑20:
cURL is 17 years old.
- 2015‑03‑20:
The untold story of the British Rail logo.
- 2015‑03‑20:
Textures.js: SVG patterns for data visualization.
- 2015‑03‑20:
The myopia boom seems to be due to too much time indoors.
- 2015‑03‑20:
Sorting algorithms in COBOL.
- 2015‑03‑20:
Where is the generic insulin?
- 2015‑03‑20:
miTLS: A verified reference TLS implementation.
- 2015‑03‑19:
Conference katamari.
- 2015‑03‑19:
PyPy and RPython: fast enough language VMs in fast enough time.
- 2015‑03‑19:
NSF will require open access to research it funds.
- 2015‑03‑18:
f3: find fake flash devices.
- 2015‑03‑18:
NTP developer Harlan Stenn and the Network Time Foundation need money.
- 2015‑03‑18:
Richard Stallman's GNU Manifesto is 30 years old.
- 2015‑03‑17:
I can text you a pile of poo, but I can't write my name.
- 2015‑03‑17:
How do I convert a video to GIF using ffmpeg, with reasonable quality?
- 2015‑03‑17:
RgbQuant.js playground.
- 2015‑03‑17:
Arbitrary-palette positional dithering algorithm.
- 2015‑03‑17:
libimagequant: image quantization library.
- 2015‑03‑17:
Colour quantization.
- 2015‑03‑17:
High quality GIFs with FFmpeg.
- 2015‑03‑17:
Amazon is losing billions.
- 2015‑03‑16:
reop: a pgp-alike based on nacl / libsodium.
- 2015‑03‑16:
Attacks only get better: new more efficient password recovery attack on RC4 in TLS.
- 2015‑03‑16:
Norway police illegally set up IMSI catchers around parliament.
- 2015‑03‑16:
Anti-doxxing techniques.
- 2015‑03‑15:
The state of SIMD.js performance in Firefox.
- 2015‑03‑15:
DHCPv6 and the trouble with MAC addresses.
- 2015‑03‑15:
An algorithm to synchronise a computer to UTC using a dial-up reference time source.
- 2015‑03‑15:
Why it is hard to compile Perl 6.
- 2015‑03‑15:
Oxford's New Bodleian Library has had a radical modernist refurbishment.
- 2015‑03‑15:
Branch cuts for complex elementary functions, or, much ado about nothing's sign bit.
- 2015‑03‑15:
ashd: a "sane" HTTP daemon, using Unix processes as modules.
- 2015‑03‑15:
FastCGI is pointless.
- 2015‑03‑15:
The OpenBSD httpd.
- 2015‑03‑14:
The sad state of system administration.
- 2015‑03‑14:
The Ten Commandments of egoless programming.
- 2015‑03‑14:
$2500 to get your .sucks domain before it opens to all comers.
- 2015‑03‑14:
How genre fiction became more important than literary fiction.
- 2015‑03‑14:
alt.fan.pratchett dinner at Trinity College Cambridge. (1995)
- 2015‑03‑14:
Trigger: a network automation toolkit in Python.
- 2015‑03‑14:
How Apple makes the Watch: metallurgy and machining.
- 2015‑03‑13:
Factoring 512 bit RSA for fun (and a $9000 saving).
- 2015‑03‑13:
Lucene: the good parts.
- 2015‑03‑13:
A door broke in Germany and the most memetacular thing happened.
- 2015‑03‑13:
xorg maxes out at 256 clients.
- 2015‑03‑13:
There is no now.
- 2015‑03‑13:
You can play Snake with the fountains at Kings Cross Granary Square.
- 2015‑03‑13:
The robustness principle reconsidered.
- 2015‑03‑13:
bind9stats: a Munin plugin to get data from the BIND 9 statistics channel (XML format v3).
- 2015‑03‑13:
Accidentally Quadratic.
- 2015‑03‑13:
Bitcoin is being used by African migrant workers to send money home.
- 2015‑03‑13:
Wardley mapping: a set of useful posts.
- 2015‑03‑12:
How GitHub conquered Google, Microsoft, and everyone else.
- 2015‑03‑12:
Google Code is shutting down.
- 2015‑03‑12:
Pi, phase space, and bouncing billiard balls.
- 2015‑03‑12:
Blinky: peripheral vision for Quake, with configurable projections.
- 2015‑03‑12:
The Pannini projection.
- 2015‑03‑11:
Patents are innovation's worst enemy.
- 2015‑03‑11:
Piketty discusses "Capital in the 21st Century".
- 2015‑03‑11:
Raytracing a Black Hole.
- 2015‑03‑11:
Inflicting suffering on those in need is now at the heart of our welfare system.
- 2015‑03‑11:
Backblaze Vault storage architecture.
- 2015‑03‑11:
Strengthening JavaScript.
- 2015‑03‑11:
New design for K-root DNS server nodes.
- 2015‑03‑11:
Wodin: an IMAP server
- 2015‑03‑10:
USB killer.
- 2015‑03‑10:
The number of legal 18x18 Go positions.
- 2015‑03‑10:
Yes, I'll defend daylight saving time.
- 2015‑03‑09:
Exploiting the DRAM rowhammer bug to gain kernel privileges.
- 2015‑03‑09:
The East India Company: The original corporate raiders.
- 2015‑03‑09:
Linux getrandom(2).
- 2015‑03‑09:
UK politicians could learn a lot from the Pirate Party.
- 2015‑03‑09:
Winners of the underhanded crypto contest.
- 2015‑03‑09:
Signs that you are a bad programmer.
- 2015‑03‑08:
Lenin meets Corleone: understanding Vladimir Putin.
- 2015‑03‑08:
An analysis of Wellcome Trust open access spending, 2013-2014.
- 2015‑03‑08:
The sinister treatment of dissent at the BBC.
- 2015‑03‑08:
The Eiffel Tower now has some wind turbines.
- 2015‑03‑08:
What happens when the Queen dies.
- 2015‑03‑08:
A USB 3.1 disk benchmark.
- 2015‑03‑08:
Security services complain that Silicon Valley executives do not want security clearance.
- 2015‑03‑08:
London congestion charge led to a dramatic fall in accident rate.
- 2015‑03‑08:
Name constraints on root CAs.
- 2015‑03‑07:
GitLab joins Y Combinator.
- 2015‑03‑07:
SMS cards: the circuit packaging technology in IBM's 1960s mainframes.
- 2015‑03‑07:
What might a functional SQL look like?
- 2015‑03‑07:
Capitalism's love affair with bureaucracy.
- 2015‑03‑07:
American democracy is doomed.
- 2015‑03‑06:
Reverse execution for better debugging with rr.
- 2015‑03‑06:
rr: record execution and replay deterministically for debugging.
- 2015‑03‑06:
IPFS: peer-to-peer content-addressing for the permanent web.
- 2015‑03‑06:
pflask: simple Linux containers.
- 2015‑03‑06:
Exponential backoff and jitter.
- 2015‑03‑05:
Could a 'citizen's income' work?
- 2015‑03‑05:
Finding files fast. (1983)
- 2015‑03‑05:
ZX81 1K chess.
- 2015‑03‑05:
Software Freedom Conservancy sues VMware over GPL compliance.
- 2015‑03‑05:
The North/South divide: we have never even tried.
- 2015‑03‑05:
DNSSEC validation at Spark NZ, a large ISP.
- 2015‑03‑05:
A leap second is coming: leap smear at QTNet in Japan. (Slideshare)
- 2015‑03‑05:
GitHub alternatives.
- 2015‑03‑05:
GitLab acquires Gitorious.
- 2015‑03‑05:
Your open source project does not need a contributor licensing agreement.
- 2015‑03‑04:
Exploiting a use-after-free bug in Adobe Flash Player.
- 2015‑03‑04:
Widespread leapsecond bugs in BeiDou GNSS receivers.
- 2015‑03‑04:
Perforce Helix distributed version control.
- 2015‑03‑04:
Solved by Flexbox: cleaner, hack-free CSS.
- 2015‑03‑04:
Khronos Vulkan, next generation OpenGL: graphics and compute belong together.
- 2015‑03‑04:
Internet services engineering reading list.
- 2015‑03‑04:
PCG: a family of better (non-crypto) random number generators.
- 2015‑03‑03:
Don't blame gerbils for the plague.
- 2015‑03‑03:
SSL attack of the week: "FREAK", or, factoring RSA for fun and profit.
- 2015‑03‑03:
"FREAK" SSL downgrade attack exploits 1990s export strength ciphers.
- 2015‑03‑03:
Scientists have figured out what makes Indian food so delicious.
- 2015‑03‑03:
The worst insurance contract ever? The man who could own Aviva.
- 2015‑03‑03:
Jet lag is worse if you live on Mars time.
- 2015‑03‑03:
Khronos unveils Vulkan: OpenGL rebuilt for modern systems.
- 2015‑03‑02:
ATtiny85 does over-the-air NTSC.
- 2015‑03‑02:
How simian immunodeficiency virus became HIV, on several occasions.
- 2015‑03‑02:
Plastic as strong as steel and three times lighter.
- 2015‑03‑02:
No, it's not the end of XMPP for Google Talk.
- 2015‑03‑02:
lcc: a retargetable C compiler.
- 2015‑03‑02:
pcc: portable C compiler.
- 2015‑03‑02:
tcc: tiny C compiler.
- 2015‑03‑02:
sdcc: a C compiler targeting small devices.
- 2015‑03‑02:
nwcc: a simple portable C compiler.
- 2015‑03‑02:
8cc: a small C11 compiler.
- 2015‑03‑02:
Pyston LLVM-based Python implementation: version 0.3 release.
- 2015‑03‑02:
ISO/IEC 9899:2011 C11 final committee draft.
- 2015‑03‑02:
The Brompton bicycle production line.
- 2015‑03‑01:
First train journey from China to Spain and back.
- 2015‑03‑01:
How to sabotage encryption software (and not get caught).
- 2015‑03‑01:
30 years of above average global temperatures.
- 2015‑03‑01:
Abusing BluRay players: sandbox escapes.
- 2015‑03‑01:
Abandon your DVCS and return to sanity.
- 2015‑03‑01:
Kitchen rhythm: a year in a Parisian pâtisserie.
- 2015‑02‑28:
You do not want ISPs to optimise for minimal packet loss.
- 2015‑02‑28:
GPS PPS with Raspbian wheezy 2015-02-16.
- 2015‑02‑28:
Raspberry Pi stratum 1 NTP server with PPS.
- 2015‑02‑28:
u-blox 6 GPS receiver description and protocol specification.
- 2015‑02‑28:
u-blox NEO-6 GPS data sheet.
- 2015‑02‑27:
FCC is asking for more buffer bloat in ISP networks?
- 2015‑02‑27:
More thoughts on working with GnuPG.
- 2015‑02‑27:
Internet slang meets American Sign Language.
- 2015‑02‑26:
Watch a decade of data coming to life on OpenStreetMap.
- 2015‑02‑26:
The path to parallel JavaScript.
- 2015‑02‑26:
Sans Bullshit Sans: a font that leverages the synergy of ligatures.
- 2015‑02‑26:
Technical aspects of leap second propagation and evaluation.
- 2015‑02‑26:
Psychology journal bans p-value significance testing.
- 2015‑02‑26:
Malaysia steals Mali's ccTLD.
- 2015‑02‑26:
Why it is worth classifying and naming antipatterns and failure modes.
- 2015‑02‑26:
How to calculate current on a 3-phase, 208V rack PDU.
- 2015‑02‑25:
"Get them on the blower!" London's lost pneumatic tube network.
- 2015‑02‑25:
Gemalto's investigation into the GCHQ/NSA attacks.
- 2015‑02‑25:
What Color Is Your Xen? Different virtualisation modes.
- 2015‑02‑24:
Hardware variability may be greater than algorithmic improvement.
- 2015‑02‑24:
Great Firewall of China DNS poisoning DDoS attack.
- 2015‑02‑24:
When builders nearly flooded the JANET EastERN PoP.
- 2015‑02‑24:
Formal methods show TimSort is broken.
- 2015‑02‑24:
PrivDog adware is worse than Superfish.
- 2015‑02‑23:
The Emterpreter: run asm.js code before it can be parsed.
- 2015‑02‑23:
Typographic universal shaping engine in Windows 10.
- 2015‑02‑23:
Be prepared: journalists and security researchers.
- 2015‑02‑23:
Media training is an OPSEC skill.
- 2015‑02‑23:
ECMAscript 6.
- 2015‑02‑23:
Big data won't improve business strategy for most companies.
- 2015‑02‑22:
Open Addresses: multiplying address data.
- 2015‑02‑22:
Superfish round-up.
- 2015‑02‑21:
An exploration of ARM TrustZone technology.
- 2015‑02‑21:
Generalized tic-tax-toe: k-in-a-row on an n-by-m board.
- 2015‑02‑21:
Most types of cancer are not due to "bad luck".
- 2015‑02‑21:
Advertising vs. editorial.
- 2015‑02‑21:
Derek Bickerton's advice on reading.
- 2015‑02‑21:
Windows SSL interception: MITM attacks gone wild.
- 2015‑02‑21:
Komodia/Superfish SSL validation is broken.
- 2015‑02‑20:
AppleVis lists of iOS and OS X accessibility bugs.
- 2015‑02‑20:
Some notes on Superfish.
- 2015‑02‑20:
Will the madness never end? Komodia SSL certificates are EVERYWHERE.
- 2015‑02‑20:
A tangled mess: Android X.509 root certificate stores.
- 2015‑02‑19:
Superfish: a history of malware complaints and international surveillance.
- 2015‑02‑19:
Freeing up the UK DWP unused /8 IPv4 addresses.
- 2015‑02‑19:
Extracting the SuperFish private key.
- 2015‑02‑19:
Your college major is a pretty good indication of how smart you are.
- 2015‑02‑18:
HTTP/2 is done.
- 2015‑02‑18:
Too much finance is bad for the economy.
- 2015‑02‑18:
Provision Tor relays with Ansible.
- 2015‑02‑18:
Speaking while female.
- 2015‑02‑18:
A 14-year-old hacker caught the car industry by surprise.
- 2015‑02‑18:
Underscores in Python.
- 2015‑02‑18:
The paradoxes of modern cosmology.
- 2015‑02‑17:
Duplicate SSH keys everywhere.
- 2015‑02‑17:
pattern.en: part-of-speech tagger and other linguistic tools for English.
- 2015‑02‑16:
UK UPRN (unique property reference numbers) may now be used freely for open government data.
- 2015‑02‑16:
7GUIs: a benchmark comparing programmability of GUI frameworks.
- 2015‑02‑15:
Sugar increases the risk heart disease, regardless of age, sex, exercise, or BMI.
- 2015‑02‑14:
Bigram frequencies for Emacs key chords.
- 2015‑02‑14:
Analysis of NTP autokey.
- 2015‑02‑14:
OCaml: what you gain.
- 2015‑02‑14:
Apple Lightning connector reverse engineering.
- 2015‑02‑14:
Low-fat diet advice was based on undercooked science.
- 2015‑02‑14:
FDA inspections: Fraud, fabrication, and scientific misconduct are hidden from the public and doctors.
- 2015‑02‑14:
Overflow semantics in Rust.
- 2015‑02‑14:
Rust 1.0 status report and final timeline.
- 2015‑02‑13:
The two big bangs.
- 2015‑02‑13:
Markdown style guide.
- 2015‑02‑13:
Returning self or void suggests mutability.
- 2015‑02‑13:
Asciinema: record and share your terminal sessions the right way.
- 2015‑02‑13:
"Shopping cart" patent comes back to court and loses again.
- 2015‑02‑10:
DNS poisoning via bad authority sections.
- 2015‑02‑10:
PolarSSL is dead; long live "mbed TLS".
- 2015‑02‑09:
Modern C.
- 2015‑02‑08:
How secular and religious family values compare.
- 2015‑02‑08:
Duverger's law: voting systems influence the number of political parties.
- 2015‑02‑08:
NetPGP: digital signatures and encryption.
- 2015‑02‑08:
Electrically powered bacteria.
- 2015‑02‑07:
HFT doesn't harm investors, and other absurdities.
- 2015‑02‑07:
DRM tractors.
- 2015‑02‑06:
How to transfer large amounts of data across the network.
- 2015‑02‑05:
Getting beyond static vs dynamic types in Perl 6.
- 2015‑02‑05:
Backblaze hard drive data.
- 2015‑02‑05:
Haskell in the large.
- 2015‑02‑04:
JVM implementation challenges: the future is hard but worth it.
- 2015‑02‑04:
Daylight hours explorer.
- 2015‑02‑04:
A Secret History of Silicon Valley.
- 2015‑02‑04:
Usenix NSDI paper on VPNgate.
- 2015‑02‑04:
VPNgate: evade the Great Firewall using many VPN relays.
- 2015‑02‑02:
A brief history of types in programming.
- 2015‑02‑02:
DNSSEC TLD deployment report.
- 2015‑02‑02:
Chinese DNS censorship turns into a DDoS attack.
- 2015‑02‑01:
novm: a Linux KVM-based hypervisor written in golang.
- 2015‑02‑01:
Key rotation in OpenSSH 6.8+.
- 2015‑02‑01:
I don't want to be right: on the difficulty of changing minds.
- 2015‑01‑31:
Leslie Lamport tells mathematicians how to write proofs.
- 2015‑01‑30:
Crocker's rules of communication.
- 2015‑01‑30:
CloudFlare DNSSEC done right.
- 2015‑01‑30:
Being a man who was raped by a woman.
- 2015‑01‑30:
Collision avoidance predicts pedestrian behaviour.
- 2015‑01‑30:
There are no beans in chili con carne.
- 2015‑01‑30:
TCP/IP over Lego model train.
- 2015‑01‑30:
Individuals can be identified from 3 or 4 "anonymized" credit card purchase records.
- 2015‑01‑28:
Boom: a British bank-bombing burglary binge.
- 2015‑01‑28:
Free access to back issues of Significance magazine.
- 2015‑01‑28:
Pair programming with junior developers.
- 2015‑01‑28:
Spork: an awk-alike for XML and HTML, based on CSS selectors and Python expressions.
- 2015‑01‑28:
A typology of tasks.
- 2015‑01‑28:
Mid-January leap second bug in some GPS receivers.
- 2015‑01‑28:
Vivaldi: a new browser for fans of Opera.
- 2015‑01‑28:
Mapillary: traffic sign recognition for crowdsourced street view.
- 2015‑01‑27:
Earth: a primer.
- 2015‑01‑27:
The judgment on the Taylor & Son(s) Ltd typo case.
- 2015‑01‑27:
A one letter typo accidentally destroyed a 124-year-old engineering business.
- 2015‑01‑27:
NASA's ten rules for safety-critical code.
- 2015‑01‑27:
A technical analysis of the Qualys GHOST.
- 2015‑01‑26:
Why does crypto software fail?
- 2015‑01‑26:
Postcards from the post-XSS world.
- 2015‑01‑26:
How TCP listen backlog works.
- 2015‑01‑26:
Musicless MacGyver. (YouTube)
- 2015‑01‑26:
20 fun facts about hexagonal grids.
- 2015‑01‑26:
The *.c.uk typosquat security threat.
- 2015‑01‑26:
The five tribes of UKIP.
- 2015‑01‑26:
huptime: restart daemons without closing and re-opening listening sockets
- 2015‑01‑25:
It is statistically impossible for mass surveillance to be effective against terrorism.
- 2015‑01‑25:
Partitioned heap to protect Firefox from use-after-free bugs.
- 2015‑01‑25:
BPA is safe.
- 2015‑01‑25:
The story behind the xmas Kings Cross problems.
- 2015‑01‑24:
Markets are efficient if and only if P=NP.
- 2015‑01‑23:
London squared map.
- 2015‑01‑23:
T-DNS: connection-oriented DNS to improve privacy and security.
- 2015‑01‑23:
Watch this archer do amazing things.
- 2015‑01‑23:
GoDaddy CSRF vulnerability allowed domain takeover.
- 2015‑01‑22:
Gun nuts simulate Paris shooting and get shot by simulated terrorists.
- 2015‑01‑22:
Everybody hates Pearson.
- 2015‑01‑21:
PubCSS: formatting academic publications in HTML and CSS.
- 2015‑01‑21:
It is cheaper for Netflix to make their own movies than to licence them from studios.
- 2015‑01‑21:
Speechwriters: Don't write differently for women, write differently for men.
- 2015‑01‑20:
A sketch towards a taxonomy of meta-desserts.
- 2015‑01‑20:
GitSlave: concurrent development on multiple related repositories.
- 2015‑01‑19:
When an awk script is 235x faster than a Hadoop cluster.
- 2015‑01‑18:
Transgender people can explain why women don't advance at work.
- 2015‑01‑18:
How to understand the drawbacks of k-means clustering.
- 2015‑01‑18:
Teams with more women tend to be more effective.
- 2015‑01‑18:
Why I no longer contribute to StackOverflow.
- 2015‑01‑18:
High performance C extensions for JRuby+Truffle.
- 2015‑01‑18:
Scalability! But at what COST? When a laptop outperforms a Big Data cluster.
- 2015‑01‑18:
Zero-maintenance RAID: 99.999% reliable over 4 years with no human intervention.
- 2015‑01‑17:
A year in the merde: Charlie Hebdo covers in context.
- 2015‑01‑17:
What kind of prejudice discourages women and ethnic minorities from certain academic fields?
- 2015‑01‑16:
Virgin Media rolling out IPv6 this year.
- 2015‑01‑16:
Comments on the debate over the proposal to redefine UTC and abolish leap seconds.
- 2015‑01‑16:
GoGo does not need to run MitM attacks on YouTube.
- 2015‑01‑16:
Five recent papers about high-performance data paths.
- 2015‑01‑16:
A day in the life of a sysadmin after David Cameron bans encryption.
- 2015‑01‑14:
dateutils: command line tools for handling dates.
- 2015‑01‑14:
Gitrob: search github for leaked security-sensitive files.
- 2015‑01‑14:
A quick comparison of the Nim and Rust programming languages.
- 2015‑01‑13:
Why and how to replace Mac OS X 10.10 discoveryd with mDNSresponder from 10.9.
- 2015‑01‑13:
Privacy-conscious email services.
- 2015‑01‑13:
Wicher: Polish decryption of Enigma before WWII.
- 2015‑01‑13:
The Harriss spiral: a fractal curve inspired by the golden spiral.
- 2015‑01‑13:
25 writing hacks from a hack writer.
- 2015‑01‑13:
Towards a re-definition of the second based on optical atomic clocks.
- 2015‑01‑13:
TTY input pushback privilege escalation vulnerability in su.
- 2015‑01‑13:
Stretching the "peer reviewed" brand until it snaps.
- 2015‑01‑13:
Thoughts about Rust from a D programmer.
- 2015‑01‑12:
KeySweeper: stealthy wireless keyboard snooping device.
- 2015‑01‑12:
151-byte static Linux binary in Rust.
- 2015‑01‑12:
Tiling a chessboard.
- 2015‑01‑12:
The simple proof of the Tetris Lamp.
- 2015‑01‑12:
On Charlie Hebdo: A letter to my British friends.
- 2015‑01‑11:
JavaScript equality table.
- 2015‑01‑11:
Time code formats for space data systems.
- 2015‑01‑11:
Markus Kuhn on this year's leap second.
- 2015‑01‑11:
Linus Torvalds on this year's leap second.
- 2015‑01‑11:
Feminism and the plight of the bitter lonely nerd.
- 2015‑01‑11:
Best new maths puns of 2014.
- 2015‑01‑11:
Torch7: scientific computing with LuaJIT.
- 2015‑01‑11:
Your toaster is a USB HID for playing DooM. (YouTube)
- 2015‑01‑11:
Code review checklists in the style of Atul Gawande.
- 2015‑01‑11:
Yet another code review checklist.
- 2015‑01‑11:
Another code review checklist.
- 2015‑01‑11:
Angular code review checklist.
- 2015‑01‑11:
Hadoop code review checklist.
- 2015‑01‑11:
Code review checklist.
- 2015‑01‑11:
Comparing cloud service uptime over the last year.
- 2015‑01‑10:
Performance-oriented congestion control.
- 2015‑01‑10:
redgrep: a searcher based on derivatives or regular expressions with an LLVM JIT.
- 2015‑01‑10:
The uncensored French language.
- 2015‑01‑10:
Move constructors in C++.
- 2015‑01‑09:
Rust 1.0 alpha.
- 2015‑01‑08:
PowerDNS tools to analyse DNS traffic.
- 2015‑01‑08:
High-fructose corn syrup is more toxic than table sugar for mice.
- 2015‑01‑07:
Contract grading.
- 2015‑01‑07:
The 20 most popular web sites every year since 1996.
- 2015‑01‑07:
In defense of inclusionism on Wikipedia.
- 2015‑01‑07:
Inside Putin's information war: Russian TV propaganda.
- 2015‑01‑07:
GamerGate vs Eliza.
- 2015‑01‑06:
Configure ssh to thwart the NSA and GCHQ.
- 2015‑01‑06:
Write You a Haskell: a tutorial on modern functional programming language implementation.
- 2015‑01‑06:
Wipe 2014 - Adam Curtis. (YouTube)
- 2015‑01‑06:
A collection of xmas cockentryce: fantastic mediæval cooking at Hampton Court.
- 2015‑01‑05:
Continuous delivery at the Guardian.
- 2015‑01‑05:
Why spaghetti snaps in three, explained with slow motion video.
- 2015‑01‑05:
Gogo statement on their MitM attack.
- 2015‑01‑05:
Gogo inflight Internet intentionally MitM its customers.
- 2015‑01‑05:
Clonezilla: disk imaging software.
- 2015‑01‑05:
Bolt: an embedded key/value database for golang.
- 2015‑01‑05:
LMDB: LDAP at lightning speed.
- 2015‑01‑04:
A robot learns to cook by watching videos on YouTube.
- 2015‑01‑04:
Serge Hochar, producer of Chateau Musar in Lebanon, dies aged 75.
- 2015‑01‑04:
NixOS and stateless deployment.
- 2015‑01‑04:
A VAXcluster of Raspberry Pi.
- 2015‑01‑04:
GCC is wonderful: a better ARRAY_SIZE macro.
- 2015‑01‑04:
key-checker: monitor and analyse DNSSEC key rollovers.
- 2015‑01‑04:
Nuclear power is the greenest option, say senior biological scientists.
- 2015‑01‑04:
Sugar should be taxed like tobacco, says Jamie Oliver.
- 2015‑01‑04:
Data structures for text editors.
- 2015‑01‑04:
Joyent packages: binary pkgsrc builds for Mac OS X etc.
- 2015‑01‑04:
Using pkgsrc on Mac OS X.
- 2015‑01‑04:
Graphical vi quick reference.
- 2015‑01‑04:
Are some diets "mass murder"?
- 2015‑01‑03:
The hidden complexity costs that developers ignore (and how to reduce them).
- 2015‑01‑03:
Visual C++ 2015 is finally modern enough to support COM well.
- 2015‑01‑03:
Finding and exploiting ntpd vulnerabilities.
- 2015‑01‑03:
HSTS supercookies: how to use HTTP strict transport security to track users.
- 2015‑01‑03:
Tartessian, Europe's newest and oldest Celtic language.
- 2015‑01‑02:
TPM-based remote attestation from a server to an Android phone.
- 2015‑01‑02:
Why Sweden has the world's safest roads.
- 2015‑01‑02:
A diff algorithm in 50 lines of Python.
- 2015‑01‑02:
Agincourt600: events marking the battle's anniversary later this year.
- 2015‑01‑02:
Zone 1 Tube station walking times.
- 2015‑01‑02:
The end of gangs: cleaning up Los Angeles.
- 2015‑01‑02:
Your princess is in another castle: misogyny, entitlement, and nerds.
- 2015‑01‑02:
What is special about the Nim programming language?
- 2015‑01‑02:
Random non-standard tie knots.
- 2015‑01‑02:
The great plate count anomaly that is no more: the right way to prepare an agar Petrie dish.
- 2015‑01‑01:
tufte-latex: a Tufte-inspired LaTeX class for producing papers, handouts, and books.
- 2015‑01‑01:
tab: a modern text processing language.
- 2015‑01‑01:
Thunderstrike: how to insert malware into a Mac's boot ROM via its Thunderbolt port.
- 2014‑12‑31:
New long-lasting material for solar thermal power plants converts 90% of light to heat.
- 2014‑12‑30:
Over 78% of PHP installations have a security vulnerability.
- 2014‑12‑30:
Dissent: accountable anonymous group communication.
- 2014‑12‑30:
Dark Mail: key distribution and end-to-end encrypted email.
- 2014‑12‑30:
On nerd entitlement.
- 2014‑12‑30:
Cyranoids: If someone secretly controlled what you say, would anyone notice?
- 2014‑12‑30:
Quake on an oscilloscope.
- 2014‑12‑30:
Clean sheet: how to release data or statistics in a spreadsheet.
- 2014‑12‑29:
The ternary calculating machine built by Thomas Fowler in 1840.
- 2014‑12‑28:
Worse than a defeat: the British military in Iraq and Afghanistan.
- 2014‑12‑28:
Domebuilder's blues.
- 2014‑12‑28:
Another ad blocking /etc/hosts file.
- 2014‑12‑28:
An ad blocking /etc/hosts file.
- 2014‑12‑28:
Tracking protection in Firefox: built-in ad blocking.
- 2014‑12‑27:
Quantum random number generation using a smartphone camera.
- 2014‑12‑27:
U&lc typography magazine online.
- 2014‑12‑27:
robdns: authoritative DNS server with user land IP stack.
- 2014‑12‑27:
DNS speed test.
- 2014‑12‑27:
Slow, flexible, and cheap: developing a dome kit.
- 2014‑12‑27:
Fear makes you a worse programmer (and sysadmin).
- 2014‑12‑27:
Setting up PHP-FastCGI and nginx? Don't trust the tutorials: check your configuration!
- 2014‑12‑26:
Why deployment freezes don't prevent outages.
- 2014‑12‑26:
ISC WordPress site compromised to serve malware.
- 2014‑12‑26:
Using fast matrix exponentiation to write an interpreter for a simple programming language.
- 2014‑12‑26:
arXiv racing toward the one million mark.
- 2014‑12‑26:
PLOS is anti-elitist! PLOS is elitist! The weird world of open access journalism.
- 2014‑12‑26:
UCL: universal configuration language.
- 2014‑12‑26:
Do not use subtraction to compare numbers.
- 2014‑12‑26:
Adventures in piano building.
- 2014‑12‑26:
Turf: a modular GIS engine written in JavaScript.
- 2014‑12‑25:
Laws restricting technology actually expose us to greater harm.
- 2014‑12‑25:
Uncertain<T>: a first-order type for uncertain data.
- 2014‑12‑24:
Ten myths of innovation.
- 2014‑12‑24:
Coz: causal profiling for C/C++.
- 2014‑12‑24:
Principles of distributed computing.
- 2014‑12‑24:
Safe VSP: horizontal scrolling reveals a hardware bug in the Commodore 64.
- 2014‑12‑23:
The update framework: a plug-and-play library for securing a software updater.
- 2014‑12‑23:
Docker image insecurity.
- 2014‑12‑23:
PHP's new hashtable implementation.
- 2014‑12‑23:
Erdős conjecture on large gaps between primes has been proved.
- 2014‑12‑22:
GCHQ failed to stop the 2008 Mumbai attacks despite having an eye on the perpetrators.
- 2014‑12‑21:
ntimed: PHK's NTP implementation on GitHub.
- 2014‑12‑21:
Illegal Guys: a history of digital subcultures in Europe during the 1980s.
- 2014‑12‑21:
Meet the CIA's queen of torture.
- 2014‑12‑21:
Maps of religious belief and disbelief in Cambridge.
- 2014‑12‑21:
E-rhythms data sonifier: listen to your activity logs.
- 2014‑12‑21:
What cities have learned about tearing down urban highways.
- 2014‑12‑21:
How to write a proof: Leslie Lamport's structured proofs.
- 2014‑12‑20:
The rise of the shitpic: memes that keep getting copied imperfectly.
- 2014‑12‑20:
The mystery of the missing Tim Hortons apostrophe.
- 2014‑12‑20:
Avoiding tethering blocks on Android KitKat.
- 2014‑12‑20:
How to spot counterfeit passive electronic components.
- 2014‑12‑20:
PHK at work on NTP.
- 2014‑12‑19:
Thoughts on cryptography in Rust.
- 2014‑12‑19:
Roaring bitmaps: a better compressed bitset.
- 2014‑12‑19:
Network Time Protocol daemon (ntpd) contains multiple vulnerabilities.
- 2014‑12‑19:
Colonial gin and tonic.
- 2014‑12‑18:
Fundamental plot arcs, seen through multidimensional analysis of thousands of TV and movie scripts.
- 2014‑12‑18:
Interactive smartphone comparison chart.
- 2014‑12‑17:
Some systems at ICANN were compromised.
- 2014‑12‑17:
A two-rotor swashplateless helicopter.
- 2014‑12‑17:
The US government's role in root zone management.
- 2014‑12‑16:
The NIPS experiment: academic conference paper acceptance is more random than expected.
- 2014‑12‑15:
evSrc: apply a bioinformatics technique to your source history to reveal bad areas of software design.
- 2014‑12‑15:
Programming and programming languages: an introductory CS textbook using Pyret.
- 2014‑12‑15:
The low oil price could cause a crisis for banks that hold trillions in commodity derivatives.
- 2014‑12‑15:
Amplio: software for measuring the performance of surgeons.
- 2014‑12‑14:
Fast integer overflow detection with LLVM.
- 2014‑12‑14:
There is no evidence that businesses are more efficient than the public sector.
- 2014‑12‑13:
Cold water cures: experiments in cold brew coffee.
- 2014‑12‑13:
Advances in statistics lead to advances in ecology.
- 2014‑12‑13:
Curfew tags: the gory details.
- 2014‑12‑12:
The infinitely delegating name servers attack.
- 2014‑12‑12:
Garbage collection and totality.
- 2014‑12‑11:
Simple hack you can use to bypass Keurig 2.0 coffee DRM.
- 2014‑12‑11:
JMAP: JSON Mail Access Protocol.
- 2014‑12‑09:
OSTree: git for operating system binaries.
- 2014‑12‑09:
A study into UK IPv4 and IPv6 address allocations.
- 2014‑12‑09:
Why women are leaving the tech industry.
- 2014‑12‑09:
mermaid: generate diagrams from markdown-like text.
- 2014‑12‑09:
Diagrammix: commercial diagram software for Mac OS.
- 2014‑12‑09:
ditaa: convert ASCII art diagrams to nice images.
- 2014‑12‑09:
Gliffy: draw diagrams in your browser.
- 2014‑12‑08:
Five A350 XWBs flying in close formation. (YouTube)
- 2014‑12‑08:
Galileo satellite successfully recovered to correct orbit and transmitting navigation signals.
- 2014‑12‑07:
The gender politics of pockets.
- 2014‑12‑07:
Lampsort: Leslie Lamport's non-recursive quicksort.
- 2014‑12‑07:
Zusie: a home-made relay computer.
- 2014‑12‑07:
The UK's new porno censorship regulations are a step towards international trade sanctions.
- 2014‑12‑07:
When data gets creepy: the secrets we don't realise we're giving away.
- 2014‑12‑06:
Phyllis Pearsall, creator of the London A-Z map.
- 2014‑12‑06:
Many academics who write software have had no formal training.
- 2014‑12‑05:
Introducing Varnish Massive Storage Engine.
- 2014‑12‑05:
The ongoing failure of the PG-13 rating: lots of killing but no sex.
- 2014‑12‑05:
The programming language wars.
- 2014‑12‑05:
The cost of the S in HTTPS.
- 2014‑12‑04:
Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors.
- 2014‑12‑03:
The open-plan office trap.
- 2014‑12‑02:
Nature makes all its articles free to view in an annoying proprietary crappy PDF reader.
- 2014‑12‑02:
Jackie Chan Blu-ray disc boosts solar panel efficiency by a massive 22%.
- 2014‑12‑01:
The superiority of economists.
- 2014‑12‑01:
The "fundamental rule" of traffic: building new roads makes people drive more.
- 2014‑12‑01:
Code everything in Java.
- 2014‑12‑01:
The long road to Maxwell's equations.
- 2014‑12‑01:
The misunderstood limits of folk science: an illusion of explanatory depth.
- 2014‑11‑30:
Big brother IS watching you. Don't be complacent about the surveillance state.
- 2014‑11‑30:
Checklists for software.
- 2014‑11‑30:
A Minecraft server monitor in Perl.
- 2014‑11‑30:
Zero knowledge proofs: an illustrated primer.
- 2014‑11‑29:
LEGO's letter to parents: how not to tell fake typography when you don't see it.
- 2014‑11‑26:
Reconstructed EDSAC switched on for the first time.
- 2014‑11‑26:
Transactions: the limits of isolation. Databases are not properly ACID.
- 2014‑11‑26:
Solving the mystery of trunked link imbalance: a metastable failure state at Facebook.
- 2014‑11‑26:
The impact of email work done at RAND in the 1970s.
- 2014‑11‑26:
Ansible reminds me of PHP's salad days.
- 2014‑11‑26:
The art of insight in science and engineering.
- 2014‑11‑26:
Cambridge University fibre network diagram, London Underground tube map style.
- 2014‑11‑26:
WiFried: iOS 8 / Mac OS X 10.10 WiFi performance problems.
- 2014‑11‑26:
How to remove yourself from background check sites.
- 2014‑11‑26:
Doxxing defense: Remove your personal info from data brokers.
- 2014‑11‑26:
A working Lego particle accelerator.
- 2014‑11‑25:
Social status is more strongly inherited even than height.
- 2014‑11‑25:
How do I draw a pair of buttocks by plotting a 3D formula?
- 2014‑11‑25:
Understanding Boys, Understanding Girls. Teaching the implications of gender roles to children.
- 2014‑11‑24:
Snake on a keyboard: a reverse engineering story.
- 2014‑11‑24:
A peek into the massive scale of Amazon AWS.
- 2014‑11‑23:
"What Wikipedia taught me about my grandfather."
- 2014‑11‑23:
Fibonacci layered lemonade.
- 2014‑11‑23:
How mediaeval astronomers calculated trigonometry tables.
- 2014‑11‑23:
Wait a minute! A fast cross-VM cache side-channel key recovery attack on AES.
- 2014‑11‑23:
Empirical analysis of UK legislation started this weekend.
- 2014‑11‑23:
Footage of the first bungee jump, by Oxonians from Clifton suspension bridge in 1979.
- 2014‑11‑23:
ST&G's marvellous map of Great British place names.
- 2014‑11‑22:
The state of Creative Commons.
- 2014‑11‑22:
runfs: self-cleaning FUSE file system for per-process state (e.g. pid files).
- 2014‑11‑22:
crates.io: the hosting service for Rust programming language packages.
- 2014‑11‑22:
The real roots of the midlife crisis.
- 2014‑11‑22:
What it would take to really reverse climate change.
- 2014‑11‑21:
AnsibleFest London February 2015.
- 2014‑11‑21:
VoCore: a one inch square Linux computer.
- 2014‑11‑21:
Mapumental: how far you can travel by public transport in a given time.
- 2014‑11‑21:
Bogus academic journal accepts profanity-laden anti-spam paper.
- 2014‑11‑21:
World maps without New Zealand.
- 2014‑11‑20:
Atlas of audiovisual artifacts.
- 2014‑11‑20:
MIT developing miniature laser fountain atomic clocks.
- 2014‑11‑20:
Cache is the new RAM: a perspective on databases.
- 2014‑11‑20:
Interpreting Debian's general resolution on init systems.
- 2014‑11‑19:
Learn to code with Anna and Elsa from Frozen.
- 2014‑11‑19:
French company builds bare metal ARM server cloud.
- 2014‑11‑19:
New EU VAT rules change the game for digital businesses.
- 2014‑11‑19:
The horrible implications of the EU VAT "place of supply" rule change.
- 2014‑11‑19:
Standards for scientific graphic presentation.
- 2014‑11‑19:
The Internet has disintermediated the music industry, and it is going from strength to strength.
- 2014‑11‑19:
How Google brought PILE OF POO to America.
- 2014‑11‑19:
Twelve infographics about London.
- 2014‑11‑18:
Zonemaster DNS checker.
- 2014‑11‑18:
Interpreting alpha values of pixels: coverage vs opacity.
- 2014‑11‑18:
CVE-2014-6324: privilege escalation vulnerability in Microsoft Active Directory.
- 2014‑11‑18:
A Silicon Valley company is developing Dalek security robots.
- 2014‑11‑18:
HANDS: heuristic online storage deduplication with low memory overhead.
- 2014‑11‑18:
Attic: deduplicated encrypted incremental backups.
- 2014‑11‑18:
Relatively complete counterexamples for higher-order programs: automatically find erroneous inputs.
- 2014‑11‑17:
RAPPOR: privacy-preserving data collection from client software.
- 2014‑11‑17:
Why we should give free money to everyone.
- 2014‑11‑17:
PostgreSQL vs MS SQL Server from the point of view of a data analyst.
- 2014‑11‑17:
The impact of widespread HTTP encryption on traffic interception middleboxes in mobile networks.
- 2014‑11‑17:
Triggering the MS14-066 winshock SChannel vulnerability.
- 2014‑11‑17:
Mediaeval siege warfare against old server hardware. (video)
- 2014‑11‑17:
UK launches orphan work licensing scheme, but misses the opportunity to make it much better.
- 2014‑11‑17:
How does copyright work in space?
- 2014‑11‑17:
Petition to replace the benefits system with a universal basic income.
- 2014‑11‑17:
Six-way banana genome Venn diagram.
- 2014‑11‑17:
Two simple rules for avoiding a #shirtstorm
- 2014‑11‑17:
A growing proportion of citations are to older scientific papers.
- 2014‑11‑17:
The last PC replacement cycle is about to start turning.
- 2014‑11‑16:
The chemistry of seasoning cast iron pans: a science-based how-to.
- 2014‑11‑16:
Pesticides increase the risk of depression in farmers.
- 2014‑11‑16:
Albert Michaelson's harmonic analyser: Fourier analysis with a mechanical computer.
- 2014‑11‑16:
Why there is a winter flu season.
- 2014‑11‑16:
Electoral fraud in the UK.
- 2014‑11‑16:
Docking with an uncooperative object: the little-known Soviet mission to rescue a dead space station.
- 2014‑11‑16:
How the Enigma machine worked.
- 2014‑11‑16:
Thousands join "stop the killing" road safety protest in London.
- 2014‑11‑16:
Why the Rosetta science guy's sexy shirt crash landed.
- 2014‑11‑16:
How the House of Lords mixes politics and business.
- 2014‑11‑15:
Grimms' fairytales have blood and horror restored in new translation.
- 2014‑11‑14:
Hard drive SMART stats.
- 2014‑11‑14:
Newstweek is a device for manipulating news read by other people on wireless hotspots.
- 2014‑11‑14:
Array operators using multiple dispatch in Julia.
- 2014‑11‑13:
We perceive negative comments to be inherently more intelligent than positive ones.
- 2014‑11‑13:
The Headington Shark house in Oxford is available to rent.
- 2014‑11‑12:
CREAM: the scary SSL attack you've probably never heard of.
- 2014‑11‑12:
Amazon to begin testing same-day delivery drones in Cambridge.
- 2014‑11‑12:
Underground London: adventures in the secret city beneath our feet.
- 2014‑11‑11:
TCP is harder than it looks.
- 2014‑11‑11:
giltene/wrk2: an HTTP benchmarking tool which avoids co-ordinated omission of high latency requests.
- 2014‑11‑11:
At last Apple lets you deactivate iMessage and solve your missing txt problem.
- 2014‑11‑10:
Announcing Bosun: StackExchange's alerting software written in Golang.
- 2014‑11‑10:
An overview of Linux kernel lock improvements.
- 2014‑11‑10:
A review of Black Cow pure milk vodka.
- 2014‑11‑10:
All cameras are police cameras.
- 2014‑11‑10:
Joan Clarke, Bletchley Park cryptanalyst.
- 2014‑11‑10:
The quinoa quarrel.
- 2014‑11‑10:
Batch NFS: factorizing many RSA keys with the number field sieve.
- 2014‑11‑09:
Gov.uk rolls out its federated online identity verification system.
- 2014‑11‑09:
Trying out Rust and Golang.
- 2014‑11‑09:
Why a programming language designer finds IEEE 754 frustrating.
- 2014‑11‑08:
Restoring the IBM 1401 computer.
- 2014‑11‑08:
Julia: a fresh approach to numerical computing.
- 2014‑11‑08:
Creating user profiles from DNS lookups and other network behaviour.
- 2014‑11‑08:
Synthesizing JPEGs out of thin air using the afl fuzz tester.
- 2014‑11‑08:
A fire took out a huge Bitcoin mining operation.
- 2014‑11‑08:
Gamergate is a seemingly self-sustaining system of hatred.
- 2014‑11‑07:
Security requirements of time protocols (NTP and PTP) in packet switched networks.
- 2014‑11‑07:
Receiving signals from dead satellites with the RTL-SDR.
- 2014‑11‑07:
Moshpit simulation.
- 2014‑11‑07:
Animations of asteroid (and comet) groups in the solar system.
- 2014‑11‑07:
The horror of blimps.
- 2014‑11‑07:
The $9 billion whistleblower describes JPMorgan Chase's securities fraud.
- 2014‑11‑07:
What is new in Cobol 2014.
- 2014‑11‑07:
The Oculus Rift makes Elite: Dangerous amazing—and impossible to describe.
- 2014‑11‑06:
Running a supercomputer at the south pole.
- 2014‑11‑06:
The Greater Manchester Combined Authority will have more devolved powers than anywhere in England, including London.
- 2014‑11‑06:
Imposition of identity, English Parliaments, and "Englishness".
- 2014‑11‑06:
More articles about idleness at work.
- 2014‑11‑06:
Google Docs stores the full timestamped history of each document's keystrokes.
- 2014‑11‑06:
The art of not working at work.
- 2014‑11‑06:
Belgian and French copyright laws ban photos of buildings.
- 2014‑11‑05:
Zoetrope chocolate cake. (video)
- 2014‑11‑05:
The diatomist. (Vimeo)
- 2014‑11‑05:
Precise measurements of Earth's changing gravity field for monitoring weather and climate.
- 2014‑11‑05:
Highly sensitive atomic clocks may end time as we know it.
- 2014‑11‑05:
FixedFixer: turn position:fixed into position:static to get rid of obtrusive HTML elements.
- 2014‑11‑05:
Redis latency spikes, alternative malloc()s and the Linux kernel.
- 2014‑11‑05:
Please grow your buffers exponentially.
- 2014‑11‑05:
Dropping a hammer and a feather on the moon.
- 2014‑11‑05:
Dropping a bowling ball and some feathers in the world's biggest vacuum chamber.
- 2014‑11‑05:
Cambridge University's new £20M low-PUE data centre.
- 2014‑11‑04:
The Dunning-Kruger effect: we are all confident idiots.
- 2014‑11‑04:
The 1960s Batman TV series will soon be available on DVD.
- 2014‑11‑04:
C4: C in 4 functions.
- 2014‑11‑04:
A Lisper's first impression of Julia.
- 2014‑11‑04:
What would the Tube map look like if it only contained ghost stations?
- 2014‑11‑04:
The zombie system: how capitalism has gone off the rails.
- 2014‑11‑02:
How Apple Pay and Google Wallet work.
- 2014‑11‑02:
Euclid location analytics uses WiFi to track shoppers.
- 2014‑11‑02:
France's great wines are feeling the heat of climate change.
- 2014‑11‑02:
Why weird domestic architecture is common in Japan.
- 2014‑11‑02:
Eleven countries studied, one inescapable conclusion: the drug laws don't work.
- 2014‑11‑01:
LORAN Europe.
- 2014‑11‑01:
Gamergate is a disaster for those promoting the artistic respectability of games.
- 2014‑11‑01:
Cellphone redirection allows Google 2FA bypass.
- 2014‑11‑01:
Solving British housing crisis: building homes where we need them.
- 2014‑11‑01:
UK deploys eLoran at 7 locations.
- 2014‑11‑01:
Harvard libraries opened to women in 1967.
- 2014‑11‑01:
The Phaistos disk has been decoded.
- 2014‑11‑01:
BTAgent HomeHub CPE backdoor.
- 2014‑11‑01:
Is it possible to compile Mac OS Darwin from source?
- 2014‑11‑01:
Mac OS X launchd functional overview.
- 2014‑11‑01:
What computer scientists should know.
- 2014‑11‑01:
Collected advice on Unix CLI design and implementation.
- 2014‑11‑01:
Netflix Message Security Layer.
- 2014‑10‑31:
Reversing D-Link's WPS PIN algorithm.
- 2014‑10‑31:
Shellshock in Java apps.
- 2014‑10‑31:
Music theory for musicians and normal people.
- 2014‑10‑31:
Parental leave in the USA.
- 2014‑10‑31:
IT change management.
- 2014‑10‑31:
news.demon.co.uk is no more
- 2014‑10‑30:
The Internet Arcade at the Internet Archive.
- 2014‑10‑30:
Metal meets classical. (Videos)
- 2014‑10‑30:
Most web page loads will experience 99%ile server latency.
- 2014‑10‑29:
A quick intro to Rust macros.
- 2014‑10‑29:
Why the UK is being asked to pay €2 billion to the EU.
- 2014‑10‑29:
A survey comparison of Green and UKIP supporters.
- 2014‑10‑29:
The speed of the Python, Ruby, and Lua parsers.
- 2014‑10‑29:
Private sector bureaucracy is twice as wasteful as government red tape.
- 2014‑10‑29:
Cuckoo filters: practically better than Bloom.
- 2014‑10‑28:
The water clocks of Bernard Gitton.
- 2014‑10‑28:
UK High Court rules that ISPs must censor sites selling counterfeit goods.
- 2014‑10‑28:
ISC BIND developer information.
- 2014‑10‑28:
The drunk utilitarian.
- 2014‑10‑28:
Cray announced as supplier for new Met Office supercomputer.
- 2014‑10‑27:
A comic about seagulls.
- 2014‑10‑27:
A code of conduct is not enough to eliminate sexual harassment at a conference.
- 2014‑10‑27:
Stats from 72 hours of #gamergate on Twitter.
- 2014‑10‑27:
Be grateful for drizzle: high frequency trading.
- 2014‑10‑27:
Metacrap: putting the torch to seven straw-men of the metadata / semantic web utopia.
- 2014‑10‑27:
The crude UKIP/Tory assault on Europe strikes at the very heart of Enlightenment values.
- 2014‑10‑26:
New Jersey's e-vote experiment after Hurricane Sandy was a disaster.
- 2014‑10‑26:
The bottom 90 percent of Americans are poorer today than they were in 1987.
- 2014‑10‑26:
Wikipedia needs an IDE, not a WYSIWYG editor.
- 2014‑10‑26:
Mercurial revsets.
- 2014‑10‑26:
Some versions of Linux ldd are vulnerable to social engineering exploits.
- 2014‑10‑26:
Walter Bright on C's biggest mistake.
- 2014‑10‑26:
HiStar: securing untrustworthy software using information flow control.
- 2014‑10‑25:
Stealthy startup Soft Machines launches virtual CPU cores that trounce traditional processors.
- 2014‑10‑25:
USB armory: flash key sized open source computer for security applications.
- 2014‑10‑25:
Mailinator private domains.
- 2014‑10‑25:
Marginal tax rates of close to 90% on the top 1% of earners are optimal.
- 2014‑10‑25:
Don't run 'strings' on untrusted files.
- 2014‑10‑25:
Intellectual property, Jewish ethics, and Aaron Swartz.
- 2014‑10‑23:
Jan-Piet Mens on DNS.
- 2014‑10‑23:
Software engineers should keep lab notebooks.
- 2014‑10‑23:
Hackers are using micro-targeted ads to deliver malware to weapons manufacturers.
- 2014‑10‑23:
Microwaves are going solid state: say goodbye to the last mass-market vacuum tube product.
- 2014‑10‑23:
Trinity: a Linux syscall fuzzer.
- 2014‑10‑23:
The Radarange Collection: keeping the oldest microwave ovens working.
- 2014‑10‑22:
Hostile subdomain takeover using Heroku/Github/Desk + more.
- 2014‑10‑22:
New FTDI drivers are killing fake USB/serial chips.
- 2014‑10‑21:
Hints for writing Unix tools.
- 2014‑10‑21:
Xerox Alto source code.
- 2014‑10‑21:
Noether: programming language design based on preserving and carefully breaking symmetries.
- 2014‑10‑21:
Porting a raytracer from C++ to Rust.
- 2014‑10‑21:
A masterclass in epithets from an NFL player re gamergate.
- 2014‑10‑21:
The hidden Templar symbology of the OREO cookie.
- 2014‑10‑21:
Gamergate from another journalist's point of view.
- 2014‑10‑20:
Security collapse in the https market.
- 2014‑10‑19:
Cyclists should get a "toad tax" (vehicle excise duty) rebate.
- 2014‑10‑19:
Average number of languages spoken by people in each EU country.
- 2014‑10‑18:
Everything you need to know about cooking with blood.
- 2014‑10‑18:
Impending kOS: what happens when an APL implementer gets into systems programming.
- 2014‑10‑18:
A history of the octave.
- 2014‑10‑18:
Gamergate from a journalist's point of view.
- 2014‑10‑18:
The man who was too drunk to die.
- 2014‑10‑18:
Your language's writing system sucks.
- 2014‑10‑18:
Yosemite upgrade made slow by non-Apple files in /usr - tips and workarounds.
- 2014‑10‑18:
A myth-busting guide to UK crime statistics.
- 2014‑10‑18:
Autism as a disorder of prediction?
- 2014‑10‑18:
X.509 certificate revocation awareness test.
- 2014‑10‑18:
titus: totally isolated TLS unwrapping server.
- 2014‑10‑18:
The parents of #gamergate.
- 2014‑10‑17:
Stop Spotlight in Mac OS X Yosemite from sending all queries to Apple.
- 2014‑10‑17:
Gandi CLI: easily create and manage domains / certificates / VMs / etc. from the command line.
- 2014‑10‑17:
SSLmate: buy X.509 certificates from the command line.
- 2014‑10‑17:
FFS SSL.
- 2014‑10‑17:
American Fuzzy Lop: a practical instrumentation-driven fuzz tester.
- 2014‑10‑17:
Cambridge's Perne Road roundabout design.
- 2014‑10‑17:
Brain baloney has no place in the classroom / popular neuroscience myths.
- 2014‑10‑16:
Stop secret public sector contracts.
- 2014‑10‑16:
Morris dancing. Borderline racist?
- 2014‑10‑15:
South Korean ID system to be rebuilt from scratch.
- 2014‑10‑15:
Cryptic genetic variation in software: hunting a 41 year old bug in RANLIB.
- 2014‑10‑15:
Lockheed Skunk Works reveals compact fusion reactor details.
- 2014‑10‑15:
Separated by a common language: "twang".
- 2014‑10‑15:
Some POODLE notes.
- 2014‑10‑15:
POODLE attacks on SSLv3.
- 2014‑10‑15:
Mozilla security on the POODLE attack and the end of SSLv3.
- 2014‑10‑15:
POODLE SSLv3 vulnerability stats and recommended actions.
- 2014‑10‑15:
Mozilla recommendations for server TLS configuration.
- 2014‑10‑15:
How POODLE happened.
- 2014‑10‑15:
This POODLE bites: exploiting the SSL 3.0 fallback with a padding oracle attack.
- 2014‑10‑14:
CARDIAC: cardboard illustrative aid to computation.
- 2014‑10‑14:
Near miss project: investigating cycling safety.
- 2014‑10‑14:
World standards day.
- 2014‑10‑14:
DNS reverse lookup REMOTE_HOST environment variable shellshock.
- 2014‑10‑14:
99.99% uptime on a 9-to-5 schedule.
- 2014‑10‑14:
Alerting philosophy of a Google site reliability engineer.
- 2014‑10‑13:
Always bet on text.
- 2014‑10‑13:
Guerrilla capacity planning mantras.
- 2014‑10‑13:
When theft was worse than murder: centuries of trial documents reveal our changing attitudes to crime.
- 2014‑10‑13:
Logical fallacies: your baloney detection kit sucks.
- 2014‑10‑13:
cAPTain: a server for distributing site-local Debian packages.
- 2014‑10‑13:
aptly: manage a Debian mirror with version snapshots.
- 2014‑10‑12:
Blocked sewage pipe leads to power plant explosion and $500 million damage.
- 2014‑10‑12:
Rich command shells.
- 2014‑10‑11:
Document Liberation: open source software to read unsupported proprietary files.
- 2014‑10‑11:
EDNS compliance report.
- 2014‑10‑11:
Apache Spark breaks large-scale sort record.
- 2014‑10‑11:
The sub-2-hour marathon: who and when?
- 2014‑10‑11:
What will it take to run a sub-2-hour marathon?
- 2014‑10‑11:
Lzz: C++ .c/.h splitter for lazy programmers.
- 2014‑10‑10:
Why Elite matters.
- 2014‑10‑10:
EE, Vodafone, and Three give police mobile call records at click of a button.
- 2014‑10‑10:
Samsung's 3-bit 3D V-NAND enters mass production; cheaper SSDs on the horizon.
- 2014‑10‑10:
IX: a protected dataplane operating system for high throughput and low latency.
- 2014‑10‑10:
Intel's fsin instruction is horribly inaccurate.
- 2014‑10‑09:
Spritz: a spongy RC4-like stream cipher and hash function. (slides)
- 2014‑10‑09:
How gov.uk plans to verify your identity online.
- 2014‑10‑09:
Why Peak Oil predictions haven't come true.
- 2014‑10‑09:
New Tube trains and signalling for London.
- 2014‑10‑09:
Map of London. (1851)
- 2014‑10‑09:
The Clark-Wilson data security model.
- 2014‑10‑09:
A detailed examination of the Shellshock bash bug.
- 2014‑10‑08:
European Court of Human Rights strengthens anti-torture safeguards.
- 2014‑10‑08:
Meatball Wiki: What is a troll? Resources for moderators.
- 2014‑10‑08:
Evaluating student evaluations of university courses.
- 2014‑10‑08:
Linux containers and the future cloud.
- 2014‑10‑08:
Simple DNSSEC fact sheet.
- 2014‑10‑08:
Faster JavaScript parsing.
- 2014‑10‑08:
Building efficient query engines in Scala.
- 2014‑10‑08:
SQLite is now 50% faster than it was last year.
- 2014‑10‑07:
Rust means never having to close a socket.
- 2014‑10‑07:
A brief look at the security of Apple Pay.
- 2014‑10‑07:
Seven deadly sins when talking about types.
- 2014‑10‑07:
New class of vulnerability in Perl web apps: right operand of => evaluated in list context.
- 2014‑10‑06:
Schumpeterian Profits and the Alchemist Fallacy: most of the benefits of technological change are passed on to consumers rather than captured by producers.
- 2014‑10‑06:
The anti-smartphone beer glass. (video)
- 2014‑10‑06:
An open letter to anyone who has experienced my son's meltdowns.
- 2014‑10‑06:
What happens when evangelical christians debate climate change.
- 2014‑10‑06:
Polyphonic overtone singing: one person in harmony with herself.
- 2014‑10‑06:
The bacon craze was not an accident.
- 2014‑10‑05:
Postal censorship in England 1635-1844.
- 2014‑10‑05:
Vim blowfish encryption is broken.
- 2014‑10‑05:
Reversible, tiny, faster: Hands-on with the USB Type-C plug.
- 2014‑10‑05:
Routing meals on wheels using a space-filling curve.
- 2014‑10‑05:
"In 1976 I discovered Ebola, now I fear an unimaginable tragedy."
- 2014‑10‑05:
Standard sexist action movie plot.
- 2014‑10‑05:
Aboard the largest container ship, Mary Maersk.
- 2014‑10‑04:
Cisco rogue WiFi detection and jamming.
- 2014‑10‑04:
WiFi jamming via deauthentication packets.
- 2014‑10‑04:
The man who smuggles Traders Joe's into Canada.
- 2014‑10‑04:
Why don't students like school?
- 2014‑10‑04:
Mandos: unattended boot for servers with encrypted filesystems.
- 2014‑10‑04:
The Silk Road CAPTCHA configuration: a case of parallel construction?
- 2014‑10‑04:
Samsung V-NAND 3D vertical stacked flash cells.
- 2014‑10‑04:
Ikea's new toolless furniture.
- 2014‑10‑03:
The NSA and James Bamford.
- 2014‑10‑03:
Kim Jong-un is no longer in control of North Korea.
- 2014‑10‑02:
How I rewired my brain to become fluent in mathematics.
- 2014‑10‑02:
Moazzam Begg was prosecuted for "terrorism" activities that were agreed with MI5.
- 2014‑10‑02:
IBM discontinues Lotus 123. "There are no replacement programs."
- 2014‑10‑02:
Interactive map of every British railway line ever.
- 2014‑10‑02:
Why is exporting shell functions ever useful?
- 2014‑10‑02:
Seven digital deadly sins. (HTML5 video etc.)
- 2014‑10‑02:
It's no joke: humour is rarely welcome in research write-ups.
- 2014‑10‑02:
A fresh look at Rust.
- 2014‑10‑02:
Compile-time PostgreSQL query syntax checking for Rust.
- 2014‑10‑02:
Emergent info: tracking bullshit, like Snopes for Twitter.
- 2014‑10‑02:
"Not" neutrality?
- 2014‑10‑02:
Facebook's "cold storage" is literally as well as metaphorically cold.
- 2014‑10‑01:
More about the bash shellshock bugs, including the other two remote code execution vulnerabilities.
- 2014‑10‑01:
7,000 years older than Stonehenge: stone circles that predate agriculture.
- 2014‑09‑30:
Hacker News is a cesspit.
- 2014‑09‑30:
A review of the High Sierra shower head.
- 2014‑09‑30:
Idiomatic generics in golang as a service.
- 2014‑09‑30:
Opening the source repository with anonymous CVS.
- 2014‑09‑30:
Limitations of iOS 8 MAC address randomization.
- 2014‑09‑30:
Tory party wants to roll back weights and measures education to the 1800s.
- 2014‑09‑30:
Krakatoa made a sound so loud it circled the earth four times.
- 2014‑09‑30:
Postgres full-text search is good enough!
- 2014‑09‑29:
Most people addicted to drugs simply grow out of it.
- 2014‑09‑29:
DNSSEC: how far have we come?
- 2014‑09‑29:
The various unix shells.
- 2014‑09‑29:
Beyond the selfie stick: the personal photography drone.
- 2014‑09‑29:
Langsec: From "shotgun parsers" to more secure stacks.
- 2014‑09‑29:
Bash's parser is locale-sensitive.
- 2014‑09‑29:
E-cigarettes: a scientific review.
- 2014‑09‑29:
Bye bye Microsoft Research Silicon Valley.
- 2014‑09‑29:
Take the Red Pill *and* the Blue Pill: how to provide a trusted path for authenticating online transactions.
- 2014‑09‑29:
The start of the digital revolution at Bell Labs and the NSA: the SIGSALY system that inspired Shannon.
- 2014‑09‑28:
Writing high-performance .NET code.
- 2014‑09‑28:
ML programmer's guide to ATS.
- 2014‑09‑28:
LibreSSL: five months in.
- 2014‑09‑27:
Optimizing a compression algorithm's byte value histogram calculation.
- 2014‑09‑27:
systemd: the end of Linux?
- 2014‑09‑27:
Trademark case could set a precedent for website blocking.
- 2014‑09‑27:
Firefox's new privacy button.
- 2014‑09‑27:
The bash shellshock bug: a failure to apply formal grammars.
- 2014‑09‑27:
Why academics stink at writing.
- 2014‑09‑27:
How to write consistently boring scientific literature.
- 2014‑09‑27:
CVE-2014-6277: another bug in bash.
- 2014‑09‑27:
Penetration testing using DNS.
- 2014‑09‑27:
Automasymbolic differentiation.
- 2014‑09‑27:
About the PKCS#1 signature validation bug in NSS.
- 2014‑09‑27:
Developing software in a hostile environment: OpenBSD's experiences with exploit mitigation.
- 2014‑09‑27:
How to make error handling less error-prone: rescuing techniques from the 1970s.
- 2014‑09‑27:
Yahoo plans to kill the web index it was founded on.
- 2014‑09‑27:
The secret Goldman Sachs tapes reveal a supine Fed.
- 2014‑09‑27:
Breaking the Silk Road CAPTCHA.
- 2014‑09‑27:
xlwings: use Python instead of VBA in Excel.
- 2014‑09‑27:
Code highlighting should use different colours for each name.
- 2014‑09‑27:
John Carmack on big procedures and manually inlined code.
- 2014‑09‑26:
The great lightbulb conspiracy.
- 2014‑09‑25:
Left-Right: a concurrency control technique with wait-free population-oblivious reads.
- 2014‑09‑25:
Bill Weaver's Blackbird broke up around him at Mach 3+.
- 2014‑09‑25:
Nanotechnology leads to better, cheaper LEDs for phones and lighting.
- 2014‑09‑25:
How do male scientists balance the demands of work and family?
- 2014‑09‑25:
Neil Gaiman explains, Terry Pratchett isn't jolly. He's angry.
- 2014‑09‑25:
The SSD endurance experiment: only two remain after 1.5PB.
- 2014‑09‑24:
Oxytocin: the morality molecule.
- 2014‑09‑24:
Total moving face reconstruction.
- 2014‑09‑24:
Another patent troll slain. You are now free to rotate your smartphone.
- 2014‑09‑23:
Central Madrid bans non-resident cars.
- 2014‑09‑23:
Tonic Advance: promoting gender equality in theatres around Britain.
- 2014‑09‑23:
When good NICs do bad things: a blast of IPv6 multicast listener discovery queries.
- 2014‑09‑23:
Can you safely deliver entropy to a remote system?
- 2014‑09‑22:
Harmony: an LLVM profiling tool for tackling Amdahl's law.
- 2014‑09‑22:
Why Xenix 1.0 fails to run on an i386.
- 2014‑09‑22:
APNIC policy SIG chair resigns.
- 2014‑09‑21:
Why is Thomas Piketty's Capital a bestseller?
- 2014‑09‑21:
Uselessd: a stripped down systemd.
- 2014‑09‑21:
Lots of Lisp Machine links.
- 2014‑09‑21:
OpenGL in 2014.
- 2014‑09‑21:
Cattack: deter cats from messing up the garden.
- 2014‑09‑21:
What a can of Coke contains.
- 2014‑09‑20:
Futures aren't ersatz threads.
- 2014‑09‑20:
The Log: What every software engineer should know about real-time data's unifying abstraction.
- 2014‑09‑20:
Doing agile badly is cheaper than doing waterfall badly.
- 2014‑09‑20:
12 Java Snippets you won't believe actually compile.
- 2014‑09‑20:
Intel unveils new Xeon CPU with integrated FPGA.
- 2014‑09‑20:
Rust lifetimes: Getting away with things that would be reckless in C++.
- 2014‑09‑20:
The McDonald's cocaine spoon fiasco.
- 2014‑09‑20:
To get more out of science, show the rejected research.
- 2014‑09‑19:
Your iOS 8 data is not beyond law enforcement's reach - Yet.
- 2014‑09‑19:
Open source font development tools from Adobe.
- 2014‑09‑19:
Gandi CLI is now open source.
- 2014‑09‑19:
numdiff: show numeric differences between files.
- 2014‑09‑19:
CloudFlare keyless SSL.
- 2014‑09‑19:
Victims of .prod gTLD name collisions respond "fuck Google!".
- 2014‑09‑19:
Signed pushes for git.
- 2014‑09‑19:
Charlieplexed LED displays.
- 2014‑09‑19:
Thoughts on five years of the Emerging Languages conference.
- 2014‑09‑19:
Apple's warrant canary disappears.
- 2014‑09‑19:
Erlang in anger.
- 2014‑09‑19:
A scientist stole my root beer.
- 2014‑09‑19:
Tweet a program in the Wolfram language.
- 2014‑09‑18:
Privacy violations using microtargeted ads: a case study.
- 2014‑09‑18:
Pranking a roommate with eerily targeted Facebook ads.
- 2014‑09‑18:
sshrc: bring your dotfiles with you when you ssh.
- 2014‑09‑18:
Understanding weak isolation of database transactions is a serious problem.
- 2014‑09‑18:
Smoking rates increase in New York after e-cigs are banned.
- 2014‑09‑18:
Power of Optics: a chain reaction machine video.
- 2014‑09‑17:
Five large UK government contracts are being investigated for fraud.
- 2014‑09‑17:
What you need to know about the C++14 standard.
- 2014‑09‑17:
Where do children's earliest memories go?
- 2014‑09‑17:
Upgrading Github to Rails 3.0 with zero downtime.
- 2014‑09‑17:
Galt's Gulch Chile libertarian utopia falls apart almost immediately.
- 2014‑09‑16:
What you might learn when you become the Internet's most hated person.
- 2014‑09‑16:
How the super-rich got richer: inequality in the UK.
- 2014‑09‑16:
Lessons from real-life revolutions that fictional dystopias ignore.
- 2014‑09‑16:
Who killed lard?
- 2014‑09‑16:
Incremental garbage collection: the train algorithm.
- 2014‑09‑16:
Incremental mature garbage collection using the train algorithm.
- 2014‑09‑16:
The courts have greatly restricted the Information Commissioner's powers to fight spam texts.
- 2014‑09‑16:
Gmail accounts can take days to sync over IMAP.
- 2014‑09‑16:
Netflix has a new slogan: Chaos Engineering.
- 2014‑09‑16:
Desmos graphing calculator.
- 2014‑09‑16:
Press and hold a key to get a mathematical symbol.
- 2014‑09‑16:
Mathway
- 2014‑09‑16:
MATHJQ: WYSIWYG equation editor supporting MathML and LaTeX.
- 2014‑09‑16:
A visual equation editor.
- 2014‑09‑16:
Online handwritten equation recognizer.
- 2014‑09‑16:
Windows math input panel typesets handwritten equations.
- 2014‑09‑16:
Detexify: handwritten symbol recognition for LaTeX.
- 2014‑09‑16:
ASCIIMathML.js translates ASCII math notation to MathML and graphics.
- 2014‑09‑16:
ASCIIMathML: mathematical markup without the backslashes.
- 2014‑09‑16:
KaTeX: The fastest mathematics typesetting library for the web.
- 2014‑09‑15:
Mailpile enters beta. It's like Gmail, but you run it on your own computer.
- 2014‑09‑15:
The road to Rust 1.0.
- 2014‑09‑15:
Android browser up to version 4.4 has easy JavaScript same-origin policy bypass.
- 2014‑09‑15:
"You just chip away everything that doesn't look like David."
- 2014‑09‑15:
Schizophrenia not a single disease but multiple genetically distinct disorders.
- 2014‑09‑15:
Types don't know #: type-independent hashing for C++
- 2014‑09‑15:
What the Internet's most infamous trolls tell us about online feminism.
- 2014‑09‑15:
Notch is leaving Mojang and Minecraft.
- 2014‑09‑15:
Atchafalaya: sinking Louisiana. (1987)
- 2014‑09‑15:
Ghostbusters is the best comedy ever made about the limits of the Lovecraftian worldview.
- 2014‑09‑14:
Why is it taking so long to secure BGP?
- 2014‑09‑14:
Onity wins: hotels don't have standing to sue them over their easily hacked locks.
- 2014‑09‑14:
Wears jump suit. Sensible shoes. Uses husband's last name. Marked women, unmarked men.
- 2014‑09‑14:
Fifteenth anniversary of the Cluetrain Manifesto.
- 2014‑09‑14:
Algomation: animated algorithms.
- 2014‑09‑14:
Get a copy of the New York City Transit Authority Graphic Standards Manual.
- 2014‑09‑13:
A free qemu image of Coherent Unix.
- 2014‑09‑13:
Certificate Transparency in ACM Queue.
- 2014‑09‑13:
Software patents are crumbling, thanks to the Supreme Court.
- 2014‑09‑13:
The Rust Guide.
- 2014‑09‑13:
Louisiana is sinking into the Gulf of Mexico.
- 2014‑09‑12:
Rich, educated and stupid parents are driving the vaccination crisis.
- 2014‑09‑12:
Superbugs meet their match in rapid genome sequencing.
- 2014‑09‑12:
Exploring TLA+ with two-phase commit.
- 2014‑09‑12:
iPhone 6 screens demystified.
- 2014‑09‑12:
The curious case of the iPhone 6+ 1080p display.
- 2014‑09‑12:
Hands on with USB type C reversible connectors.
- 2014‑09‑12:
Probable DNS cache poisoning of mail handling domains.
- 2014‑09‑12:
US Government threatened to fine Yahoo $250,000 per day for not complying with PRISM.
- 2014‑09‑12:
Death of RAID predicted, film at 11.
- 2014‑09‑12:
netresolv: libc resolver, descendent of libbind.
- 2014‑09‑12:
When no redundancy is more reliable than RAID 5.
- 2014‑09‑12:
A termination detection algorithm for distributed computations.
- 2014‑09‑12:
When random is better: parallel file tree walking.
- 2014‑09‑12:
dcp: copy files in parallel on a distributed system.
- 2014‑09‑12:
Problems copying lots of files with GNU cp: massive time and memory overhead.
- 2014‑09‑12:
Copyright law offers such powerful remedies that it is increasingly being used in non-copyright cases.
- 2014‑09‑12:
Dan Bricklin on disconnected mobile database apps.
- 2014‑09‑11:
CAMRA's Good Beer Guide 2015 shows UK has most breweries per head of population.
- 2014‑09‑11:
How the US DoD DREN selects IPv6 capable suppliers.
- 2014‑09‑11:
Firefox add-on enables web developer tools on other browsers and devices.
- 2014‑09‑11:
Parliament without Scottish MPs: how would it have looked different since 1997?
- 2014‑09‑11:
Hiding a WiFi network makes its mobile clients broadcast SSID probes instead of the AP.
- 2014‑09‑11:
The character of physical law: Feynman's Messenger Lectures at Cornell, 1964.
- 2014‑09‑11:
D-Wave: the revolutionary quantum computer that may not be quantum at all.
- 2014‑09‑11:
No quantum speed-up from D-Wave computers?
- 2014‑09‑10:
Apple Pay's identification revolution.
- 2014‑09‑10:
Why we fight wars.
- 2014‑09‑10:
America's climate swerve.
- 2014‑09‑10:
The curious case of the cyclist's shaven legs.
- 2014‑09‑10:
Perspectives on Brewer's CAP theorem.
- 2014‑09‑10:
git-as-svn: a svn server daemon with a git repository backend.
- 2014‑09‑10:
How Apple Pay works and why it matters for developers.
- 2014‑09‑10:
Power Dive into the danger zone: copyright and 555uHz.
- 2014‑09‑09:
The design of the REXX programming language.
- 2014‑09‑09:
The London Hydraulic Power Company's extensive mains network.
- 2014‑09‑09:
C100M: 100 million clients, 6.5 million requests per second, with userland TCP+HTTP.
- 2014‑09‑09:
openSUSE gardened: Linux kernel with SUSE and grsec patches.
- 2014‑09‑09:
Portal power: free energy with railway technology.
- 2014‑09‑09:
The real Men in Black, Hollywood, and the great UFO cover-up.
- 2014‑09‑09:
Socratic electronics.
- 2014‑09‑09:
All about circuits.
- 2014‑09‑09:
Google is pushing web sites to upgrade from SHA-1.
- 2014‑09‑09:
What the online security experts tell their kids about Internet safety.
- 2014‑09‑08:
How upvotes and downvotes shape user behaviour.
- 2014‑09‑08:
When your prey's in a hole and you don't have a pole, use a moray.
- 2014‑09‑08:
OpenSSL security policy.
- 2014‑09‑08:
IPv6 neighbor discovery problems with layer 2 multicast state.
- 2014‑09‑08:
Recommended reading on computer security.
- 2014‑09‑08:
Notes from the development of xkcd's "Pixels".
- 2014‑09‑07:
The design and implementation of probabilistic programming languages.
- 2014‑09‑07:
Solarpunk: notes toward a manifesto.
- 2014‑09‑07:
Alien Contact: a comic on gender roles.
- 2014‑09‑07:
Twitter should not algorithmically curate the timeline.
- 2014‑09‑07:
The phantom menace of militant atheism.
- 2014‑09‑07:
IPv6 doom at MIT: the network nightmare that ate a week.
- 2014‑09‑07:
YunoHost is a server operating system aiming to make self-hosting accessible to everyone.
- 2014‑09‑07:
iRedMail: free, open source mail server solution for Linux/BSD.
- 2014‑09‑07:
How to run your own e-mail server with your own domain.
- 2014‑09‑07:
Sovereign: Ansible playbooks for personal replacements for cloud services.
- 2014‑09‑07:
Mail-in-a-Box.
- 2014‑09‑06:
Reverse engineering a counterfeit 7805 voltage regulator IC.
- 2014‑09‑06:
300 (and more) flat-out evil lies: David Brin on Frank Miller's sequel.
- 2014‑09‑06:
Designing analog chips.
- 2014‑09‑06:
Water's edge: the crisis of rising sea levels.
- 2014‑09‑06:
33 things to do before climate change ruins everything.
- 2014‑09‑06:
The ramifications of the SCotUS "Alice" patent legality decision.
- 2014‑09‑06:
Bullet Journal: a paper note-taking system.
- 2014‑09‑06:
Designing a personal knowledgebase.
- 2014‑09‑06:
Modern anti-spam and E2E crypto.
- 2014‑09‑06:
Why Amazon has no profits (and why it works).
- 2014‑09‑06:
Memorizing "$19.05" helps you outsmart the New York MTA.
- 2014‑09‑06:
Why a dead alkaline battery bounces more than a fresh one.
- 2014‑09‑06:
Walking helps us think.
- 2014‑09‑06:
Zeroing buffers is insufficient.
- 2014‑09‑05:
Adding bike lanes in New York actually reduced traffic delays.
- 2014‑09‑05:
The kind of story Facebook's algorithm finds positively toxic.
- 2014‑09‑05:
Irish postcodes at last but random numbers don't address efficiency.
- 2014‑09‑05:
Twitter CFO promises to kill its main selling point.
- 2014‑09‑04:
How to zero a buffer. (Interesting volatile trick.)
- 2014‑09‑04:
Ten surprises from numerical linear algebra.
- 2014‑09‑04:
Better identification of Viking corpses reveals many of the warriors were female.
- 2014‑09‑04:
Answers to 10 frequent comments on feminist blogposts.
- 2014‑09‑04:
Notes on the celebrity nude photo data theft.
- 2014‑09‑04:
vfmd: Markdown with a formal spec.
- 2014‑09‑04:
Standard markdown.
- 2014‑09‑04:
The few tough species known to survive the rigors of space.
- 2014‑09‑04:
Visualizing garbage collection algorithms.
- 2014‑09‑04:
DHCP client problems on systems with no battery backed clock.
- 2014‑09‑03:
UK Government bans all schools from teaching creationism as science.
- 2014‑09‑03:
A brief history of AUTODIN. (1973)
- 2014‑09‑03:
Recalling the AUTODIN.
- 2014‑09‑03:
The origins of network mail.
- 2014‑09‑03:
Email history through RFCs.
- 2014‑09‑03:
Bitsquatting: DNS hijacking via bit error name corruption.
- 2014‑09‑03:
An epic rant about nude photos.
- 2014‑09‑03:
A call for a low-carb diet that embraces fat.
- 2014‑09‑02:
High performance packet filtering with pflua.
- 2014‑09‑02:
Why is Huffington Post running a multi-part series promoting a guy who pretends he invented email?
- 2014‑09‑02:
Limits to Growth was right. New research shows we're nearing collapse.
- 2014‑09‑02:
The C book.
- 2014‑09‑02:
On teaching introductory computer science using "How To Design Programs".
- 2014‑09‑02:
Formal methods in safety-critical railway systems.
- 2014‑09‑02:
Rationale for the design of the Ada programming language.
- 2014‑09‑02:
Invertible Bloom lookup tables.
- 2014‑09‑01:
On the origins of "fuck", part 2: but what about the "d"?
- 2014‑09‑01:
btrfs as a Linux packaging system.
- 2014‑09‑01:
End-to-end arguments in the Internet: principles, practices, and theory. (test IDN link)
- 2014‑09‑01:
A Minnesota man built a 3D printed concrete folly in his back garden.
- 2014‑09‑01:
Digi-Comp II: wooden ball-bearing toy computer.
- 2014‑09‑01:
A culture of innovation: insider accounts of computing and life at BBN.
- 2014‑09‑01:
End-to-end arguments in the Internet: principles, practices, and theory.
- 2014‑09‑01:
Resurrection of the 1973 ARPANET IMP code.
- 2014‑09‑01:
A technical history of the ARPANET.
- 2014‑09‑01:
In TCP, we have a model: Sender --(miracle)-- Receiver.
- 2014‑08‑31:
London maps: a unique view of the capital through classic cartography.
- 2014‑08‑31:
US telecoms giants call on FCC to block cities' expansion of high-speed internet.
- 2014‑08‑31:
libco: coroutines for C89.
- 2014‑08‑31:
Resizeable arrays in optimal time and space.
- 2014‑08‑31:
Facebook's optimized std::vector replacement.
- 2014‑08‑31:
States with medical marijuana have fewer painkiller deaths.
- 2014‑08‑30:
Last call: there is no future for printed newspapers.
- 2014‑08‑30:
Mass and length may not be fundamental properties of nature, according to new ideas bubbling out of the multiverse.
- 2014‑08‑30:
Robert Lustig argues sugar is poison.
- 2014‑08‑30:
Readings in databases.
- 2014‑08‑30:
Inside Google's secret drone-delivery development program.
- 2014‑08‑30:
Coffee naps are better than coffee or naps alone.
- 2014‑08‑29:
The downfall of Motorola.
- 2014‑08‑29:
Keurig competitors have cracked their coffee DRM system.
- 2014‑08‑29:
Networks all the way down, part 2.
- 2014‑08‑29:
Why haven't China's cities learned from America's mistakes?
- 2014‑08‑29:
Five reasons Belgium has the worst traffic in Europe.
- 2014‑08‑29:
Networks all the way down: the death of the bus.
- 2014‑08‑28:
Student-built apps teach colleges a thing or two.
- 2014‑08‑28:
Google's proposal for OpenPGP key distribution for their end-to-end browser extension.
- 2014‑08‑28:
Call-by-meaning: applying the semantic web to APIs.
- 2014‑08‑28:
Outside the closed world: on using machine learning for network intrusion detection.
- 2014‑08‑28:
The CryptoPhone 500 detects IMSI catchers.
- 2014‑08‑28:
First observation of sliding rocks in motion on Racetrack Playa, Death Valley National Park.
- 2014‑08‑27:
Vermont tones down War on Drugs to treat heroin as health issue.
- 2014‑08‑27:
Proposal for a friendly dialect of C.
- 2014‑08‑27:
NSEC5: provably preventing DNSSEC zone enumeration.
- 2014‑08‑27:
The Mathematical Pirate's guide to factorizing cubics.
- 2014‑08‑26:
The poisoned NUL byte exploit, 2014 edition.
- 2014‑08‑26:
Summer school on hashing theory and applications.
- 2014‑08‑26:
JavaScript: Servo's only garbage collector.
- 2014‑08‑26:
25 words that describe other words.
- 2014‑08‑26:
Some "dark patterns" of underhanded e-commerce are now illegal in the UK.
- 2014‑08‑26:
The relative cost of bandwidth around the world.
- 2014‑08‑25:
The origin of death.
- 2014‑08‑25:
Unofficial bash strict mode.
- 2014‑08‑25:
How much wine was lost in the Napa Valley earthquake?
- 2014‑08‑25:
What is the deal with NULL in SQL?
- 2014‑08‑25:
The poorest regions of Northern Europe are in the UK.
- 2014‑08‑25:
Side platforms vs island platforms.
- 2014‑08‑25:
Atomic accidents.
- 2014‑08‑25:
A review of the Philips Hue LED lighting system: the future of lighting?
- 2014‑08‑25:
A review of nuclear criticality accidents.
- 2014‑08‑25:
What happens when you stop clicking "like" on Facebook.
- 2014‑08‑25:
C/C++ development environment for Emacs.
- 2014‑08‑25:
Slavery lasted until Pearl Harbor.
- 2014‑08‑25:
Not a Tea Party, a Confederate Party.
- 2014‑08‑24:
FOX TWO: the AIM-9 Sidewinder air-to-air missile.
- 2014‑08‑24:
All life is contained in CROBOTS: the effectiveness of simple battle tactics.
- 2014‑08‑23:
How the woman got her period.
- 2014‑08‑23:
Optimizing seed selection for fuzzing.
- 2014‑08‑23:
Six points about type safety.
- 2014‑08‑23:
How to be a fan of problematic things.
- 2014‑08‑23:
"Escalator" was originally a trademark of the Otis elevator company.
- 2014‑08‑23:
A Lego calendar, with photo-to-iCalendar conversion software.
- 2014‑08‑23:
Most of the IKEA catalogue pictures are computer graphics not photography.
- 2014‑08‑22:
Only 1 percent of "terrorists" caught by the FBI are real.
- 2014‑08‑22:
NuSI: Gary Taubes' nutrition science initiative.
- 2014‑08‑22:
Most Americans want to criminalize pre-teens playing unsupervised.
- 2014‑08‑22:
You can watch an 'unaltered' version of Star Wars in HD today, if you bend the law.
- 2014‑08‑22:
Canadian government suppresses scientific reports on polar melt.
- 2014‑08‑22:
Linux performance tools.
- 2014‑08‑22:
The invisible chair that you can wear.
- 2014‑08‑22:
An intro to Linux ftrace and perf-tools.
- 2014‑08‑21:
How Scotland might be robbed.
- 2014‑08‑21:
The importance of vaccination; also, zombies.
- 2014‑08‑21:
How about solarpunk?
- 2014‑08‑21:
Why Racket? Why Lisp?
- 2014‑08‑21:
40 maps that explain the Roman Empire.
- 2014‑08‑21:
fork() can fail.
- 2014‑08‑21:
Gyrophone: recognizing speech using a phone's gyroscope.
- 2014‑08‑20:
It is amusingly easy to hack traffic lights.
- 2014‑08‑20:
Spritz: a spongy RC4-like stream cipher and hash function.
- 2014‑08‑20:
RetroBSD: unix for microcontrollers.
- 2014‑08‑20:
Sunil Dutta tells it like it is about American policing.
- 2014‑08‑20:
How cops became soldiers: an interview with police militarization expert Radley Balko.
- 2014‑08‑20:
Patent troll king Intellectual Ventures sacks 20% of its staff.
- 2014‑08‑20:
Nyms Identity Directory: an alternative to the PGP web of trust.
- 2014‑08‑20:
VisuAlgo: visualising data structures and algorithms through animation.
- 2014‑08‑20:
Frogsort as an exam question.
- 2014‑08‑19:
Star Wars: The Despecialized Edition.
- 2014‑08‑19:
What law enforcement needs to understand about Ferguson.
- 2014‑08‑19:
The definition of Standard ML. (Now available as free PDFs.)
- 2014‑08‑19:
We have C++14!
- 2014‑08‑19:
The problem with NTP.
- 2014‑08‑17:
Why the option type is better than nullable types.
- 2014‑08‑17:
The City of London: a tax haven in the heart of Britain.
- 2014‑08‑17:
Removing centre lines from roads significantly decreases traffic speed.
- 2014‑08‑17:
UNGOV.UK: Policymaking is broken. Together we can fix it.
- 2014‑08‑16:
Bankers make electricity more expensive when people most need it.
- 2014‑08‑16:
PSA prostate screening is inaccurate and a waste of money.
- 2014‑08‑16:
Viking ship discovered near Mississippi River.
- 2014‑08‑16:
Genetic study supports link between carbohydrate digestion and obesity.
- 2014‑08‑16:
What our most famous evolutionary cartoon gets wrong.
- 2014‑08‑16:
Utopian for beginners: John Quijada and his conlang Ithkuil.
- 2014‑08‑15:
Could hemp nanosheets topple graphene for making the ideal supercapacitor?
- 2014‑08‑15:
Fifty Tom Swifties.
- 2014‑08‑15:
Fifty years since the last death penalty in Britain.
- 2014‑08‑15:
What's the matter with PGP?
- 2014‑08‑14:
Mitro releases a new free and open source password manager.
- 2014‑08‑14:
Law students defeat a patent troll.
- 2014‑08‑14:
Erratum prompts Intel to disable TSX in Haswell and early Broadwell CPUs.
- 2014‑08‑14:
Print this file, your printer will jam.
- 2014‑08‑14:
Humans need not apply. (YouTube)
- 2014‑08‑14:
Security as a class of interface guarantee.
- 2014‑08‑14:
Security ceremony design and analysis.
- 2014‑08‑13:
When the NSA accidentally cut Syria off the net.
- 2014‑08‑13:
James Bamford interviews Edward Snowden.
- 2014‑08‑13:
Just kill all of the comments already.
- 2014‑08‑13:
An American doctor experiences an NHS emergency room.
- 2014‑08‑13:
Salt: the secret ingredient in your cocktail.
- 2014‑08‑13:
First cordon sanitaire in a century: west African countries quarantine Ebola regions.
- 2014‑08‑13:
Internet touches 512k BGP prefixes: outages possible next week.
- 2014‑08‑13:
Swedish dad takes gamer kids to warzone.
- 2014‑08‑13:
512k BGP prefixes caused today's Internet hiccup.
- 2014‑08‑13:
Cisco Catalyst 6500 and 7600 TCAM routing table size adjustment procedures.
- 2014‑08‑13:
Ants in telecommunications equipment.
- 2014‑08‑13:
BGP reaches 512k prefix limit in old Cisco routers; Internet breaks.
- 2014‑08‑13:
The Matasano crypto challenges.
- 2014‑08‑12:
Automated proof of Kepler's sphere packing conjecture using Isabelle and HOL.
- 2014‑08‑12:
A DNS failure that turned tracking analytics into adware redirects.
- 2014‑08‑12:
The copyright molly: making a living as a creator was always difficult; stronger copyright doesn't fix it.
- 2014‑08‑12:
Tiny reversible USB Type-C connector finalized.
- 2014‑08‑12:
Things that sometimes help if you have depression.
- 2014‑08‑12:
What happens when you "like" everything you see on Facebook.
- 2014‑08‑12:
Australia sees large fall in smoking after introduction of standardised packs.
- 2014‑08‑12:
Medical research: What is a conflict of interest anyway?
- 2014‑08‑12:
The Canadian Bitcoin BGP hijack.
- 2014‑08‑12:
This is the face of my mental illness.
- 2014‑08‑11:
The crooked ladder: the gangster's guide to upward mobility.
- 2014‑08‑11:
Safely composable type-specific programming languages.
- 2014‑08‑10:
Distributed systems theory for the distributed systems engineer.
- 2014‑08‑10:
The man who can see the Internet: a profile of Renesys.
- 2014‑08‑10:
Security of OS-level virtualization technologies.
- 2014‑08‑10:
When is one thing equal to some other thing?
- 2014‑08‑10:
Secrets of amazing teachers: What both sides of the education reform debate get wrong about autonomy and accountability.
- 2014‑08‑10:
The agricultural revolution 10,000 years ago that wasn't.
- 2014‑08‑10:
Haskell Backpack: What's a module system good for anyway?
- 2014‑08‑09:
The origin of the term 0day in hacking.
- 2014‑08‑09:
Earl Grey tea intoxication.
- 2014‑08‑09:
Hacker used BGP attack against 19 ISPs to steal bitcoins.
- 2014‑08‑08:
Understanding Clojure transducers through types.
- 2014‑08‑08:
Worst API ever.
- 2014‑08‑08:
p5.js: Processing re-done for the web. (Follow the Hello! link.)
- 2014‑08‑06:
The study of adjective order and GSSSACPM.
- 2014‑08‑06:
Twitter won't stop harassment, so its users are making apps to help.
- 2014‑08‑06:
An inventor who is working on ultrasound / piezoelectric wireless chargers.
- 2014‑08‑06:
Breaking the GameBoy Tetris world record.
- 2014‑08‑06:
TCP and its lower bound on web latency.
- 2014‑08‑06:
3D object manipulation in a 2D photograph using stock 3D models.
- 2014‑08‑06:
Dutch roads have speed-measuring induction loops. It's open data: here's a map.
- 2014‑08‑05:
Malicious SHA-1: tweaked constants allow easy collisions.
- 2014‑08‑05:
Ansible vs SaltStack.
- 2014‑08‑04:
Robot exoskeletons in Korean shipyards.
- 2014‑08‑04:
Venn diagrams vs Euler diagram vs lolcircles.
- 2014‑08‑04:
When "colourless green ideas sleep furiously" makes sense.
- 2014‑08‑04:
Some universities are successful at drawing women to computer science.
- 2014‑08‑03:
Your 'craft' whiskey is probably from a factory distillery in Indiana.
- 2014‑08‑03:
Remy: computer-generated congestion control algorithms for TCP.
- 2014‑08‑03:
theft: property-based testing for C.
- 2014‑08‑03:
Breaking antivirus software.
- 2014‑08‑03:
If all the ice melted: interactive map.
- 2014‑08‑03:
"Theater" vs. "theatre": the great New York Times language swap.
- 2014‑08‑03:
Police files reveal endemic corruption in the Met.
- 2014‑08‑03:
Decentralization: I want to believe.
- 2014‑08‑03:
The telehash protocol: secure decentralized overlay network.
- 2014‑08‑02:
Cold War strategies are back, but now Russia is more like North Korea.
- 2014‑08‑02:
Gerry Judah: amazing sculptures for the Goodwood festival of speed and elsewhere.
- 2014‑08‑02:
European Commission consultation on copyright reveals chasm between views of public and publishers.
- 2014‑08‑02:
Quantifying Comcast's monopoly power.
- 2014‑08‑02:
Barriers faced by newcomers to open source projects: a systematic review.
- 2014‑08‑01:
Learning how to think about computer system security after a breach.
- 2014‑08‑01:
Middlebox vendors campaigning to kill multipath TCP.
- 2014‑08‑01:
Private copying exception faces possible legal action from music industry.
- 2014‑08‑01:
Why were CERT researchers attacking Tor?
- 2014‑08‑01:
Seven habits of highly fraudulent users.
- 2014‑08‑01:
The impossible music of black MIDI.
- 2014‑07‑31:
Doctor delivers $1.2 billion blow to tobacco, and counting.
- 2014‑07‑31:
Why local state is a fundamental primitive in stream processing.
- 2014‑07‑31:
Debit card override hack.
- 2014‑07‑31:
From Concorde to the iPhone, state intervention drives technological innovation.
- 2014‑07‑31:
Errors by FBI forensic lab found in nearly every case that has been reviewed.
- 2014‑07‑31:
Why many programmers don't bother joining the ACM.
- 2014‑07‑30:
Podcasting patent troll fails to drop lawsuit against Adam Carolla.
- 2014‑07‑30:
We now know how to get to the moon more efficiently than Apollo.
- 2014‑07‑30:
Private copying: a new copyright exception in the UK.
- 2014‑07‑30:
The Pirate Party: how downloading copyright material turned into a political movement.
- 2014‑07‑30:
seL4 secure microkernel.
- 2014‑07‑29:
The suburbs will die: sprawl is like a Ponzi scheme.
- 2014‑07‑29:
Under-25s are better behaved than ever.
- 2014‑07‑29:
Using category theory to design implicit conversions and generic operators.
- 2014‑07‑29:
A MITM proxy for backdooring any Java libraries downloaded from Maven Central.
- 2014‑07‑28:
Impossible engineering problems often aren't: timeseries processing by Scalyr.
- 2014‑07‑28:
RISKS of digital key reproduction services.
- 2014‑07‑28:
Gender decoder for job ads.
- 2014‑07‑28:
BBC R&D test IP studio ultra-HD Commonwealth Games multicast over JANET.
- 2014‑07‑28:
Alphabetical order explained in a mere 27,817 words.
- 2014‑07‑28:
The gratuitous injustice of American tipping culture.
- 2014‑07‑28:
What is 25 Gbit Ethernet and why would you want it?
- 2014‑07‑27:
Repeal prohibition again, says the New York Times.
- 2014‑07‑27:
Gay marriage went from unthinkable to inevitable.
- 2014‑07‑27:
Councils can no longer exclude the press and public from their meetings.
- 2014‑07‑27:
"Learning to Read" by Malcolm X.
- 2014‑07‑26:
The typical US household is worth 1/3 less than 10 years ago.
- 2014‑07‑26:
400th anniversary of logarithms.
- 2014‑07‑26:
A guaranteed income would eliminate poverty and it wouldn't destroy the economy.
- 2014‑07‑26:
Better explained mathematical insights.
- 2014‑07‑25:
How Marvel became the envy (and scourge) of Hollywood.
- 2014‑07‑25:
The Apple backdoor that wasn't.
- 2014‑07‑25:
The secret of Minecraft.
- 2014‑07‑25:
Macroscopic quantum objects cannot exist if P≠NP.
- 2014‑07‑25:
Government agents are directly involved in most US terrorism plots.
- 2014‑07‑25:
Long-hidden photos reveal construction of Cambridge University Library.
- 2014‑07‑25:
True Names.
- 2014‑07‑25:
Hotel WiFi test.
- 2014‑07‑25:
The network is reliable.
- 2014‑07‑24:
After the trending: coping with sudden notoriety.
- 2014‑07‑24:
What Is Public?
- 2014‑07‑24:
IPFS: the permanent web.
- 2014‑07‑24:
Apple confirms iOS back doors, and downplays their severity.
- 2014‑07‑24:
Warwick University charges one of its professors with insubordination.
- 2014‑07‑24:
Measuring IPv6 adoption.
- 2014‑07‑24:
The Little Box Challenge: an open competition to build a much smaller power inverter.
- 2014‑07‑24:
Authoritarianism and "social justice warriors".
- 2014‑07‑23:
Wireless home alarms are easy to hack.
- 2014‑07‑23:
Terminator 2 and the world's biggest spoiler.
- 2014‑07‑23:
How recursion got into programming: a comedy of errors.
- 2014‑07‑23:
Metrics-driven development.
- 2014‑07‑23:
Comcast reaches key milestone in launch of IPv6 broadband network.
- 2014‑07‑22:
Ark: a real-world distributed consensus implementation.
- 2014‑07‑22:
New material generates steam from the sun more efficiently.
- 2014‑07‑22:
US ISPs argue that the public sector is unfairly cheaper and better.
- 2014‑07‑21:
FTL: WebKit's fourth-tier LLVM-based JavaScript JIT.
- 2014‑07‑21:
The modern bathroom is a wasteful unhealthy design.
- 2014‑07‑21:
Domain Registry of America Inc. (NameJuice etc.) suspended by ICANN.
- 2014‑07‑21:
A Lisper's first impression of Julia.
- 2014‑07‑19:
Identifying back doors, attack points, and surveillance mechanisms in iOS devices.
- 2014‑07‑18:
How to link to specific lines of code on GitHub.
- 2014‑07‑18:
Lettering with Lego.
- 2014‑07‑17:
perl -le 'print(two + two == five ? "true" : "false")'
- 2014‑07‑17:
Cryptocurrencies without proof of work.
- 2014‑07‑17:
Perfect pilfering: how HFT rigs the market, examined from a data-centric approach.
- 2014‑07‑17:
How the Bootstrap 3 grid works.
- 2014‑07‑16:
GPS and relativity.
- 2014‑07‑16:
How Cambridge University's public WiFi handled the Tour de France.
- 2014‑07‑16:
Google+ drops its "real names" policy.
- 2014‑07‑15:
gpg-edit-recpients: add or remove public-key encrypted session key packets without decrypting entire file.
- 2014‑07‑14:
xxHash: extremely fast hash algorithm.
- 2014‑07‑14:
Updates to X.509 certificate verification in Firefox. (95% code reduction!)
- 2014‑07‑14:
NIST review of the Dual EC DRBG standardisation failure.
- 2014‑07‑14:
A tu / vous flow chart for Bastille day.
- 2014‑07‑14:
OCaml-TLS: the protocol implementation and mitigations to known attacks.
- 2014‑07‑14:
Why Rust is called Rust.
- 2014‑07‑14:
Rust for functional programmers.
- 2014‑07‑13:
The user interface design trends that we love to hate.
- 2014‑07‑12:
A more fundamental International System of Units.
- 2014‑07‑12:
All the widgets: a history of GUIs. (Vimeo)
- 2014‑07‑12:
Xplain: how X11 works (with in-browser demos).
- 2014‑07‑12:
Performance pitfalls of object oriented programming.
- 2014‑07‑11:
Unikernels: library operating systems for the cloud.
- 2014‑07‑11:
Disclosing Internet peering agreements creates anticompetitive risks.
- 2014‑07‑11:
Does the UK's emergency DRIP data retention bill violate the EU Charter of Fundamental Rights?
- 2014‑07‑11:
Slay a nightmare, with science!
- 2014‑07‑10:
Integrating dependent and linear types.
- 2014‑07‑10:
Multicolour fonts and colorful typography on the web.
- 2014‑07‑10:
Anti-patterns in Python programming.
- 2014‑07‑10:
Color Emoji in Windows 8.1: vector glyphs not PNG.
- 2014‑07‑09:
netresolve: non-blocking name resolution intended to replace NSS in glibc.
- 2014‑07‑09:
USPTO grants two patents on the DNS.
- 2014‑07‑09:
The value of a dangling pointer is indeterminate in C.
- 2014‑07‑09:
Brave men take paternity leave: take-up snowballs after early adopters show the way.
- 2014‑07‑09:
German BPjM-Modul Internet censorship URL blacklist leaked.
- 2014‑07‑08:
OCaml-TLS demo server with interactive live protocol trace.
- 2014‑07‑08:
Corrupt personalization: the dangers of the algorithmic social media bubble.
- 2014‑07‑08:
The tail at scale: low latency distributed systems at Google.
- 2014‑07‑08:
The return of Microsoft Office VBA macro viruses.
- 2014‑07‑08:
Former head of MI6 says Islamic threats exaggerated by government and media.
- 2014‑07‑08:
Alloy: a language and tool for analysing relational models.
- 2014‑07‑08:
Web content security information leaks.
- 2014‑07‑08:
Breaking Spotify DRM with PANDA.
- 2014‑07‑07:
Apple vs Google Unix wars.
- 2014‑07‑06:
The Milgram experiment: a troubling feature of people who seem nice all the time.
- 2014‑07‑06:
How the Tour de France is broadcast to the world.
- 2014‑07‑06:
The significance of SIMD, SSE, and AVX.
- 2014‑07‑05:
The Ceylon programming language.
- 2014‑07‑05:
"Run," Bakri says. (short story)
- 2014‑07‑05:
Validating the XKeyScore code leak.
- 2014‑07‑05:
PyPy-STM is becoming a plausible GIL-less Python.
- 2014‑07‑05:
How Thatcher killed the UK's superfast broadband before it even existed.
- 2014‑07‑05:
Straight answers or slippery digressions? The art of the parliamentary written answer, in numbers.
- 2014‑07‑05:
The march towards Golang.
- 2014‑07‑05:
CSS is unnecessary given a layout language with means of abstraction and combination (e.g. Elm).
- 2014‑07‑04:
Austrian economists, 9/11 truthers and brain worms.
- 2014‑07‑04:
phpinfo() type confusion infoleak vulnerability and SSL private keys.
- 2014‑07‑04:
BBC journalist being trained to stop inviting cranks on to provide false balance.
- 2014‑07‑04:
The No-IP takedown: Microsoft doesn't understand DNS.
- 2014‑07‑04:
Kafka: questioning the Lambda Architecture.
- 2014‑07‑03:
US IRS policy targeting political groups also aimed at open source projects.
- 2014‑07‑03:
An overview of the CHERI capability model: revisiting RISC in an age of risk.
- 2014‑07‑03:
Region-based memory management in Cyclone.
- 2014‑07‑03:
Toyota labs page on their free piston engine generator.
- 2014‑07‑03:
Free piston engine research at Newcastle.
- 2014‑07‑03:
Free piston engines
- 2014‑07‑03:
Koenigsegg is developing a camless car engine.
- 2014‑07‑03:
Tor exit node operator prosecuted in Austria.
- 2014‑07‑02:
Toyota free piston engine linear generator: no crankshaft, fewer moving parts.
- 2014‑07‑02:
How to give an academic talk.
- 2014‑07‑01:
Dependently typed programming will (one day) rock your world.
- 2014‑07‑01:
OpenSSL project roadmap.
- 2014‑07‑01:
The lemon market in programming language adoption.
- 2014‑07‑01:
Essential futurist SF.
- 2014‑07‑01:
Golang is not good.
- 2014‑07‑01:
Gregg shorthand: How to write 225 words per minute with a pen.
- 2014‑06‑30:
DRM pods: can Keurig kill K-Cup coffee copy-cats?
- 2014‑06‑30:
Microsoft seized 22 domains without reporting abuse problem to the provider first.
- 2014‑06‑30:
Bitcrypt ransomware broken: 128 digit RSA key is not 1024 bits.
- 2014‑06‑30:
Clang's memory model for static analysis of C programs.
- 2014‑06‑30:
Developing with Nix.
- 2014‑06‑30:
ByteArrayOutputStream is really slow at growing large objects in JDK6.
- 2014‑06‑30:
emojli: the emoji-only network.
- 2014‑06‑30:
SPEC2000 performance comparisons between gcc and llvm.
- 2014‑06‑30:
The dark side of .io: ethnic cleansing by the UK to please the USA.
- 2014‑06‑30:
Life of Pixel: a tribute to 8 bit gaming.
- 2014‑06‑30:
Glitch: Programming with managed time.
- 2014‑06‑30:
Half of all London car thefts use electronic hacking tools.
- 2014‑06‑30:
The CHERI capability architecture: Revisiting RISC in an age of risk.
- 2014‑06‑30:
Lightning protection and proper earth/grounding.
- 2014‑06‑30:
Qubes for Windows? A failed attempt at strong process isolation.
- 2014‑06‑30:
www.www.extra-www.org
- 2014‑06‑29:
Legal pot in the US is crippling Mexican drug cartels.
- 2014‑06‑29:
Incompatibilities and inconsistencies in the MS Office Open XML document format.
- 2014‑06‑29:
Frax: fractal app for iOS.
- 2014‑06‑29:
Why use www in website domain names?
- 2014‑06‑29:
Ammonia/hydrogen breakthrough could be a game changer for vehicle fuel.
- 2014‑06‑29:
The ghost in the MP3.
- 2014‑06‑29:
Undefined behavior can result in time travel.
- 2014‑06‑28:
POC || GTFO 0x04
- 2014‑06‑28:
The Fermi paradox.
- 2014‑06‑28:
Emoji get lost in translation.
- 2014‑06‑28:
μg: free replacements for proprietary Google apps.
- 2014‑06‑28:
Android without the Google mothership.
- 2014‑06‑28:
Recovering SpaceX's Falcon 9 ocean landing video: how it was done.
- 2014‑06‑28:
Migrating Instagram from AWS to FB: a NAT nightmare.
- 2014‑06‑28:
Theranos: miniaturized fast blood diagnostics.
- 2014‑06‑28:
Farewell to Tinderbox, the world's 1st? 2nd? continuous integration server.
- 2014‑06‑27:
How Tory immigration rules discriminate against British children.
- 2014‑06‑27:
Even sweatshops are getting automated.
- 2014‑06‑27:
A less angry rainbow.
- 2014‑06‑27:
How the rainbow color map misleads.
- 2014‑06‑27:
Visualizing algorithms.
- 2014‑06‑27:
Checkout github pull requests locally.
- 2014‑06‑27:
"Merge pull request" considered harmful.
- 2014‑06‑27:
Block randomized malware queries in your name server.
- 2014‑06‑27:
UK scientific advisory committee on nutrition draft report on carbohydrates and health.
- 2014‑06‑27:
Doctorow on Piketty's Capital in the 21st Century.
- 2014‑06‑26:
Avalanche: a dynamic defect detection tool that generates "inputs of death".
- 2014‑06‑26:
More on over-provisioning bandwidth and QoE problems.
- 2014‑06‑26:
Governance for agile service delivery.
- 2014‑06‑26:
V8 JavaScript optimization killers.
- 2014‑06‑26:
The death of the Urdu script.
- 2014‑06‑25:
Typographers' top typefaces.
- 2014‑06‑25:
Breakthrough in solar panel manufacture promises cheap energy within a decade.
- 2014‑06‑25:
What university libraries pay for academic journals.
- 2014‑06‑25:
The Gunfighter. (Vimeo)
- 2014‑06‑25:
Storing passwords in plaintext is a breach of the Australian Privacy Act.
- 2014‑06‑25:
Rediscovered EDSAC diagrams reveal secrets of one of the earliest computer.
- 2014‑06‑25:
Blinking text support for man pages.
- 2014‑06‑25:
What space debris does to the Kevlar shielding protecting the international space station.
- 2014‑06‑25:
Osama Bin Laden's seven rules for terrorists: ISIS ignore the al-Qaida leader's advice.
- 2014‑06‑25:
The war on drugs is lost: legalise the heroin trade.
- 2014‑06‑25:
The Scottish independence referendum can give hope to the Left across Britain.
- 2014‑06‑25:
Alien vs coffee machine. (YouTube)
- 2014‑06‑25:
Time transfer by observation of lightning strikes?
- 2014‑06‑25:
How to make breaking changes and not break all the things.
- 2014‑06‑25:
Houston, we have a copyright problem.
- 2014‑06‑24:
How to modify ITIL to accommodate DevOps.
- 2014‑06‑24:
Security of symmetric encryption against mass surveillance.
- 2014‑06‑24:
An introduction to the Beaglebone PRU.
- 2014‑06‑24:
All the major preconditions for revolution are present in the US and UK.
- 2014‑06‑24:
Chinese hospitals introduce hands-free automatic sperm extractor.
- 2014‑06‑24:
Over-provisioning bandwidth does not solve quality-of-experience problems.
- 2014‑06‑24:
Queueing in the Linux network stack.
- 2014‑06‑23:
The Implicit Calculus: a new foundation for generic programming.
- 2014‑06‑23:
Map of bankers in Europe earning €1 million or more.
- 2014‑06‑23:
Introducing the vacuum transistor: a curious mash-up of vacuum tube and MOSFET.
- 2014‑06‑23:
The race to the Tour de France start line: free public WiFi in Cambridge.
- 2014‑06‑23:
Free public WiFi in Cambridge provided by the University and councils.
- 2014‑06‑23:
Why the summer solstice isn't the start of summer.
- 2014‑06‑23:
Announcing the FastMail calendar.
- 2014‑06‑23:
On prejudice and cognitive biases.
- 2014‑06‑23:
A Dutch perspective on protected intersections and cycle-friendly junction design.
- 2014‑06‑23:
Secret Trade in Services Agreement (TISA) - Financial Services Annex.
- 2014‑06‑22:
Ape molecules with a barrel of monkeys.
- 2014‑06‑22:
Eigenmorality.
- 2014‑06‑22:
College teaching in the US is no longer a middle-class job.
- 2014‑06‑21:
C++ design goals related to Rust.
- 2014‑06‑21:
The Egison programming language.
- 2014‑06‑21:
I am sexist. Let's talk about how, why and what I'm doing about it.
- 2014‑06‑21:
Union, intersection, refinement types, and type disjointness for secure protocol implementations.
- 2014‑06‑21:
C++ Boost: calculating distances made difficult.
- 2014‑06‑21:
Data sharing safe harbour deal with US referred to EU's top court.
- 2014‑06‑21:
Google forced by Canadian court to e-forget a company worldwide.
- 2014‑06‑21:
The amazing micro-engineered water-repelling surface that lives outside my window.
- 2014‑06‑21:
What happened when we tried to publish a scientific paper investigating time travel.
- 2014‑06‑21:
8088 Domination post-mortem, Part 1.
- 2014‑06‑21:
Cube Slam: behind the THREE.Scene().
- 2014‑06‑21:
freshmeat.net, 1997-2014.
- 2014‑06‑21:
Hardware and software stats from "The Setup" interviews.
- 2014‑06‑20:
Videogrep: automatic supercuts with Python.
- 2014‑06‑20:
DRM is how Amazon is holding Hachette hostage.
- 2014‑06‑20:
Busted: elegant Lua unit testing.
- 2014‑06‑20:
Janet Moonshot and FreeRADIUS on Microsoft Azure.
- 2014‑06‑20:
Redwood Stone: gothic follies for your garden.
- 2014‑06‑20:
A comparison of Cap'n Proto, FlatBuffers, and SBE.
- 2014‑06‑20:
US Supreme Court unanimously strikes down abstract software patent.
- 2014‑06‑20:
Presentations from the Dublin RINA workshop. (Interesting but very flawed.)
- 2014‑06‑19:
RINA: Surviving networking's dark ages, or, how in hell do you lose a layer!?
- 2014‑06‑19:
The abstinence method: Dutch farmers say no to antibiotics for livestock.
- 2014‑06‑19:
AWS console breach leads to demise of code hosting service, despite their backup plan.
- 2014‑06‑19:
The more CEOs are paid the worse they perform.
- 2014‑06‑18:
UK intelligence forced to reveal secret policy for mass surveillance of residents' Facebook and Google use.
- 2014‑06‑18:
The Princess Bride sword fight: how does Thibault cancel out Capoferro?
- 2014‑06‑18:
Viewstamped replication: a less-famous consensus protocol.
- 2014‑06‑18:
The SSD endurance experiment: casualties on the way to a petabyte.
- 2014‑06‑18:
Following the Linux /usr merge: factory reset and stateless / reproducible / verifiable systems.
- 2014‑06‑18:
Jump consistent hash: a fast minimal-memory sharding algorithm.
- 2014‑06‑18:
JavaScript sequence diagrams.
- 2014‑06‑18:
Optimisation: The act of replacing something that works with something that almost works, but is cheaper. (Roger Needham)
- 2014‑06‑18:
FlatBuffers: an efficient cross platform serialization library for C++ and Java.
- 2014‑06‑18:
Use ImageMagick to clean up photographs of whiteboards.
- 2014‑06‑18:
Web sequence diagrams.
- 2014‑06‑18:
Towards energy proportionality for large-scale latency-critical workloads: how Google shaved 20% off search power consumption.
- 2014‑06‑18:
An empirical study on bribing users to ignore security advice.
- 2014‑06‑18:
Use of formal methods at Amazon Web Services.
- 2014‑06‑17:
Unofficial DynASM documentation.
- 2014‑06‑17:
8088 Domination: video played by an IBM PC 5160. (YouTube)
- 2014‑06‑17:
Fast money: the battle against the high frequency traders.
- 2014‑06‑17:
Building roads makes traffic worse.
- 2014‑06‑17:
The scientific way to cut a cake. (YouTube)
- 2014‑06‑17:
Solar power at scale.
- 2014‑06‑17:
A proposal for reforming private rental housing.
- 2014‑06‑17:
We're losing all our strong female characters to Trinity Syndrome.
- 2014‑06‑17:
How should mathematics be taught to non-mathematicians?
- 2014‑06‑17:
The cosmic distance ladder.
- 2014‑06‑17:
Preprint of paper proposing a global network of entangled atomic clocks.
- 2014‑06‑17:
Theorists propose a global network of entangled atomic clocks.
- 2014‑06‑17:
Plans for a Heath Robinson museum.
- 2014‑06‑17:
A 52 page handbook to help determine if something is public domain.
- 2014‑06‑17:
Numbers and the common-sense bypass.
- 2014‑06‑16:
How to avoid the endless corridors at King's Cross St Pancras.
- 2014‑06‑16:
Coding as the new literacy.
- 2014‑06‑16:
Conan Doyle estate loses its copyright claim on public domain Sherlock Holmes stories.
- 2014‑06‑16:
Inside Swift: differences from the Objective C runtime system.
- 2014‑06‑16:
The largest black hole in the known universe.
- 2014‑06‑16:
The true cost of hidden money / tax evasion.
- 2014‑06‑15:
Green party peer put on database of domestic political extremists.
- 2014‑06‑14:
Epidemic of whooping cough in California has caused two unnecessary deaths.
- 2014‑06‑14:
Split Ticket: save money on train fares.
- 2014‑06‑14:
Flavours of type theory: What we talk about when we talk about types.
- 2014‑06‑14:
Everything you need to know about cryptography in 1 hour.
- 2014‑06‑14:
From parametricity to conservation laws, via Noether's Theorem. Type theory and fundamental physics.
- 2014‑06‑13:
Cambridge May Bumps notes and fines from the Umpires.
- 2014‑06‑13:
uutils: Unix commands / GNU coreutils rewritten in Rust.
- 2014‑06‑12:
US military fail: long Asian land wars have been a route to disaster since 1963.
- 2014‑06‑12:
Chromebooks as rack mounted build servers.
- 2014‑06‑10:
Typed tagless final interpreters.
- 2014‑06‑10:
There is no fork: an abstraction for efficient, concurrent, and concise data access.
- 2014‑06‑10:
NeoLucida. (Vimeo)
- 2014‑06‑10:
Vermeer's paintings might be 350 year-old color photographs.
- 2014‑06‑10:
Welcome to the .uk - unless you're not in the UK.
- 2014‑06‑10:
Watchmaking: The high-tech world of old-world watches.
- 2014‑06‑10:
LGV Est track laying. (YouTube)
- 2014‑06‑10:
Continuous welded rail.
- 2014‑06‑10:
UK leap seconds policy review: findings from the public dialogue.
- 2014‑06‑09:
How mistakes can save lives: an airline pilot's mission to revolutionise the NHS.
- 2014‑06‑09:
Red Button attack allows over-the-air malware installation on smart TVs.
- 2014‑06‑09:
Sumer is icumen in: The translation of "bucke uerteþ" is uncertain, but the current critical consensus is "the stag farts".
- 2014‑06‑09:
Cambridge airport safety concerns.
- 2014‑06‑09:
PyParallel: How we got Python to exploit all cores on Windows.
- 2014‑06‑09:
The illusion of motion: frame rate, refresh rate, persistence, motion blur, etc.
- 2014‑06‑08:
Whose entropy is it anyway? Part 1: Boltzmann, Shannon, and Gibbs.
- 2014‑06‑08:
Murder Machines: how cars took over the streets of America.
- 2014‑06‑08:
Colleges are full of it: Behind the three-decade scheme to raise tuition fees.
- 2014‑06‑08:
Napkin: Painlessly annotate images or create diagrams and share the results quickly.
- 2014‑06‑08:
How to rob a bank (from the inside, that is). (video)
- 2014‑06‑08:
Conditional review acceptance policy: using peer review to promote open access to academic journals.
- 2014‑06‑08:
Rendezvous hashing, an alternative to consistent hashing.
- 2014‑06‑08:
A patent troll is on the verge of winning 1% of iPhone revenue.
- 2014‑06‑08:
How Foyles moved 500,000 books. (video)
- 2014‑06‑08:
Michelangelo's David: a new perspective.
- 2014‑06‑08:
HippyVM: a fast PHP implementation based on PyPy.
- 2014‑06‑08:
The last line effect in copy-paste code.
- 2014‑06‑07:
Tickets for restaurants.
- 2014‑06‑07:
Python to OCaml retrospective.
- 2014‑06‑06:
Speculative lock elision: enabling highly concurrent multithreaded execution.
- 2014‑06‑06:
Better metaphors for cryptography: key, padlock, seal, imprint.
- 2014‑06‑06:
Vannevar Bush: As We May Think. (1945)
- 2014‑06‑06:
Eliminating inefficient cross-layer interactions in wireless networking.
- 2014‑06‑06:
Network Rail confirms plans for restoring the Oxford to Bedford line.
- 2014‑06‑06:
The battle of Midway: cryptanalysis and metadata.
- 2014‑06‑05:
In defence of modern lexicography and dictionaries.
- 2014‑06‑05:
OpenSSL ChangeCipherSpec vulnerability found by considering formal analysis of TLS protocol.
- 2014‑06‑05:
The diggers buried in London's basement conversions.
- 2014‑06‑05:
Cambridge was a probable nuclear target in the 1970s, but Oxford was not.
- 2014‑06‑05:
Economic forecasting has an astonishing record of complete failure.
- 2014‑06‑04:
All the dialogue from Star Wars in alphabetical order. (YouTube)
- 2014‑06‑04:
David Graeber explains why the more your job helps others, the less you get paid.
- 2014‑06‑04:
Akamai implements the DNS client-subnet extension.
- 2014‑06‑04:
Mathematical symbols are not all created equal.
- 2014‑06‑04:
DuckDuckGo will be a supported search provider in Safari.
- 2014‑06‑04:
MicroPython: a lean and efficient implementation of (most of) Python 3.
- 2014‑06‑04:
History and technology of reverse debugging.
- 2014‑06‑04:
A look at Swift from the perspective of Rust.
- 2014‑06‑03:
Abusing the algebra of algebraic data types: why does this work?
- 2014‑06‑03:
The motivation for host name syntax checking in BIND was a workaround for a Sendmail security vulnerability.
- 2014‑06‑02:
PMA: the packed memory array.
- 2014‑06‑01:
An adaptive loosely packed-memory sorted array.
- 2014‑06‑01:
Savage capitalism is back, and it will not tame itself.
- 2014‑06‑01:
Women who were duped by undercover spies are back in court to challenge the police's delaying tactics.
- 2014‑06‑01:
A critique of Debraj Ray's critique of Piketty's Capital in the 21s Century.
- 2014‑06‑01:
Piketty's 'Second Law of Capitalism' vs. standard macro theory.
- 2014‑06‑01:
Getty Images is trying to depict women less as dead-eyed props and more as real people.
- 2014‑06‑01:
Git repository integrity with gpg-signed commits.
- 2014‑06‑01:
Govia's plans for the Cambridge and Thameslink rail franchise.
- 2014‑06‑01:
Pre-selected opt-in tickboxes do not count as consent to receive spam.
- 2014‑06‑01:
What would math class look like if it were a fine art?
- 2014‑05‑31:
A major upgrade to Haskell's attoparsec: more speed, more power.
- 2014‑05‑31:
No more NXDOMAIN redirection to advert portal by OpenDNS.
- 2014‑05‑31:
An-225 Mriya: pictures of the world's largest aircraft.
- 2014‑05‑31:
Breakthrough in UK copyright law reform confirmed.
- 2014‑05‑31:
Cree LED light bulb teardown.
- 2014‑05‑31:
How LEDs are made.
- 2014‑05‑31:
The makings of a great logo.
- 2014‑05‑31:
Pinterest logo design notes.
- 2014‑05‑31:
Taiwanese recycle symbol.
- 2014‑05‑30:
US cybercrime laws being used to target security researchers.
- 2014‑05‑30:
Avoiding a war on unauthorized computation: the danger of exploit regulation.
- 2014‑05‑30:
The dangers of obverse journalism.
- 2014‑05‑30:
Drugs and prostitution add £10bn a year to UK economy.
- 2014‑05‑30:
Britain is still feasting on credit, and the next crunch will hit in 2016.
- 2014‑05‑29:
Newspapers: The most dangerous drug.
- 2014‑05‑29:
Absolute Zero is 0K: a history of low temperature physics.
- 2014‑05‑29:
Machines v. Lawyers.
- 2014‑05‑29:
Be skeptical of both Piketty and his skeptics.
- 2014‑05‑29:
Logo trends of 2014.
- 2014‑05‑29:
Amazon v Hachette: don't believe the spin.
- 2014‑05‑28:
Stop buying load balancers and control your traffic flow with software instead.
- 2014‑05‑28:
Tower Hamlets: London's rotten borough?
- 2014‑05‑28:
Microsoft PowerShell's Monad Manifesto.
- 2014‑05‑28:
You shouldn't use a spreadsheet for important work. For example, Piketty.
- 2014‑05‑27:
Logical fallacies that should exist.
- 2014‑05‑27:
Reconsidering generic composition of crypto primitives: when encrypt-then-MAC fails.
- 2014‑05‑27:
Reasons for not using mmap().
- 2014‑05‑27:
How the patent trolls won in Congress.
- 2014‑05‑27:
End mass incarceration now.
- 2014‑05‑27:
Whitewood under siege: white vs blue pallets.
- 2014‑05‑26:
The best way to win an argument.
- 2014‑05‑26:
Improving the security of your SSH private key files with PKCS#8.
- 2014‑05‑26:
Simple, fast, and practical non-blocking and blocking concurrent queue algorithms.
- 2014‑05‑25:
The science of Bruce Lee's one inch punch.
- 2014‑05‑25:
The insecurity of password expiration: it is easy for attackers to guess the user's next password.
- 2014‑05‑25:
Supreme Court of the US quietly edits decisions after publication, sometimes substantively.
- 2014‑05‑25:
Kill the hamburger three-line menu button.
- 2014‑05‑25:
Why online communities decay over time.
- 2014‑05‑24:
The diamond market is no longer controlled by De Beers.
- 2014‑05‑24:
Tsunami or sea change? Responding to the explosion of student interest in computer science.
- 2014‑05‑24:
Words matter, even in code.
- 2014‑05‑24:
sysdig: Think of it as strace + tcpdump + lsof + awesome sauce.
- 2014‑05‑24:
How SSL 3.1 came to be called TLS 1.0.
- 2014‑05‑24:
When will patent trolls learn not to mess with Newegg?
- 2014‑05‑24:
Tracedump captures all TCP and UDP packets of a single Linux process.
- 2014‑05‑24:
Attacking hardened Linux systems with kernel JIT spraying.
- 2014‑05‑24:
BPF: Linux's universal in-kernel virtual machine.
- 2014‑05‑24:
Dynamic packet filter: fast flexible demultiplexing.
- 2014‑05‑24:
Mach packet filter: efficient demultiplexing for multiple endpoints and large messages.
- 2014‑05‑24:
libpcap: an architecture and optimization methodology for packet capture.
- 2014‑05‑24:
BPF: Berkeley packet filter bytecode in action at Cloudflare.
- 2014‑05‑23:
Write-down of two-thirds of US shale oil explodes fracking hopes.
- 2014‑05‑23:
Teach your children to argue.
- 2014‑05‑23:
A short guide to Capital in the 21st Century.
- 2014‑05‑23:
Facebook's product director is furious at Facebook's effect on news.
- 2014‑05‑23:
miniBAE: software MIDI synth.
- 2014‑05‑23:
Former BP geologist says peak oil is here and it will 'break economies'
- 2014‑05‑22:
Why did GCHQ target such weird laptop components for destruction at the Guardian?
- 2014‑05‑22:
Erlang intentional code style.
- 2014‑05‑22:
Congestion control (lack of) before Van Jacobson.
- 2014‑05‑22:
Interoperability scoring rules for the second TCP bake-off, April 1980.
- 2014‑05‑22:
Interoperability scoring rules for the first TCP bake-off, January 1979.
- 2014‑05‑22:
Twenty questions for Donald Knuth.
- 2014‑05‑22:
JavaScript-injected "async scripts" considered harmful.
- 2014‑05‑21:
On the future of MetaFilter.
- 2014‑05‑21:
Clochure is an educated attempt to solve Clojure's number one problem.
- 2014‑05‑21:
Use inet_pton() when possible to avoid bloat and bugs in getaddrinfo().
- 2014‑05‑21:
UK National Rail Enquiries real-time train location database will provide free access.
- 2014‑05‑21:
Longitude prize 2014: nothing to do with longitude except for a big anniversary.
- 2014‑05‑21:
When AES(☢) = ☠ : encrypting a valid JPG so it yields a valid JPG.
- 2014‑05‑21:
Ladar Levison's story of how he was forced to shut down Lavabit.
- 2014‑05‑21:
You're probably using the wrong dictionary.
- 2014‑05‑20:
Censors killed the weird, experimental, progressive golden age of comics.
- 2014‑05‑20:
What would a UKIP of the left actually look like?
- 2014‑05‑20:
Why do people persist in believing things that just aren't true?
- 2014‑05‑20:
Van Jacobson's pearls of wisdom about TCP. (1987-1993)
- 2014‑05‑20:
Consultation on ac.uk domain name policy.
- 2014‑05‑20:
Ghost signs in London.
- 2014‑05‑19:
Hungary and the end of politics.
- 2014‑05‑19:
Mouthbreathing Machiavellis dream of a silicon Reich: Bay Area fascism.com.
- 2014‑05‑19:
OpenStreetMap now has data for car navigation.
- 2014‑05‑19:
What happens when patients find out how good their doctors really are?
- 2014‑05‑19:
Solar-powered mosquito larvae killer.
- 2014‑05‑19:
The Mezzo programming language.
- 2014‑05‑19:
Type soundness and race freedom for Mezzo.
- 2014‑05‑19:
Did the NSA help kill UWB?
- 2014‑05‑18:
Old computer horror stories, folklore, and anecdotes from Usenet.
- 2014‑05‑18:
Everyone should know just how much the US government lied to defend the NSA.
- 2014‑05‑18:
Led Zeppelin is being sued for copyright infringement in Stairway to Heaven.
- 2014‑05‑18:
Hate mail barrage reveals climate disinformation's true colours.
- 2014‑05‑18:
Researchers who provided key evidence for gluten sensitivity have shown they were wrong.
- 2014‑05‑18:
Practical tmux.
- 2014‑05‑18:
Net neutrality: local governments choke broadband competition.
- 2014‑05‑17:
A DNS router for sharding large zones.
- 2014‑05‑17:
What does 1#J mean? C# tries to round infinity when printing.
- 2014‑05‑17:
The leaked New York Times innovation report is one of the key documents of this media age.
- 2014‑05‑17:
What do animals see in a mirror?
- 2014‑05‑17:
Emory.edu: A Windows 7 deployment image accidently overwrote all Windows machines.
- 2014‑05‑17:
Vernam, Mauborgne, and Friedman: the one-time pad and the index of coincidence.
- 2014‑05‑17:
Crypto won't save you.
- 2014‑05‑16:
The multiple SQLite problem.
- 2014‑05‑16:
Independent report on the insecurity of e-voting in Estonia.
- 2014‑05‑16:
'The Problem With Music' has been solved by the Internet.
- 2014‑05‑16:
More Mac OS command line utils.
- 2014‑05‑16:
Command line utilities that Unix users need to know on Mac OS.
- 2014‑05‑15:
A time-travelling debugger for the Elm programming language.
- 2014‑05‑15:
On following rules.
- 2014‑05‑15:
Octotree: extensions for various browsers to improve file hierarchy views on GitHub.
- 2014‑05‑15:
Falsehoods programmers believe about 8 categories of things.
- 2014‑05‑15:
Ten articles every programmer shoud read.
- 2014‑05‑15:
Compacting garbage collection with ambiguous roots.
- 2014‑05‑15:
Introducing the WebKit FTL LLVM-based JIT.
- 2014‑05‑14:
The decline and fall of BIND 10.
- 2014‑05‑14:
Does the Firefox DRM architecture give non-sandbox code access to the decrypted media?
- 2014‑05‑14:
SIGGRAPH 2014 papers.
- 2014‑05‑14:
SIGGRAPH 2014 technical papers preview. (YouTube)
- 2014‑05‑14:
RIPE68 DNS services update.
- 2014‑05‑14:
ISPs in New Zealand must register their staff and get network changes approved with the GCSB spy agency.
- 2014‑05‑14:
iMessage purgatory.
- 2014‑05‑13:
ANPR and mass surveillance of transport: a British export.
- 2014‑05‑13:
How to use your "no award" vote in the Hugo ballots.
- 2014‑05‑13:
Dutch spend €220m on bike racks and it is still not enough.
- 2014‑05‑13:
DevOps Against Humanity.
- 2014‑05‑13:
What's so scary about smart girls?
- 2014‑05‑13:
Your surname doesn't match your child's? Good luck at border control.
- 2014‑05‑12:
West Antarctic ice sheet has started to collapse.
- 2014‑05‑12:
High Court slams HMRC for unlawfully concealing information about export of spyware FinFisher.
- 2014‑05‑12:
The NSA tampers with US-made internet routers during shipping.
- 2014‑05‑12:
Significant portion of HTTPS web connections made by forged certificates.
- 2014‑05‑12:
DNS flood of 25 million requests per second: when anti-DDoS services attack.
- 2014‑05‑12:
Drawing the Eurotunnel: publication-quality graphics in 1987.
- 2014‑05‑12:
The mystery of Go, the ancient game computers still can't win.
- 2014‑05‑12:
git concepts simplified.
- 2014‑05‑12:
GitHub training resources.
- 2014‑05‑12:
DNSSEC outages.
- 2014‑05‑11:
The Oracle of Bacon.
- 2014‑05‑11:
Early superoptimizer results: Csmith + Souper + LLVM.
- 2014‑05‑11:
DUMB.domains, if you need help thinking of them.
- 2014‑05‑11:
Zonemaster: combined rewrite of DNSCheck and Zonecheck.
- 2014‑05‑11:
cpthook is a git hook manager.
- 2014‑05‑11:
Why Python is slow: looking under the hood.
- 2014‑05‑11:
jsfmt: enforce JavaScript style.
- 2014‑05‑11:
ClangFormat: enforce C/C++/ObjC style.
- 2014‑05‑10:
git man page generator.
- 2014‑05‑10:
British public wrong about nearly everything, survey shows.
- 2014‑05‑10:
The war on some drugs is over. Drugs won.
- 2014‑05‑10:
Hindsight: it's not just for past events. Examine possible failures with a premortem.
- 2014‑05‑10:
Shackleton's ad: really the manliest thing in the history of manly manliness?
- 2014‑05‑10:
HFT: the backlash continues.
- 2014‑05‑10:
The court that created the patent troll mess is screwing up copyright too.
- 2014‑05‑10:
40 maps that explain the Middle East.
- 2014‑05‑10:
How Munich switched 15000 desktops from Windows to Linux.
- 2014‑05‑10:
Searching logs at 20 GB/sec with carefully engineered brute force.
- 2014‑05‑10:
White House supports CC0 for US federal government datasets.
- 2014‑05‑10:
Honeybees abandoning hives and dying due to neonicotinoid insecticide use, research finds.
- 2014‑05‑09:
The operating system: should there be one? The Smalltalk in Unix.
- 2014‑05‑09:
Oracle wins copyright ruling against Google over Android Java APIs.
- 2014‑05‑09:
The logic of Buddhist philosophy.
- 2014‑05‑09:
Software inspection and the Heartbleed bug.
- 2014‑05‑08:
Post-mortem analysis of a Linux honeypot using sysdig.
- 2014‑05‑08:
American executioners: untrained, incompetent, and "complete idiots".
- 2014‑05‑08:
Nanotrusting nanotime: the remarkable pitfalls in measuring time on modern computers.
- 2014‑05‑07:
Golygons and golyhedra.
- 2014‑05‑07:
IBM Java SecureRandom is very weak.
- 2014‑05‑07:
The return of Upcoming.org.
- 2014‑05‑07:
A post-Snowden chilling effect observed in Google search data.
- 2014‑05‑07:
On properly packaging perl.
- 2014‑05‑07:
Viennese mazes: what they are, and how to make one.
- 2014‑05‑07:
Crash optimization for self-driving cars: what do you hit when you can't stop in time?
- 2014‑05‑07:
Same-sex marriages and coats of arms.
- 2014‑05‑06:
PyPy.js now faster than CPython.
- 2014‑05‑06:
Some of the sundials in Cambridgeshire.
- 2014‑05‑06:
New analemmatic sundial on Jesus Green.
- 2014‑05‑06:
Greenwich Meridian markers in the UK: an interactive map.
- 2014‑05‑06:
An Arabic programming language: قلب
- 2014‑05‑05:
CLOStrophobia: its etiology and treatment.
- 2014‑05‑05:
Teaching mathematics at high school: graph theory.
- 2014‑05‑05:
Predator vs Jeeves.
- 2014‑05‑05:
Jeeves and the singularity.
- 2014‑05‑05:
Chinese number websites: the meanings of numeric URLs.
- 2014‑05‑04:
Why the UK has a high child mortality rate.
- 2014‑05‑04:
U2 flies too high and fast for air traffic control computers, shutting down LAX.
- 2014‑05‑04:
Our manifesto for Europe, by Thomas Piketty and others.
- 2014‑05‑04:
An analysis of Facebook photo caching.
- 2014‑05‑03:
Common LibreSSL porting mistakes.
- 2014‑05‑03:
Some famous unit conversion errors.
- 2014‑05‑03:
Systemantics and the fundamental failure mode theorem.
- 2014‑05‑02:
Proposed enhancements to Java for small immutable identityless value types.
- 2014‑05‑02:
Operation Cotton and the 23 pages which skewered the government's legal aid reforms.
- 2014‑05‑02:
Butler Lampson's hints for computer system design.
- 2014‑05‑02:
Coping with the TCP TIME-WAIT state on busy Linux servers.
- 2014‑05‑02:
What have we learnt in 20 years of L4 microkernels?
- 2014‑05‑01:
An experimental study of TLS forward secrecy deployments: 83% use weak DH params.
- 2014‑05‑01:
Some papers about garbage collection.
- 2014‑05‑01:
Dark Google will earn its money by knowing, manipulating, controlling reality and cutting it into the tiniest pieces.
- 2014‑05‑01:
50th anniversary of BASIC and, more important, computer literacy courses.
- 2014‑05‑01:
Baby we were born to RUN: celebrating 50 years of BASIC.
- 2014‑05‑01:
Leap seconds: the UK public dialogue.
- 2014‑05‑01:
Google is trying out IBM POWER8 CPUs.
- 2014‑05‑01:
Burying the URL: location bar becomes a write-only field in latest Google Chrome.
- 2014‑05‑01:
Celebrating 50 years of BASIC.
- 2014‑05‑01:
What's new in Mercurial 3.0.
- 2014‑04‑30:
List processing in real time on a serial computer.
- 2014‑04‑30:
A few notes on book design.
- 2014‑04‑30:
The people who saw evolution in action.
- 2014‑04‑30:
Behind the scenes of Cards Against Humanity's PWNMEAL prank at PAX East.
- 2014‑04‑30:
What is a photocopier? A reconstruction of a court deposition. (Video)
- 2014‑04‑29:
Fifty years of BASIC, the programming language that made computers personal.
- 2014‑04‑29:
Safe shell-like sub-commands and pipelines in Julia.
- 2014‑04‑29:
The hackers who recovered NASA's lost lunar photos.
- 2014‑04‑29:
Numbers from 1 to 10 in over 5000 languages.
- 2014‑04‑29:
Sweden's great welfare heist.
- 2014‑04‑28:
Not All Men: a brief history of every dude's favorite argument.
- 2014‑04‑28:
BGP stats up to the end of 2013.
- 2014‑04‑28:
Internet passes 500,000 address prefixes.
- 2014‑04‑28:
OpenSSL: The Internet is being protected by two guys named Steve.
- 2014‑04‑28:
Omnibus: a word for all.
- 2014‑04‑28:
NetBSD filesystem drivers compiled to Javascript and run in browser.
- 2014‑04‑28:
Highly available transactions: virtues and limitations.
- 2014‑04‑28:
Spot the question.
- 2014‑04‑27:
Fred Brownell: The man who made South Africa's flag.
- 2014‑04‑27:
Nigel Farage is a phoney. Scrutinise him and he'll crumble. Don't expect the BBC to.
- 2014‑04‑27:
Rollin' Wild: what if animals were round?
- 2014‑04‑27:
The curse of the excluded middle: mostly-functional programming does not work.
- 2014‑04‑27:
Old aerial photos of Britain.
- 2014‑04‑27:
101 illustrated mathematical analysis bedtime stories: epsilon red riding hood.
- 2014‑04‑27:
$10,000 security bug bounty for Mozilla's new certificate verification code.
- 2014‑04‑27:
What's your Honeywell bubble count?
- 2014‑04‑27:
Bras in Space: Playtex and the Apollo spacesuits.
- 2014‑04‑27:
The twelve-factor app.
- 2014‑04‑27:
Golang frequent comments from code reviews.
- 2014‑04‑27:
Golang best practices for production environments.
- 2014‑04‑27:
Stanford allows fewer classes of character in longer passwords.
- 2014‑04‑27:
Syntax extensions and regular expressions for Rust.
- 2014‑04‑27:
Bicycle-friendly cobblestones.
- 2014‑04‑27:
Groningen: cycling city.
- 2014‑04‑26:
The Kindle wink to Neal Stephenson.
- 2014‑04‑25:
It is insanely easy to hack hospital equipment.
- 2014‑04‑25:
Amazon's Glacier secret: BDXL.
- 2014‑04‑25:
F* (a dependently-typed variant of F# for program verification) re-released under Apache 2.0.
- 2014‑04‑25:
11 simple truths from Buddhism.
- 2014‑04‑25:
Google to end forced G+ integration, drastically cut division resources.
- 2014‑04‑25:
Hasklig: Ligatures for Haskell code.
- 2014‑04‑24:
64-bit ARM emulation status in QEMU 2.0.0.
- 2014‑04‑24:
Andreas Gal is the new CTO of Mozilla.
- 2014‑04‑24:
Boycott systemd.
- 2014‑04‑24:
Kea: ISC continuing to develop the DHCP server part of the BIND 10 project.
- 2014‑04‑24:
Microsoft OneDrive for Business quietly modifies the files it syncs.
- 2014‑04‑24:
Elsevier journals: some facts.
- 2014‑04‑24:
Deadlines and the IT industry: Y2K, XP, IPv4, ...
- 2014‑04‑24:
Projecting images onto scent-filled bubbles.
- 2014‑04‑24:
Factcheck: Are we really getting less violent?
- 2014‑04‑24:
Using automatic language analysis to apply the Bechdel test to movie scripts and conversations on Twitter.
- 2014‑04‑24:
A reappraisal of validation in the RPKI.
- 2014‑04‑23:
How strtod() works (and sometimes doesn't).
- 2014‑04‑23:
Humans replacing robots at Toyota, to learn how to improve their manufacturing processes.
- 2014‑04‑23:
"Sell me this pen:" The real answer to The Wolf of Wall Street's challenge.
- 2014‑04‑23:
Link-time optimization in gcc: compiling Firefox.
- 2014‑04‑23:
Link-time optimization in gcc: a brief history.
- 2014‑04‑23:
Worst common denominator programming.
- 2014‑04‑23:
ISC stops work on BIND-10, and renames the orphaned code to Bundy.
- 2014‑04‑23:
AOL follows Yahoo! in setting DMARC p=reject. Death of mailing lists to follow.
- 2014‑04‑23:
Causal consistency: don't settle for eventual consistency.
- 2014‑04‑23:
Gogs: git repository hosting implemented in Golang.
- 2014‑04‑23:
Gitblit: git repository hosting implemented in Java.
- 2014‑04‑22:
NIST belatedly removes Dual_EC_DRBG from its recommendations.
- 2014‑04‑22:
Copyright is out of control
- 2014‑04‑22:
First completed trial ends with total loss for patent troll Intellectual Ventures.
- 2014‑04‑22:
Economic policy in a post-Piketty world.
- 2014‑04‑22:
Macmillan's Trident sell-out is a vital lesson for Scotland.
- 2014‑04‑22:
Leap seconds: a public dialogue in the UK.
- 2014‑04‑22:
After every crash in the Netherlands, intense scrutiny.
- 2014‑04‑22:
The case for formal verification.
- 2014‑04‑22:
Tiny Docker images with musl libc and no package manager.
- 2014‑04‑22:
Lead poisoning and Rome.
- 2014‑04‑21:
This guy's revolutionary idea for a sign for gender neutral toilets.
- 2014‑04‑21:
High frequency rentseeking: when 3ms is worth $300 million.
- 2014‑04‑21:
Fighting McDonald's to end gendered Happy Meal toys.
- 2014‑04‑21:
Did removing lead from petrol spark a decline in crime?
- 2014‑04‑21:
How to do UPSERT in Postgres.
- 2014‑04‑21:
Home entertainment implementations are pretty appaling: region-free DVD by hacking embedded Linux.
- 2014‑04‑20:
TrueType Instruction Compiler: compile a C-like language into a font file.
- 2014‑04‑20:
Java: real class names or Markov chain fakes?
- 2014‑04‑20:
Easter Hack: RSA padding bugs in Java's SSL/TLS implementation.
- 2014‑04‑20:
More on Apple and OpenSSL.
- 2014‑04‑20:
How to exploit home routers for anonymity.
- 2014‑04‑20:
Patents, greed, and the Wright Brothers.
- 2014‑04‑20:
Fairy tales in password hashing with scrypt.
- 2014‑04‑19:
The problems of high frequency trading.
- 2014‑04‑19:
How Apple dodged the Heartbleed bullet.
- 2014‑04‑19:
Filesystem namespaces in Plan 9 and Inferno.
- 2014‑04‑19:
Where to find stock photos that don't suck.
- 2014‑04‑19:
You don't read code, you explore it.
- 2014‑04‑19:
Linux /dev/urandom and (lack of) concurrency.
- 2014‑04‑19:
Hi-LAB: A powerful, precise language aptitude test is entering civilian life.
- 2014‑04‑19:
A bit of XENIX history.
- 2014‑04‑19:
America is an oligarchy not a democracy.
- 2014‑04‑17:
Why are diamonds clear, but coal black?
- 2014‑04‑17:
OpenSSL Valhalla rampage.
- 2014‑04‑17:
Proving and quantifying institutional sexism.
- 2014‑04‑17:
The arrow of time is caused by quantum entanglement.
- 2014‑04‑16:
Performance effects of architectural complexity in the i432.
- 2014‑04‑16:
Barrelfish research OS architecture overview.
- 2014‑04‑16:
Das Kapital for the Twenty-First Century? A review of Thomas Piketty's new book by James K. Galbraith.
- 2014‑04‑16:
Powers of ten for clocks.
- 2014‑04‑16:
The graffiti drone: an interview with KATSU.
- 2014‑04‑16:
Confessions of a full-stack DevOps coder.
- 2014‑04‑16:
Diffie-Hellman and TLS with nonsense parameters: 15 is a prime number?
- 2014‑04‑16:
A summary of Golang's flaws.
- 2014‑04‑16:
Quantiles on streams.
- 2014‑04‑16:
How it took 10 years to publish the Boyer-Moore MJRTY algorithm.
- 2014‑04‑16:
Valve publishes detailed Steam game usage data on its community profile pages.
- 2014‑04‑16:
Data skeletons: simultaneous estimation of multiple quantiles for massive streaming datasets with applications to density estimation.
- 2014‑04‑16:
The P^2 algorithm for dynamic calculation of quantiles and histograms without storing observations.
- 2014‑04‑16:
Shuffle Sharding: massive and magical fault isolation.
- 2014‑04‑16:
A new metric for Internet performance.
- 2014‑04‑15:
Raising a moral child.
- 2014‑04‑15:
Occupy was right: capitalism has failed the world. (Thomas Piketty)
- 2014‑04‑15:
Shared Space and other bad junction designs lead to crashes and injuries.
- 2014‑04‑15:
Heartbleed disclosure timeline.
- 2014‑04‑15:
Did a date calculation bug cost the Co-op Bank £110m?
- 2014‑04‑15:
A better way to enfoorce anti-harassment policies than zero tolerance.
- 2014‑04‑15:
MEPs approve rules for safer lorry designs in EU.
- 2014‑04‑15:
The lock-picking controversy of 1851.
- 2014‑04‑15:
The MIT lockpicking guide.
- 2014‑04‑15:
GitHub cheat sheet.
- 2014‑04‑15:
The benefits of EU membership have been underestimated.
- 2014‑04‑15:
America, Afghanistan and opium: Ten billion wasted in the war on some drugs.
- 2014‑04‑15:
More on Akamai's flawed secure allocation patch.
- 2014‑04‑14:
Sarah Wollaston asks: Why am I being blamed for the Nigel Evans sex case?
- 2014‑04‑14:
Akamai secure allocation patch failed to protect all private key components from Heartbleed.
- 2014‑04‑14:
UK trying to block US Senate report on torture.
- 2014‑04‑14:
sayI: trusted user authentication at Internet scale; efficient PKI.
- 2014‑04‑14:
Stalled SCP and hanging TCP connections: stupid middlebox breaks SACK.
- 2014‑04‑14:
Why Varnish does not support TLS.
- 2014‑04‑14:
Untie the mavericks: the stifling effect of peer review.
- 2014‑04‑14:
Apple claims Mogenerator's methods / lack of namespacing in Objective C.
- 2014‑04‑14:
Timekeeping in VMWare virtual machines.
- 2014‑04‑13:
The perils of dynamic scope.
- 2014‑04‑13:
The OpenSSL Foundation: of money, responsibility, and pride.
- 2014‑04‑13:
Egg: a culinary exploration of the most versatile ingredient.
- 2014‑04‑13:
Private keys should be isolated from server processes.
- 2014‑04‑13:
How does Akamai's "secure heap" patch to OpenSSL work?
- 2014‑04‑13:
Rise of the right: eurosceptics and teapartiers, cross-Atlantic extremism.
- 2014‑04‑13:
Interrogate: a proof-of-concept tool for identification of cryptographic keys in binary data.
- 2014‑04‑13:
Transcribing piano rolls with Python.
- 2014‑04‑13:
Project Pluto: nuclear-powered ramjet.
- 2014‑04‑13:
Seven cylinders that each touch all the others.
- 2014‑04‑12:
Recreating the THX deep note.
- 2014‑04‑12:
What if the moon were a disco ball? (YouTube)
- 2014‑04‑12:
Why you hate Comic Sans.
- 2014‑04‑12:
Visual explanations of mathematical concepts.
- 2014‑04‑12:
The username is a relic. Here's how to fix it.
- 2014‑04‑12:
Menstruation: What is the evolutionary or biological purpose of having periods?
- 2014‑04‑12:
Google finds centralized control, distributed data architectures work better than fully decentralized systems.
- 2014‑04‑12:
How Walter Bright came to write D.
- 2014‑04‑12:
Ants build complex structures with a few simple rules.
- 2014‑04‑12:
Comic Neue: polishing a turd.
- 2014‑04‑12:
When two-factor authentication is not enough.
- 2014‑04‑12:
Is the Oculus Rift sexist?
- 2014‑04‑11:
Looking for Tom Lehrer, comedy's mysterious genius.
- 2014‑04‑11:
What the Tamiflu saga tells us about drug trials and big pharma.
- 2014‑04‑05:
The Study of Anglophysics. (A short story.)
- 2014‑04‑05:
Google lifts the veil on its "Andromeda" virtual networking.
- 2014‑04‑04:
FAQ: The "snake fight" portion of your thesis defense.
- 2014‑04‑04:
Hacked Prius runs on SF Muni trolleybus power lines.
- 2014‑04‑04:
Blizzard: fast, cloud-scale block storage for cloud-oblivious applications.
- 2014‑04‑04:
Hackers are using ssh tunnels to send spam.
- 2014‑04‑04:
NIST launches new time standard: NIST-F2 caesium fountain atomic clock.
- 2014‑04‑03:
Better database index performance with Roaring Bitmaps.
- 2014‑04‑03:
11 hour GLONASS outage due to bad ephemerides upload.
- 2014‑04‑03:
Cloud computing companies ranked by their use of renewable energy.
- 2014‑04‑03:
The Supercombiner, a peculiar Unicode smoke-test.
- 2014‑04‑03:
Using routers to build logic circuits: BGP is Turing complete.
- 2014‑04‑03:
The dollar-and-cents case against Hollywood's exclusion of women.
- 2014‑04‑03:
Writing code that runs on Python 2 and 3.
- 2014‑04‑02:
Bad governance in the civil service: short-term jobs and no operational expertise.
- 2014‑04‑02:
The inexplicable rise of open floor plans in tech companies.
- 2014‑04‑02:
Redis new data structure: the HyperLogLog.
- 2014‑04‑02:
Stand-up comics who steal jokes can face escalating repercussions.
- 2014‑04‑01:
Generational GC has landed in Mozilla.
- 2014‑04‑01:
US stock markets are rigged to the advantage of HFT.
- 2014‑03‑31:
Treat benchmarks like you're a scientist.
- 2014‑03‑31:
Microsoft's C compiler sometimes embeds IE.
- 2014‑03‑31:
Apple's A7 Cyclone 64 bit ARM microarchitecture.
- 2014‑03‑31:
On the practical exploitability of Dual EC DRBG in TLS implementations.
- 2014‑03‑31:
NSA revelations 'changing how businesses store sensitive data'.
- 2014‑03‑31:
Refactoring with LZ77: compression is compilation?
- 2014‑03‑31:
HEFCE-funded research to be open access from 2016.
- 2014‑03‑31:
Oxford flood network. "The Internet of Things sometimes involves laying in duck shit."
- 2014‑03‑31:
Flat white vs latte.
- 2014‑03‑31:
Class hierarchies? Don't do that!
- 2014‑03‑31:
Labour party proposes to start charging separately for healthcare.
- 2014‑03‑31:
Abstract ideas don't deserve patents.
- 2014‑03‑31:
Coffee and its effects on feature creep: a Starbucks shopping list chat bot that turned into a banking system.
- 2014‑03‑30:
UK copyright reforms will allow content-mining, parody and much more.
- 2014‑03‑30:
UK will finally allow people to legally rip CDs.
- 2014‑03‑30:
25 microchips that shook the world.
- 2014‑03‑30:
Under the Hood: warp, a fast C and C++ preprocessor.
- 2014‑03‑29:
Password hashing security in 1Password.
- 2014‑03‑29:
The true costs of automobility: external costs of cars.
- 2014‑03‑29:
Cambridge cycle route plans on Hills Road and Huntingdon Road.
- 2014‑03‑29:
Six ways the UK still doesn't have full marriage equality.
- 2014‑03‑29:
How to remove gender bias from the hiring process.
- 2014‑03‑29:
Where everyone in the world is migrating, in one gorgeous chart.
- 2014‑03‑29:
Revamped parallel web page layout in Mozilla Servo.
- 2014‑03‑28:
The Mill: a new VLIW CPU. It might just work!
- 2014‑03‑28:
We may have witnessed an NSA "Shotgiant" TAO-like action.
- 2014‑03‑28:
Forces of divergence: Is surging inequality endemic to capitalism?
- 2014‑03‑27:
Introducing rr, Mozilla's record/replay debugger.
- 2014‑03‑27:
ASCII history and control codes.
- 2014‑03‑27:
The evolution of character codes, 1874-1968.
- 2014‑03‑27:
Prototype BeagleBone Black cape with Adafruit Ultimate GPS board and device tree overlay file.
- 2014‑03‑27:
NSRC DNS+DNSSEC workshop.
- 2014‑03‑26:
Butter is back.
- 2014‑03‑26:
What is the first story featuring time travel to the past.
- 2014‑03‑26:
Fourier transforms for dummies.
- 2014‑03‑26:
ANTLR4 ALL(*) parsing: the power of dynamic analysis.
- 2014‑03‑25:
What it's like to use Haskell instead of PHP.
- 2014‑03‑25:
How to mass-produce pasta spirals.
- 2014‑03‑25:
A history and evaluation of System R, an experimental relational database.
- 2014‑03‑25:
Brogrammers might not be macho, but that's not all there is to it.
- 2014‑03‑25:
The misguided freakout over the US DoC relinquishing its oversight of ICANN.
- 2014‑03‑25:
You might be prosecuted for reading Islamist websites in the UK.
- 2014‑03‑25:
Germans try to get their tongues around gender-neutral language.
- 2014‑03‑25:
The making of neon signs in Hong Kong. (YouTube)
- 2014‑03‑24:
When did finger-tenting, or steepling, become a symbol of evil?
- 2014‑03‑24:
Zero-day vulnerability in Microsoft Word under active attack.
- 2014‑03‑24:
Diagram showing relationships between probability distributions.
- 2014‑03‑24:
WTF, HTML and CSS? A list of commonly frustrating HTML and CSS quandaries, miscues, and dilemmas.
- 2014‑03‑24:
Two places with similar urban/college populations: the one with more immigrants produces more notable people.
- 2014‑03‑24:
California police use of body cameras cuts violence and complaints.
- 2014‑03‑23:
DNA double take: bodies often contain multiple distinct genomes.
- 2014‑03‑23:
Almost everything you've been told about unhealthy foods is wrong.
- 2014‑03‑23:
How to design an elliptic-curve signature system.
- 2014‑03‑23:
This 8-year-old girl's shredding will melt your face.
- 2014‑03‑23:
Internet censorship is 21st century book burning.
- 2014‑03‑23:
Sinkhole of bureaucracy: the unautomated process behind US federal employee retirement.
- 2014‑03‑23:
Carbon fibre 3D printer.
- 2014‑03‑23:
The Europe Tories hate no longer exists.
- 2014‑03‑23:
ATM operators eye Linux as replacement for Windows XP.
- 2014‑03‑23:
Another stolen generation: Australia is breaking up Aboriginal families faster than ever.
- 2014‑03‑23:
deFUDing "DNSSEC has failed".
- 2014‑03‑22:
C++11 FQA anyone? With observations of C++ culture.
- 2014‑03‑22:
Berkeley researchers recover typed text using audio recording of keystrokes.
- 2014‑03‑22:
The world's most valuable cannabis business is growing in a sleepy corner of England.
- 2014‑03‑22:
A new kind of playground offers freedom to overprotected kids.
- 2014‑03‑22:
DNS requests from port 0 lead to weird errors.
- 2014‑03‑22:
The only 8 software innovations we actually use.
- 2014‑03‑22:
BLAKE2: "harder, better, faster, stronger" than MD5.
- 2014‑03‑22:
Why writing firmware is kinda like software exploitation.
- 2014‑03‑22:
Oops. The fly in the IANA internationalization ointment.
- 2014‑03‑22:
Scribe, the Guardian's in-browser extensible rich text editor.
- 2014‑03‑21:
The road to IPv6 at Facebook.
- 2014‑03‑21:
Serious vulnerabilities in ASUS routers, requiring manual firmware update to fix.
- 2014‑03‑21:
About that time Google spied on Michael Arrington's Gmail.
- 2014‑03‑21:
Brian Krebs the Movie?!
- 2014‑03‑21:
Inside the NSA's secret efforts to hunt and hack system administrators.
- 2014‑03‑21:
GCHQ via Theresa May warns Yahoo that its move to Dublin is a security worry.
- 2014‑03‑21:
Recommendations for DNSSEC deployment.
- 2014‑03‑21:
8- to 10-year-old kids do science and write a paper about the vision of bees.
- 2014‑03‑21:
Many homophobes do not believe in the existence of straight people.
- 2014‑03‑21:
US tech giants knew of NSA data collection, agency's top lawyer insists.
- 2014‑03‑21:
Youth subcultures: what are they now?
- 2014‑03‑20:
The story behind the Rob Ford story: defamation law and the press in Canada.
- 2014‑03‑20:
UCL open letter complains about racist sexist Daily Mail.
- 2014‑03‑20:
Timezone fun at Troll, a Norwegian Antarctic station.
- 2014‑03‑20:
DNS for massive-scale botnet command and control.
- 2014‑03‑20:
Backblaze Storage Pod 4.0.
- 2014‑03‑19:
How do you know if a random number generator is working?
- 2014‑03‑19:
Git is now using sane three-component semantic version numbers.
- 2014‑03‑19:
NIST is planning to privatise its NTP service.
- 2014‑03‑18:
The #node.js IRC channel policy on trolling.
- 2014‑03‑18:
Reproducibility in computer systems research.
- 2014‑03‑18:
On your permanent record: Anonymity, pseudonymity, and ephemerality.
- 2014‑03‑17:
The BBC's rightwing bias.
- 2014‑03‑17:
Trying out TLS for http:// URLs.
- 2014‑03‑17:
Art of the luggage label.
- 2014‑03‑17:
Physicists, Generals and CEOs agree: ditch the PowerPoint.
- 2014‑03‑17:
Popcorn Time is back, because it is open source.
- 2014‑03‑17:
Target ignored intrusion detection alerts that could have prevented their massive credit card breach.
- 2014‑03‑17:
Why does modern Perl avoid UTF-8 by default?
- 2014‑03‑17:
Half of UK government now outsourced under hopelessly bad secret contracts.
- 2014‑03‑17:
Record accessors and mutators in the Frege programming language.
- 2014‑03‑16:
Intro to type programming in Scala.
- 2014‑03‑16:
London firm at centre of hack redirecting DNS of 300,000 home gateways.
- 2014‑03‑16:
Drones will cause an upheaval of society like we haven't seen in 700 years.
- 2014‑03‑16:
In the US, where income is lower, life spans are reducing.
- 2014‑03‑16:
Follow-up on 4K TVs for programmers.
- 2014‑03‑16:
The slow death of Silicon Roundabout.
- 2014‑03‑15:
How corporations are crippling U.S. prosperity.
- 2014‑03‑15:
Why Atom can't replace Vim. 1976 was a good year for text editors.
- 2014‑03‑15:
The infinite lives of BitTorrent.
- 2014‑03‑15:
FastMail's Cyrus server architecture, and a failure recovery report.
- 2014‑03‑14:
A 100-year-old emergency water supply put out a fire in San Francisco this week.
- 2014‑03‑14:
Partial/incomplete git import of X consortium historical RCS up to X11R6.0
- 2014‑03‑14:
Some dumb DNS forwarders are vulnerable to trivial unspoofed cache poisoning attacks.
- 2014‑03‑14:
The parable of Google Flu: traps in big data analysis.
- 2014‑03‑14:
Post-publication peer review works better.
- 2014‑03‑14:
Cefaly: TENS migrane preventing space tiara.
- 2014‑03‑14:
162,000+ WordPress sites used for pingback DDoS attack.
- 2014‑03‑13:
Samsung Galaxy devices have a backdoor allowing filesystem access from the baseband processor.
- 2014‑03‑13:
Attacking the iOS 7 early_random() kernel PRNG.
- 2014‑03‑13:
Nine amazing facts about English social history that will blow your mind!
- 2014‑03‑13:
Free and common socage, as of the manor of East Greenwich in Kent.
- 2014‑03‑12:
Is Popcorn Time really immune from copyright liability?
- 2014‑03‑11:
How to eat your entropy and have it too: optimal recovery strategies for compromised random number generators.
- 2014‑03‑11:
Agile is dead. Long live agility.
- 2014‑03‑11:
Linux's disk write bufferbloat fsync() woes are getting some attention.
- 2014‑03‑10:
No, Americans are not all to blame for the financial crisis: exposing the big lie of the post-crash economy.
- 2014‑03‑10:
An overview of projects working on next-generation secure email.
- 2014‑03‑10:
LINQ for C++
- 2014‑03‑10:
A visit to the US Office of the Director of National Intelligence.
- 2014‑03‑10:
Startup myths and obsessions.
- 2014‑03‑10:
George Osborne wants a smaller state; economist Mariana Mazzucato argues instead that forward-thinking public spending is crucial for a creative, prosperous society.
- 2014‑03‑10:
America's university system is getting destroyed: faculty are increasingly hired on the Wal-Mart model as temps.
- 2014‑03‑10:
We are all intelligence officers now.
- 2014‑03‑10:
The forty-year slump: the declining value of work since 1974.
- 2014‑03‑10:
The Hitchhiker's Guide to the Galaxy game: 30th anniversary edition.
- 2014‑03‑10:
Stealing Bitcoins from wallets with weak addresses.
- 2014‑03‑09:
Determinism is not enough: making parallel programs reliable with stable multithreading.
- 2014‑03‑09:
Alan Adler, the inventor of the Aerobie and AeroPress.
- 2014‑03‑09:
Myths about /dev/urandom
- 2014‑03‑08:
The Temple Operating System: a simple single-user unprotected x86-64 OS.
- 2014‑03‑07:
Propositions as types: the Curry/Howard isomorphism.
- 2014‑03‑07:
What every C programmer should know about undefined behaviour.
- 2014‑03‑07:
Treating inequality with redistribution: is the cure worse than the disease?
- 2014‑03‑06:
Creating software for sysops: make sure you do not suck.
- 2014‑03‑05:
In Mario Kart you don't get blue shells or lightning bolts when you're already in first place.
- 2014‑03‑05:
Using OpenSSH certificate authentication.
- 2014‑03‑05:
The story of the GnuTLS bug.
- 2014‑03‑05:
European ccTLD news, with a piece on DNSSEC.
- 2014‑03‑05:
Readable code and named values.
- 2014‑03‑04:
fuzzdb: the most comprehensive Open Source database of malicious and malformed input test cases.
- 2014‑03‑04:
Thoughts on style, TLS, and errors.
- 2014‑03‑04:
A roadmap for globalizing IANA.
- 2014‑03‑04:
The Indian sanitary pad revolutionary.
- 2014‑03‑04:
TLS triple handshake vulnerability.
- 2014‑03‑03:
Downloading PuTTY safely is nearly impossible.
- 2014‑03‑03:
What most likely happened to MtGox.
- 2014‑03‑03:
What did not happen at Mt. Gox.
- 2014‑03‑02:
Star in a bottle: a profile of ITER.
- 2014‑03‑02:
The perovskite lightbulb moment for solar power.
- 2014‑03‑02:
Root DNSSEC witnesses plus quorate secure time.
- 2014‑03‑02:
How academia and publishing are destroying scientific innovation: a conversation with Sydney Brenner.
- 2014‑03‑02:
The sound of drawing swords.
- 2014‑03‑01:
A brief history of one line security fixes.
- 2014‑03‑01:
Delve deep into DNSSEC with BIND 9.10.
- 2014‑03‑01:
Why Sweden has so few road deaths.
- 2014‑03‑01:
What is a root DNSSEC key ceremony like?
- 2014‑03‑01:
A birthday present from Broadcom: open source VideoCore IV drivers.
- 2014‑03‑01:
"DNS Experiment Concludes", a classic from the 1st April 2001.
- 2014‑03‑01:
An open letter to Erik Voorhees: when markets fail to punish bad actors effectively.
- 2014‑03‑01:
British public is far to the left of the Labour Party.
- 2014‑03‑01:
How Steve Perlman's "revolutionary" wireless technology works - and why it I s a bigger deal than anyone realizes.
- 2014‑02‑28:
Linux IPv6 route cache is too small by default.
- 2014‑02‑28:
DNSSEC in Windows Server 2012.
- 2014‑02‑28:
To close or not to close: void elements in HTML.
- 2014‑02‑27:
Error handling in ICU: avoiding goto fail.
- 2014‑02‑27:
Row polymorphism is not subtyping.
- 2014‑02‑26:
Servo: Mozilla's effort to reinvent the web browser for the multi-core age.
- 2014‑02‑25:
How to safely generate a random number.
- 2014‑02‑25:
Paramount does a DMCA takedown on @555uHz two-frames-per-hour Top Gun Twitter account.
- 2014‑02‑25:
Stunning brilliant demo of the Wolfram Language.
- 2014‑02‑25:
An ssh server written in PHP for MtGox.
- 2014‑02‑25:
The unlikely tale of how ARM came to rule the world.
- 2014‑02‑25:
Springer and IEEE withdraw more than 120 computer-generated papers.
- 2014‑02‑24:
How to get a busy person to respond to your email.
- 2014‑02‑24:
Apple's TLS backdoor is so lame that the Internet has an opinion about it.
- 2014‑02‑24:
Most winning A/B test results are illusory.
- 2014‑02‑24:
Inside the Netflix/Comcast deal and what the media is getting very wrong.
- 2014‑02‑24:
Secure salted password hashing: how to do it properly.
- 2014‑02‑23:
John Yudkin: sugar's spurned prophet.
- 2014‑02‑23:
Netflix will pay Comcast for direct peering.
- 2014‑02‑23:
Why systemd is winning the init wars.
- 2014‑02‑23:
Junction design in the Netherlands.
- 2014‑02‑23:
X can now run without root privilege on OpenBSD.
- 2014‑02‑23:
Running Mac OS X as a QEMU/KVM guest.
- 2014‑02‑23:
Learning from Apple's #gotofail security bug.
- 2014‑02‑23:
Rope clock.
- 2014‑02‑23:
The very hungry rust monster.
- 2014‑02‑23:
Radiation-hardened Ruby quine (with link to a Perl version).
- 2014‑02‑22:
A look back at "security problems in the TCP/IP protocol suite" fifteen years later.
- 2014‑02‑22:
Why you should deploy DNSSEC.
- 2014‑02‑22:
Apple's TLS bug.
- 2014‑02‑21:
Cryptographic obfuscation and "unhackable" software.
- 2014‑02‑21:
The part where I hack my Github graph.
- 2014‑02‑21:
git-fat: a simple way to handle large files with git.
- 2014‑02‑21:
Cannabis tax revenue and spending plans in Colorado.
- 2014‑02‑21:
Emscripten LLVM "fascomp" backend.
- 2014‑02‑21:
Old arctic ice is melting and taking the rest of the ice with it.
- 2014‑02‑20:
Difference between standard time and solar time around the world.
- 2014‑02‑20:
Scaling WhatsApp to millions of simultaneous connections.
- 2014‑02‑20:
Don't let shoulder-surfers video password entry on public transport.
- 2014‑02‑20:
Progress decoding the Voynich manuscript.
- 2014‑02‑19:
Botnet C&C over DNS.
- 2014‑02‑19:
DNS server activity logging on Windows.
- 2014‑02‑19:
London population growth: how quickly will Crossrail's new trains fill up?
- 2014‑02‑18:
How the Guardian successfully moved to a new unified domain name.
- 2014‑02‑18:
5 surprisingly painful things about client-side JavaScript.
- 2014‑02‑18:
A comprehensive study of convergent and commutative replicated data types.
- 2014‑02‑18:
Locating London's past: scrolly zoomy historical maps.
- 2014‑02‑18:
Using Scala will make you less productive.
- 2014‑02‑18:
Cambridge is at the heart of Britain's economic recovery.
- 2014‑02‑18:
Trace-based just-in-time compilation for lazy functional programming languages.
- 2014‑02‑17:
A lot of water coming our way.
- 2014‑02‑17:
Kids, phones and routing around parental restrictions.
- 2014‑02‑16:
Why collisions don't occur between cyclists on Simultaneous Green junctions.
- 2014‑02‑16:
The public voice of women.
- 2014‑02‑15:
Germany's great university tuition fee U-turn.
- 2014‑02‑15:
The museum of copulatory organs.
- 2014‑02‑15:
In Germany, house prices keep falling, because that's what they're supposed to do.
- 2014‑02‑15:
European Court of Justice declares that linking does not infringe copyright.
- 2014‑02‑15:
The French way of cancer treatment.
- 2014‑02‑14:
Python script to play Radio 4 slightly slower in order to skip over the Archers.
- 2014‑02‑14:
Met Office briefing on the recent storms and floods in the UK.
- 2014‑02‑14:
Technical details behind a 400Gbps NTP amplification DDoS attack.
- 2014‑02‑14:
On the origin of fuck. (Featuring a prominent Ely.)
- 2014‑02‑13:
JavaScript/CSS3 rail station departure board split-flap display.
- 2014‑02‑13:
How to manipulate who pays IP-over-X.25 traffic charges.
- 2014‑02‑13:
Random numbers only once.
- 2014‑02‑13:
Linux's leap second deadlocks.
- 2014‑02‑12:
Julia: a fast dynamic language for technical computing.
- 2014‑02‑12:
Why is eBay making life easy for bike thieves?
- 2014‑02‑12:
Klackity klack: a keyboard scoring system.
- 2014‑02‑10:
Evaluating the design of the R language.
- 2014‑02‑10:
Outdated, outmoded and increasingly inaccurate: is it time follow our European neighbours and say goodbye to "Miss"?
- 2014‑02‑10:
French journalist fined €3000 for "hacking" government website using Google and wget.
- 2014‑02‑09:
UDP-based amplification attacks.
- 2014‑02‑09:
Broken by design: systemd.
- 2014‑02‑09:
1000x faster spelling correction algorithm.
- 2014‑02‑08:
High speed trading isn't about efficiency: it's about cheating.
- 2014‑02‑08:
Backdoor found in Energizer Duo USB battery charger.
- 2014‑02‑08:
The Snowden era of journalism.
- 2014‑02‑08:
The terrifying surveillance case of Brandon Mayfield.
- 2014‑02‑08:
The bedroom tax has been significantly restricted by the courts.
- 2014‑02‑08:
json-pull: a streaming JSON pull parser in C.
- 2014‑02‑08:
Cisco wins case against wifi patent troll Innovatio.
- 2014‑02‑08:
Introduction to the Mill CPU programming model.
- 2014‑02‑08:
Flexible array members and struct padding.
- 2014‑02‑08:
The art of software security assessment: C language issues.
- 2014‑02‑08:
How to dump an info document to your pager.
- 2014‑02‑07:
Transport and Health Study Group letter to the Advertising Standards Agency about cycle helmets.
- 2014‑02‑07:
Simple dynamic strings for C. (A part of Redis.)
- 2014‑02‑07:
RoboCop: wanted for serious crimes against cinema.
- 2014‑02‑07:
ICANN registrar agreement is incompatible with EU data protection law.
- 2014‑02‑07:
How to use indistinguishability obfuscation: deniable encryption, and more.
- 2014‑02‑07:
That NBC story about getting hacked in Sochi is bullshit.
- 2014‑02‑06:
Neil Gaiman on the designer's job.
- 2014‑02‑06:
Large scale DNS redirection on home routers for financial theft.
- 2014‑02‑06:
Rate-limiting state: the edge of the Internet is an unruly place. (Vixie on BCP38)
- 2014‑02‑06:
What if Earth were a torus instead of a sphere?
- 2014‑02‑06:
UK charities take second place to domain squatters in Nominet's flattened .uk namespace.
- 2014‑02‑06:
Little's Law, scalability and fault tolerance: The OS is your bottleneck. What can you do?
- 2014‑02‑06:
Assertions are pessimistic; assumptions are optimistic.
- 2014‑02‑05:
The first congressman to battle the NSA is dead. No-one noticed, no-one cares.
- 2014‑02‑05:
Verizon using recent Net Neutrality victory to wage war against Netflix by throttling AWS.
- 2014‑02‑05:
Entropy attacks!
- 2014‑02‑05:
Storing ASCII art in the DNS.
- 2014‑02‑05:
A breakthrough in secure program obfuscation.
- 2014‑02‑04:
UK national grid status dashboard.
- 2014‑02‑04:
Jenga: a build system in OCaml.
- 2014‑02‑04:
Assertions and Frama-C.
- 2014‑02‑04:
Emotionally palatable criticism.
- 2014‑02‑04:
How to accidentally be a jerk on Twitter, and how to resolve it.
- 2014‑02‑04:
NIST continues using SHA-1 algorithm after banning it.
- 2014‑02‑04:
Blackfriars bridge is covered in solar panels.
- 2014‑02‑04:
Thinking in animation frames: tuning Google Chrome for 60 Hz.
- 2014‑02‑04:
Useful discussion of Mozilla Persona.
- 2014‑02‑04:
Why we love Mozilla Persona. And why you should, too.
- 2014‑02‑03:
Optimal system activity logging.
- 2014‑02‑03:
Minimizing unreproducible bugs.
- 2014‑02‑03:
A US court is poised to hand spooks the keys to the Internet.
- 2014‑02‑03:
Data structures are strange things: comparing tree implementations in Erlang.
- 2014‑02‑03:
Streets outside Guardian US office and staff homes suddenly dug up on the night of the first Snowden story.
- 2014‑02‑03:
Meet Julia, the one programming language to rule them all.
- 2014‑02‑03:
Support for secure transfer of DNSSEC signed domains in .nl (Dutch)
- 2014‑02‑03:
Animations of a perfectly centered break of a perfectly aligned pool ball rack.
- 2014‑02‑03:
What is it about the Lib Dems and Sci Fi?
- 2014‑02‑03:
10 things we forgot to monitor.
- 2014‑02‑03:
Fuzzers love assertions.
- 2014‑02‑03:
New books will not be compatible with old Adobe e-reader DRM from July.
- 2014‑02‑03:
LED there be light! Now better than fluorescent tubes.
- 2014‑02‑03:
It wasn't Yahoo that was hacked: consequences of password database leaks.
- 2014‑02‑03:
Regehr on assertions.
- 2014‑02‑01:
The typography of 2001: A Space Odyssey.
- 2014‑02‑01:
Enforcing Murphy's Law for advance identification of run-time failures, using syscall gremlins.
- 2014‑02‑01:
We know little about the effect of diet on health. That's why so much is written about it.
- 2014‑01‑31:
What are you playing at? Lift the flaps to flip the gender stereotypes.
- 2014‑01‑31:
The ObjectStore database system. (1991)
- 2014‑01‑31:
California regulator seeks to shut down "learn to code" bootcamps.
- 2014‑01‑31:
Demographics of housing in Cambridge.
- 2014‑01‑31:
When your account is the target of a cloud service spear phishing attack.
- 2014‑01‑30:
An empirical investication into programming language syntax.
- 2014‑01‑30:
EU has secret plan for police to "remote stop" cars. (Fun for autosec hackers!)
- 2014‑01‑30:
OpenSSH 6.5 release announcement.
- 2014‑01‑30:
Nine things to expect from HTTP/2.
- 2014‑01‑29:
The Labour case for electoral reform in local government.
- 2014‑01‑29:
An open letter to Baroness Howe from Andrews and Arnold, on Internet censorship.
- 2014‑01‑29:
Budget and average annual costs of snow removal operations in Montreal.
- 2014‑01‑29:
Stanford NetDB.
- 2014‑01‑29:
"Quoth" the raven? The heartwarming tale of a defective verb.
- 2014‑01‑29:
Open Dylan calls for help.
- 2014‑01‑28:
What type of machine is the C preprocessor?
- 2014‑01‑28:
Analysis of the OpenSSL random API.
- 2014‑01‑28:
There's only four billion floats, so test them all!
- 2014‑01‑28:
A spam cartoon.
- 2014‑01‑28:
sex.py: safe-extract is a Python script that unpacks compressed archives (tarballs etc.) safely.
- 2014‑01‑28:
Dutch ISPs do not have to implement DNS or IP copyright censorship because it is disproportionate and/or ineffecive.
- 2014‑01‑28:
Some simple unix commands implemented in sed.
- 2014‑01‑27:
The descent to C.
- 2014‑01‑27:
How the UK GDS uses git and github.
- 2014‑01‑27:
Sky UK Internet censorship breaks jquery.
- 2014‑01‑27:
Not with a bang, but with a whimper: trademark dispute over gaijin.com.
- 2014‑01‑27:
In memory of Roger Bucklesby, who hated this park and everyone in it.
- 2014‑01‑27:
Model Boeing 777 paper plane project.
- 2014‑01‑27:
Free software maintenance: adding features (or not).
- 2014‑01‑27:
The Third Way... make the third generation pay. (1999)
- 2014‑01‑27:
Map of vaccine-preventable disease outbreaks.
- 2014‑01‑27:
Why sugar helped remove the Victoria Line cement flood.
- 2014‑01‑26:
Automatically entering the grand C++ error explosion competition.
- 2014‑01‑26:
Results of the grand C++ error explosion competition.
- 2014‑01‑26:
2014: The year of CSV.
- 2014‑01‑26:
Secret papers show extent of senior royals' veto over British legislation.
- 2014‑01‑26:
Randomized practice schedules improve mental engagement and subsequent performance.
- 2014‑01‑26:
Decentralized trustworthiness measures and certificate pinning; hash mining Zooko's triangle.
- 2014‑01‑25:
Making GIFs from video files with Python.
- 2014‑01‑25:
Six misunderstandings about consensus in distributed systems.
- 2014‑01‑25:
Did this Tor developer become a victim of the NSA's laptop interception program?
- 2014‑01‑25:
Why patriarchy fears the scissors: for women, short hair is a political statement.
- 2014‑01‑25:
Google Chrome moving from NSS to OpenSSL.
- 2014‑01‑25:
Level 3 are now hijacking failed DNS requests for ad revenue on 4.2.2.x.
- 2014‑01‑24:
And the Academy Award goes to... a literate program!
- 2014‑01‑24:
The dirty secret behind ball lightning is dirt.
- 2014‑01‑24:
Gay couple threaten to sue UK government over converting civil partnership to marriage.
- 2014‑01‑24:
The monkeys in 2013: Firefox's JavaScript work.
- 2014‑01‑24:
The R inferno: If you are using R and you think you're in hell, this is a map for you.
- 2014‑01‑24:
File IO in Rust.
- 2014‑01‑23:
Notes on the history of graph paper.
- 2014‑01‑23:
Almost everything in "Dr Strangelove" was true.
- 2014‑01‑23:
What is so great about the Julia programming language.
- 2014‑01‑23:
UKIP are true libertarians.
- 2014‑01‑23:
SSL/TLS survey of the Alexa top 1,000,000 web sites.
- 2014‑01‑23:
Block cipher mode failures.
- 2014‑01‑23:
"Spoiled onions" perform MitM attacks against the Tor network.
- 2014‑01‑23:
Microsoft's platform-of-the-week and the loss of developer trust.
- 2014‑01‑23:
Emacs strip tease.
- 2014‑01‑23:
XSugar: dual syntax for XML languages.
- 2014‑01‑23:
XML attack vectors.
- 2014‑01‑23:
Researcher gets $33k bug bounty for snatching the password file from a Facebook server.
- 2014‑01‑23:
Supernova in Messier 82 discovered by UCL students.
- 2014‑01‑23:
Chesterton's fence.
- 2014‑01‑23:
Network Solutions WebLock program will be opt-in not opt-out.
- 2014‑01‑22:
A closer look at the best password managers.
- 2014‑01‑22:
JSCert: a mechanised specification of JavaScript, using the Coq proof assistant.
- 2014‑01‑22:
Division algebras and wireless communication.
- 2014‑01‑22:
8086tiny: a tiny PC emulator/virtual machine.
- 2014‑01‑22:
The biggest land rush in the history of the internet begins on February 4: new gTLDs.
- 2014‑01‑22:
Domain name analysis: lengths, ngrams, etc.
- 2014‑01‑22:
The Tab compares Cambridge college wine bills to outreach spending.
- 2014‑01‑22:
NTP relflections.
- 2014‑01‑22:
Brython: Python 3 running in the browser.
- 2014‑01‑21:
Backblaze on HDD reliability.
- 2014‑01‑21:
Network Solutions tries to increase cost of two domain names by $1,850.
- 2014‑01‑21:
The effect of today's technology on tomorrow's jobs will be immense—and no country is ready for it.
- 2014‑01‑21:
Teensy USB development board.
- 2014‑01‑21:
analemma.c
- 2014‑01‑21:
Tom Van Baak on the equation of time and driving quartz clock stepper motors.
- 2014‑01‑21:
Top-down operator precedence (Pratt) parsing.
- 2014‑01‑21:
An electro-mechanical VLF radio receiver.
- 2014‑01‑21:
Equation clocks, that show apparent solar time.
- 2014‑01‑21:
UCAS and the extent of FOIA: tribunal favours a wide approach.
- 2014‑01‑21:
Financial conflicts of interest and reporting bias regarding the association between sugar-sweetened beverages and weight gain.
- 2014‑01‑20:
Linux 3.13 release highlights.
- 2014‑01‑20:
Google vs Intellectual Ventures in landmark patent troll trial.
- 2014‑01‑20:
Useful perl one-liners.
- 2014‑01‑20:
In search of National Grid reference OV0000.
- 2014‑01‑20:
Magnetic north is on the move again.
- 2014‑01‑20:
A big step towards generational compacting garbage collection in Firefox.
- 2014‑01‑19:
Guile uses ELF for its bytecode file format and DWARF for bytecode debugging info.
- 2014‑01‑19:
What happens when the poor receive a stipend?
- 2014‑01‑19:
Ed25519 key format variants.
- 2014‑01‑19:
Twister: P2P microblogging. (home page)
- 2014‑01‑19:
Twister: a p2p microblogging platform, based on bitcoin, bittorrent, and DHTs.
- 2014‑01‑18:
The 5 best punctuation marks in literature.
- 2014‑01‑18:
Vi Hart on logarithms.
- 2014‑01‑18:
Why programming needs explicit state.
- 2014‑01‑18:
Pachelbel's canon.
- 2014‑01‑18:
Yale students made a better version of their course catalogue. Then Yale shut it down.
- 2014‑01‑17:
Why an intelligent Scot would vote for independence.
- 2014‑01‑17:
Scientific errors in the European tobacco products directive.
- 2014‑01‑17:
Experimenting at scale with Google Chrome's SSL warning to reduce the click-through rate.
- 2014‑01‑17:
Bitrot and atomic COWs: Inside "next-gen" filesystems btrfs and ZFS.
- 2014‑01‑16:
Time Warp prevents Time Machine from deleting important backup snapshots.
- 2014‑01‑16:
Review of Nominet's .uk registration policy. (How could a domain name be a sex crime?!)
- 2014‑01‑16:
Happy 25th birthday to Tcl.
- 2014‑01‑16:
Good fun with bad crypto: Citrix CTX1 password encoding.
- 2014‑01‑15:
The science of Boston's great molasses flood of 1919.
- 2014‑01‑15:
DNS hijacking with just one mail.
- 2014‑01‑15:
OSv: a new operating system designed to execute a single application on top of a hypervisor.
- 2014‑01‑15:
Mathematical purity in distributed systems: CRDTs without fear.
- 2014‑01‑15:
Use the mean absolute deviation instead of the standard deviation.
- 2014‑01‑15:
Intrepid modder builds Hackintosh Mac Pro replica inside a real trashcan.
- 2014‑01‑15:
An experimental study of sorting and branch prediction.
- 2014‑01‑15:
How to complain about mobile internet over-blocking.
- 2014‑01‑15:
40 more maps that explain the world.
- 2014‑01‑14:
How an emulator-fueled robot reprogrammed Super Mario World on the fly.
- 2014‑01‑14:
Transactional mutex locks.
- 2014‑01‑14:
The search for the lost Cray supercomputer OS.
- 2014‑01‑14:
Man poses as woman on online dating site; barely lasts two hours.
- 2014‑01‑14:
Firefox asm.js AOT compilation and startup performance.
- 2014‑01‑14:
A 30 minute introduction to Rust.
- 2014‑01‑13:
The state of Rust 0.9.
- 2014‑01‑13:
Comparing filesystem performance in virtual machines.
- 2014‑01‑13:
A personal history of the Royal Greenwich Observatory at Herstmonceux Castle.
- 2014‑01‑13:
The Sinclair QL is 30 years old.
- 2014‑01‑13:
Elliptic curve cryptography in practice.
- 2014‑01‑12:
The essence of Reynolds.
- 2014‑01‑12:
Brussels contemplates going car-free.
- 2014‑01‑12:
Boys are born to prefer dolls over masculine toys like cars.
- 2014‑01‑12:
GLO: print on to flow-in-the-dark paint with UV LEDs.
- 2014‑01‑11:
1983-1993: the wonder years of sequential Prolog implementation.
- 2014‑01‑11:
A fishy chat with Sainsbury's.
- 2014‑01‑11:
Such DFW. Very Orwell. So Doge. Wow.
- 2014‑01‑11:
Building an open source laptop.
- 2014‑01‑11:
Implementing a JIT compiler with Haskell and LLVM.
- 2014‑01‑11:
HTTP/2 considerations and tradeoffs.
- 2014‑01‑10:
Extracts from the coffee club diary.
- 2014‑01‑10:
Malicious use of the HTML5 vibrate API.
- 2014‑01‑10:
Carte Blanche: a social experiment with cloned blank credit cards.
- 2014‑01‑10:
An appraisal of the utility of a chocolate teapot.
- 2014‑01‑10:
City of London Police cannot seize domains just because Hollywood says the websites are infringing.
- 2014‑01‑10:
How useless is a chocolate teapot?
- 2014‑01‑10:
Understanding and mitigating NTP-based DDoS amplification attacks.
- 2014‑01‑09:
Detailed London Underground track map.
- 2014‑01‑09:
Software in 2014.
- 2014‑01‑08:
Typox: urban typography in and around Oxford.
- 2014‑01‑08:
Chaps is a PKCS #11 implementation that provides TPM-backed cryptographic services for Chrome OS.
- 2014‑01‑08:
UK postcodes geographical data service.
- 2014‑01‑08:
Mapping high-level programming language constructs to LLVM IR.
- 2014‑01‑07:
The icosahedron and the pentagon-hexagon-decagon identity.
- 2014‑01‑07:
Lyra: password key derivation based on the sponge construction.
- 2014‑01‑07:
Knot DNS 1.4.0 released with support for automatic DNSSEC signing.
- 2014‑01‑07:
More about Unicode in Python 2 and 3.
- 2014‑01‑06:
Optimising Haskell for a tight inner loop.
- 2014‑01‑06:
Edelweiss: automatic storage reclamation for distributed programming.
- 2014‑01‑06:
Mythryl: a fork of SML/NJ.
- 2014‑01‑06:
Sightsmap: a map of the most popular locations for photography.
- 2014‑01‑06:
What is new in purely functional data structures since Okasaki?
- 2014‑01‑06:
sedsed: a sed script debugger and prettifier.
- 2014‑01‑06:
Hexaflexagon cushions.
- 2014‑01‑06:
DNSSEC infrastructure audit framework.
- 2014‑01‑06:
Smartphones versus DSLRs versus film: A look at how far we've come.
- 2014‑01‑06:
Windows portability shim for snprintf().
- 2014‑01‑06:
Top Hollywood movies that passed the Bechdel Test earned more in 2013.
- 2014‑01‑06:
Backpack: retrofitting Haskell with interfaces.
- 2014‑01‑06:
Anatomy of a cheap USB to Ethernet adapter.
- 2014‑01‑05:
Paul Dacre of the Daily Mail: The man who hates liberal Britain.
- 2014‑01‑05:
Much more than you wanted to know about marijuana.
- 2014‑01‑05:
Pluralistic ignorance: the self-reinforcing cycle of false belief.
- 2014‑01‑05:
Why we should give free money to everyone.
- 2014‑01‑05:
How misaligning data can increase performance 12x by reducing cache misses.
- 2014‑01‑05:
23% of global electricity generation is supplied by renewable sources.
- 2014‑01‑04:
Inception: memory manipulation and hacking over FireWire.
- 2014‑01‑04:
Reverse engineering a bank's secure authentication app.
- 2014‑01‑04:
Haskell vs. Erlang for bittorent clients.
- 2014‑01‑04:
Ori: a secure distributed file system.
- 2014‑01‑03:
Technology didn't kill middle class jobs, public policy did.
- 2014‑01‑02:
Times, dates, and computers: this way lies madness.
- 2014‑01‑02:
bzr: a retrospective.
- 2014‑01‑02:
Creating a rogue CA certificate. (2008)
- 2014‑01‑01:
DUAL_EC_DRBG backdoor proof-of-concept.
- 2014‑01‑01:
Welcome to the hardware jungle, in the twilight of Moore's law.
- 2014‑01‑01:
The financial crisis: Why have no high-level executives been prosecuted?
- 2013‑12‑31:
About Python 3 (lack of) adoption.
- 2013‑12‑31:
Where will we live? The British housing crisis.
- 2013‑12‑30:
Xplain: explaining X11 for the rest of us.
- 2013‑12‑30:
Hacking MicroSD cards.
- 2013‑12‑29:
On geek culture.
- 2013‑12‑29:
Nine lies about fat that ruined the western world's health.
- 2013‑12‑29:
Scientists tell us their favourite jokes: 'An electron and a positron walked into a bar...'
- 2013‑12‑29:
Viral sharing and truth in journalism.
- 2013‑12‑28:
Quantities: type-safe units of measurement for Idris.
- 2013‑12‑28:
C# for systems programming.
- 2013‑12‑28:
Analysis of SSD reliability during power outages.
- 2013‑12‑28:
Imperative reasoning is hard.
- 2013‑12‑28:
MailChimp CEO on email's age defying resilience.
- 2013‑12‑27:
Replicant: distributed state machines made easy.
- 2013‑12‑27:
10 of the best open source hardware projects of 2013.
- 2013‑12‑26:
Joose: an advanced metaclass system for JavaScript.
- 2013‑12‑26:
Advanced design patterns in Python.
- 2013‑12‑26:
Cheques are in decline, but UK gov't says 'We want cheques to have a crucial role in the ongoing success of the UK.'
- 2013‑12‑26:
Albrecht Dürer's Roman letters.
- 2013‑12‑25:
Implementing Elligator for Curve25519.
- 2013‑12‑25:
So, you want to crypto...
- 2013‑12‑24:
Why is Git HTTPS not working on GitHub?
- 2013‑12‑24:
Strong TLS security on nginx (and Apache and lighttpd).
- 2013‑12‑24:
Gitlab and Active Directory LDAP authentication.
- 2013‑12‑24:
Mobile ISP image recompression.
- 2013‑12‑24:
PNG can be a lossy format.
- 2013‑12‑24:
10 best and most memorable maker projects of 2013.
- 2013‑12‑24:
Cameron's internet filter goes far beyond porn - and that was always the plan.
- 2013‑12‑23:
The mathematical hacker.
- 2013‑12‑23:
Adam Rosenberg's programming style.
- 2013‑12‑23:
Perl 6 unary sort.
- 2013‑12‑23:
A local augmented root zone with DNSSEC.
- 2013‑12‑23:
Copyright is not stealing, says the Supreme Court of the US.
- 2013‑12‑23:
The beauty of mathematics. (Vimeo)
- 2013‑12‑23:
Take charge of your batteries!
- 2013‑12‑22:
Railgun: fast strstr() implementation.
- 2013‑12‑22:
Why marketers fear the female geek.
- 2013‑12‑22:
UPS's holiday shipping planner: they call him Mr Peak.
- 2013‑12‑22:
Former Top NSA official: "we are now in a police state".
- 2013‑12‑22:
Brand contamination: when men's products get girl cooties.
- 2013‑12‑22:
Algorithmic defamation: the case of the shameless autocomplete.
- 2013‑12‑21:
Growing up unvaccinated.
- 2013‑12‑21:
How to search on encrypted data.
- 2013‑12‑21:
Who in Whitehall approved torture after 9/11?
- 2013‑12‑21:
New openssh key format and bcrypt pbkdf.
- 2013‑12‑20:
NSA/RSA DUAL_EC_DRBG arrangement was known in September.
- 2013‑12‑20:
Sierpiński calendar.
- 2013‑12‑20:
NSA paid RSA $10 million to promote backdoored DUAL_EC_DRBG.
- 2013‑12‑20:
Critics say NSA agent co-chairing key crypto standards body should be removed.
- 2013‑12‑20:
Canada lifts all restrictions on prostitution, because they increase harm.
- 2013‑12‑20:
Requesting removal of NSA employee from chair of IETF crypto forum research group.
- 2013‑12‑20:
UPS My Choice has amazingly creepy security questions and bait-and-switch pricing.
- 2013‑12‑20:
On the matter of strlcpy/strlcat acceptance by industry.
- 2013‑12‑20:
0x10 years of protecting privacy with GnuPG.
- 2013‑12‑20:
When is a 'cluster' a real cluster? Cyclist deaths in London.
- 2013‑12‑20:
'Free trade' and the death of democracy.
- 2013‑12‑20:
UK porn block fiasco goes mainstream.
- 2013‑12‑20:
100 years of monopoly phone service.
- 2013‑12‑20:
The inventor of Karaoke.
- 2013‑12‑20:
"I wrote the Anarchist Cookbook in 1969. Now I see its premise as flawed."
- 2013‑12‑20:
Flaw in OpenSSL Dual EC DRBG (no not that one).
- 2013‑12‑20:
Winkel Tripel warping trouble.
- 2013‑12‑19:
Nutrient: an indexed key-value store based on crit-bit tries with a cdb-like API.
- 2013‑12‑19:
Golang 1.3+ compiler overhaul: The Go compiler today is written in C. It is time to move to Go.
- 2013‑12‑19:
Bitcoin, magical thinking, and political ideology.
- 2013‑12‑19:
Why WordPress bloggers were blocked by TalkTalk, and what it tells us about Internet filtering.
- 2013‑12‑18:
MacBook webcams can spy on their users without warning.
- 2013‑12‑18:
One Weird Old Trick to Undermine the Patriarchy.
- 2013‑12‑18:
RSA key extraction via low-bandwidth acoustic cryptanalysis.
- 2013‑12‑18:
The magazine that featured in War Games.
- 2013‑12‑18:
Why I want Bitcoin to die in a fire.
- 2013‑12‑18:
We are allowed to hate Silicon Valley.
- 2013‑12‑18:
Common markup for Markdown and reStructuredText.
- 2013‑12‑17:
UK Internet archive will not be accessible via the Internet, because copyright.
- 2013‑12‑17:
It's the Macroeconomy, Stupid. Neoliberal policy targets the structure not the level of wealth.
- 2013‑12‑17:
We need to talk about TED.
- 2013‑12‑17:
git-integration: easily merge several work-in-progress topic branches onto a base branch.
- 2013‑12‑16:
Recommendations for secure use of TLS and DTLS.
- 2013‑12‑16:
Fast blitting on the 6809.
- 2013‑12‑15:
So you think you have a power law - well, isn't that special?
- 2013‑12‑15:
It's not harming anyone, so why is Brussels trying to remove my e-cigarette?
- 2013‑12‑15:
On undoing, fixing, or removing commits in git.
- 2013‑12‑15:
The web needs view object containment.
- 2013‑12‑15:
The mission to decentralize the Internet.
- 2013‑12‑15:
The basics of taking good photos.
- 2013‑12‑14:
Bugs in the wetware? The psychology of computer insecurity.
- 2013‑12‑13:
Bicycle Helmets and the law: a perfect teaching case for epidemiology.
- 2013‑12‑13:
A vintage cargo bike collection in Italy.
- 2013‑12‑13:
The drop in teenage pregnancies is a great political success story.
- 2013‑12‑13:
Cap'n Proto: promise pipelining RPC protocol.
- 2013‑12‑12:
Simple Binary Encoding: a new ultra-fast marshalling API in C++, Java and .NET.
- 2013‑12‑12:
lazysorted: a partially and lazily sorted list data structure for Python.
- 2013‑12‑12:
Better and better keyboard prototypes.
- 2013‑12‑12:
Running a web browser on a Macintosh Plus.
- 2013‑12‑11:
The birth of stderr.
- 2013‑12‑11:
Obscure C++ features.
- 2013‑12‑10:
Doom at 20: John Carmack's hellspawn changed gaming forever.
- 2013‑12‑10:
NSA ♥︎ Facebook.
- 2013‑12‑10:
Samantha West: the telemarketer robot who swears she's not a robot.
- 2013‑12‑10:
Doom: 20 years of a gaming legend.
- 2013‑12‑10:
Maria Leijerstam's South Pole trike.
- 2013‑12‑09:
Why are Upworthy headlines suddenly everywhere?
- 2013‑12‑09:
Exile: disassembly of the most technically advanced game released for the BBC Micro.
- 2013‑12‑08:
There are now two Americas. The country is a horror show.
- 2013‑12‑08:
talloc: The Tutorial.
- 2013‑12‑07:
Still waiting for the stupid network.
- 2013‑12‑07:
Ten lazy assumptions that are part of the mainstream political consensus.
- 2013‑12‑07:
WHAT THE FLUCK! The point at which journalism fails and modern power begins.
- 2013‑12‑06:
Telepathwords: preventing weak passwords by reading your mind.
- 2013‑12‑06:
Clocks: a collection of experiments in generative art.
- 2013‑12‑06:
reptyr: change the pty of a running process on Linux.
- 2013‑12‑06:
Multiprocess Firefox.
- 2013‑12‑05:
Edward Snowden and Glenn Greenwald: the people who leaked the NSA's secrets.
- 2013‑12‑05:
King James programming: a Markov chain trained on the bible and Structure and Interpretation of Computer Programs.
- 2013‑12‑05:
Gmail download and escape hatch.
- 2013‑12‑04:
Dispute over infinity divides mathematics.
- 2013‑12‑03:
Greenwald: the journalist who hacked the old system.
- 2013‑12‑03:
The SSD endurance experiment: testing data retention at 300TB.
- 2013‑12‑03:
Project Oberon 2013: the design of an operating system, a compiler, and a computer.
- 2013‑12‑03:
How does the NSA break SSL?
- 2013‑12‑03:
A young person's guide to BCPL programming on the Raspberry Pi.
- 2013‑12‑03:
NSA werewolf.
- 2013‑12‑03:
Applied crypto hardening.
- 2013‑12‑02:
The return of the open mail relays.
- 2013‑12‑02:
A linguist explains the rules of summoning Benedict Cumberbatch.
- 2013‑12‑02:
Headlines from a mathematically literate world.
- 2013‑12‑01:
Most important innovations are not patented.
- 2013‑12‑01:
Bedsheet Problem: how many times can you fold it in half?
- 2013‑12‑01:
CC0 vs CC-BY.
- 2013‑12‑01:
TPM chip protecting SSH keys, properly.
- 2013‑12‑01:
Comedian gets the last laugh over FCUK logo row.
- 2013‑11‑30:
Reverse-engineering Vermeer's secret technique.
- 2013‑11‑30:
The Jolla phone: first impressions.
- 2013‑11‑30:
Myth: Apollo astronauts didn't float away because they had heavy boots.
- 2013‑11‑30:
San Francisco's DC power grid.
- 2013‑11‑30:
OK to clone software by testing it and reading the manual, rules UK court.
- 2013‑11‑29:
Cheaper IPv6-only servers.
- 2013‑11‑28:
Configure BIND to validate answers to recursive queries in zones for which it is authoritative.
- 2013‑11‑28:
Root zone KSK rollover. (slides)
- 2013‑11‑28:
SSAC advisory on DNSSEC key rollover in the root zone. (slides)
- 2013‑11‑28:
SSAC advisory on DNSSEC key rollover in the root zone.
- 2013‑11‑28:
Computer science course fills seats at Harvard.
- 2013‑11‑27:
Algorave is the future of dance music (if you're a nerd).
- 2013‑11‑27:
Linux memory management and linear big data scans.
- 2013‑11‑27:
Trends in cybersecurity.
- 2013‑11‑27:
Pre-paid SIM cards for travellers.
- 2013‑11‑27:
Comcast now has the world's largest IPv6 deployment.
- 2013‑11‑27:
Farming hard drives: 2 years and $1M later.
- 2013‑11‑27:
The Google+ real names policy has had an amazing effect on the quality of YouTube comments.
- 2013‑11‑27:
Tradeoffs in cybersecurity.
- 2013‑11‑26:
FFTS: fastest fourier transform in the south.
- 2013‑11‑26:
NTP amplification attacks.
- 2013‑11‑26:
Mail supremacy: The newspaper that rules Britain.
- 2013‑11‑26:
Jury decides that Newegg infringes the bogus TQP crypto patent.
- 2013‑11‑26:
Creative Commons licences version 4.0.
- 2013‑11‑25:
The dot, our simplest punctuation mark, has become a sign of anger.
- 2013‑11‑25:
Healthcare.gov and the gulf between planning and reality.
- 2013‑11‑25:
Unresolvable host names in the Alexa top 1,000,000 web site list.
- 2013‑11‑25:
A simple explanation of how money moves around the banking system.
- 2013‑11‑25:
Whitfield Diffie takes the stand in the Newegg crypto patent troll trial.
- 2013‑11‑25:
NDK quartz crystal manufacturing plant exploded, killing someone 200 metres away.
- 2013‑11‑25:
ICANN kills Scott Richter's spam-friendly registrar Dynamic Dolphin.
- 2013‑11‑24:
Northwestern Lightboard, for recording lecture graphics without lots of post-production.
- 2013‑11‑24:
Boolean satisfiability: from theoretical hardness to practical success.
- 2013‑11‑23:
Teach debugging by playing the sabotage game.
- 2013‑11‑23:
Fixing Walmart's node.js memory leak.
- 2013‑11‑23:
Breaking OS X signed kernel extensions with a NOP.
- 2013‑11‑23:
The long-gone tax that everyone still thinks they're paying.
- 2013‑11‑23:
Geeks for monarchy: the rise of the neoreactionaries.
- 2013‑11‑23:
555 footstool.
- 2013‑11‑23:
Circuit stickers.
- 2013‑11‑23:
Information Is Beautiful awards 2013 winners.
- 2013‑11‑22:
Fixing fsync().
- 2013‑11‑22:
Louis Essen on the history of leap seconds. (1981)
- 2013‑11‑21:
Microsoft are selling a Google mug.
- 2013‑11‑21:
To kill a centrifuge: a technical analysis of what Stuxnet's creators tried to achieve.
- 2013‑11‑21:
Leonardo da Vinci's viola organista cello/piano cross has at last been built 500 years after it was designed.
- 2013‑11‑21:
Mathematicians team up on twin primes conjecture.
- 2013‑11‑20:
Software patent reform just died thanks to lobbying from IBM and Microsoft.
- 2013‑11‑20:
Halting password puzzles: hard-to-break encryption from human-memorable keys.
- 2013‑11‑20:
Nominet will go ahead and flatten the .uk DNS namespace.
- 2013‑11‑20:
Cycling and trucks the Dutch way.
- 2013‑11‑19:
Rosetta stone for Unix.
- 2013‑11‑19:
JSTOR denies access to five people every second.
- 2013‑11‑19:
A new diagnostic test to distinguish benign and life-threatening prostate cancers. #movember
- 2013‑11‑19:
Zalgol: an esoteric programming language.
- 2013‑11‑19:
Visual cryptography.
- 2013‑11‑18:
Analysis of the https X.509 certificate ecosystem.
- 2013‑11‑18:
The forgotten giant arrows that guided the mail across America.
- 2013‑11‑17:
What mathematical structure models arithmetic with physical units?
- 2013‑11‑17:
An efficient non-moving garbage collector for functional languages.
- 2013‑11‑17:
'Because' has become a preposition, because grammar.
- 2013‑11‑17:
Why is it so difficult and expensive to make your own clothes?
- 2013‑11‑17:
What has gone wrong with RNGs in practice.
- 2013‑11‑17:
The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols.
- 2013‑11‑17:
Acid Retirement Home: 20 years of cultural stagnation.
- 2013‑11‑16:
The two dualities of computation: negative and fractional types.
- 2013‑11‑16:
Lorries, cyclists, and delivery restrictions in Paris.
- 2013‑11‑16:
A 2x speedup with one line of code: prefetching Python objects during array traversal.
- 2013‑11‑15:
What happens to Google Maps when tectonic plates move?
- 2013‑11‑15:
Afnic promotes .fr DNSSEC.
- 2013‑11‑15:
Robust de-anonymization of large datasets: how to break anonymity of the Netflix prize dataset.
- 2013‑11‑15:
What happens when a GPRS terminal attaches to the network.
- 2013‑11‑15:
Detecting stealthy distributed ssh brute force attackers.
- 2013‑11‑15:
Should quadrotors look like this?
- 2013‑11‑15:
How a journalist faced his fears and learned to be good at maths.
- 2013‑11‑15:
With Great Power. (A superhero short story.)
- 2013‑11‑14:
CrunchBase's contradictory Creative Commons copyright case.
- 2013‑11‑14:
Terra: a low-level system programming language embedded in Lua.
- 2013‑11‑14:
dataset: databases for lazy Python programmers.
- 2013‑11‑14:
The second operating system hiding in every mobile phone.
- 2013‑11‑14:
Police try to recuit a student to spy on political activity at Cambridge University.
- 2013‑11‑14:
Integer undefined behaviour in open source crypto libraries.
- 2013‑11‑13:
Snowden and the future.
- 2013‑11‑13:
Vi Hart on Google+ YouTube integration.
- 2013‑11‑13:
The secret life of SIM cards.
- 2013‑11‑13:
40% more of what salary balances happiness against a long commute?
- 2013‑11‑13:
Bechdel gets testy.
- 2013‑11‑12:
Our privacy problem is a democracy problem in disguise.
- 2013‑11‑11:
Web latency benchmark.
- 2013‑11‑11:
Weak statistical standards implicated in scientific irreproducibility: p should be 0.005 or less.
- 2013‑11‑11:
The Dr Who theme as Ron Grainer may have intended.
- 2013‑11‑11:
The big data brain drain: science is in trouble.
- 2013‑11‑11:
A person with a one-hour commute has to earn 40% more to be as happy as someone who walks.
- 2013‑11‑10:
Why do Brits accept surveillance?
- 2013‑11‑10:
A short history of software development methods.
- 2013‑11‑10:
Psychedelics and mental health: a population study.
- 2013‑11‑10:
Why the Cornell paper on selfish Bitcoin mining is important.
- 2013‑11‑10:
The Pyret programming language.
- 2013‑11‑09:
Evaluation of New Zealand's bicycle helmet law: compulsory helmets increase risk of injury by 20-30%.
- 2013‑11‑09:
Rotate the world with JavaScript D3.
- 2013‑11‑08:
Google shell style guide.
- 2013‑11‑07:
Geography of top-level domains.
- 2013‑11‑07:
Bitcoin isn't so broken after all.
- 2013‑11‑07:
Bootstrapping the adoption of Internet security protocols.
- 2013‑11‑06:
Who's the biggest spy? NSA, GCHQ, and the "special relationship".
- 2013‑11‑06:
Mozilla anticookie tool plans crumbling.
- 2013‑11‑06:
The best and worst countries to be an expatriate.
- 2013‑11‑06:
Part of Internet Archive building badly burned in early morning fire.
- 2013‑11‑06:
Statistics done wrong: the woefully complete guide.
- 2013‑11‑05:
DiffPDF: compare two PDF files, textually or visually.
- 2013‑11‑05:
Undefined behaviour: what happened to my code?
- 2013‑11‑04:
Bitcoin is fundamentally broken.
- 2013‑11‑04:
25th anniversary of the Morris worm.
- 2013‑11‑03:
Best visual illusion of the year contest, 2005-present.
- 2013‑11‑03:
Browsing history: A heritage site is being set up in the UCLA room where the first ARPANET message originated.
- 2013‑11‑03:
The highly unusual company behind Sriracha, the world's coolest hot sauce.
- 2013‑11‑02:
An interview with the old man of floating point.
- 2013‑11‑02:
Unii, a student-only social network, signs up 100,000+ users in six months in the UK.
- 2013‑11‑02:
Google's plans for a 1-million-square-foot London office at King's Cross.
- 2013‑11‑02:
Ditch Microsoft Office or take a pay cut: Which would you choose?
- 2013‑11‑02:
A devil's dictionary of programming.
- 2013‑11‑02:
Neo900: open phone project.
- 2013‑11‑01:
Patent war goes nuclear: Rockstar sues Google with ex-Nortel patents.
- 2013‑11‑01:
The 2008 Liberty vs UK case: an ECHR ruling on Snowden's disclosures.
- 2013‑11‑01:
Bitcoin as protocol.
- 2013‑10‑30:
Announcing the Dark Mail Alliance, founded by Silent Circle and Lavabit.
- 2013‑10‑30:
Lavabit and Silent Circle join forces to make all email surveillance-proof.
- 2013‑10‑30:
Toyota's killer firmware: Bad design and its consequences.
- 2013‑10‑30:
Why are "Ghost," "Ghastly," and "Ghoul" Spelled with "gh"?
- 2013‑10‑29:
The status of Moore's Law: it's complicated.
- 2013‑10‑29:
Seagate comedic open storage.
- 2013‑10‑28:
Diebold charged with bribery and falsifying docs in a worldwide pattern of criminal conduct.
- 2013‑10‑28:
C in CAP != C in ACID.
- 2013‑10‑28:
Phishing with Linkedin's Intro.
- 2013‑10‑27:
The keys to the keydom: RSA keys with common factors.
- 2013‑10‑27:
The war on hackers.
- 2013‑10‑27:
The e-cigarette industry, waiting to exhale.
- 2013‑10‑27:
Making 128MB SIMMs from 64MB SIMMs.
- 2013‑10‑27:
Data Cube: a relational aggregation operator generalizing group-by, cross-tab, and sub-total.
- 2013‑10‑27:
How to write New Age Jargon.
- 2013‑10‑27:
Mac OS 10.9: infinity times your spam.
- 2013‑10‑26:
I challenged hackers to investigate me and what they found out is chilling.
- 2013‑10‑26:
The Netherlands: a whole country that has transformed itself for cycling.
- 2013‑10‑26:
Schrödinger's token: parsing with multiple-typed tokens.
- 2013‑10‑26:
What's new in Unicode 7.0.
- 2013‑10‑26:
What it would take for self-driving cars to catch on.
- 2013‑10‑26:
Lua: Good, different, and ugly parts.
- 2013‑10‑26:
The Slash programming language.
- 2013‑10‑26:
Delayed printf for real-time logging.
- 2013‑10‑25:
LinkedIn Intro? No thanks. My email security is too important.
- 2013‑10‑25:
A quick audit of CryptoCat's elliptic curve crypto.
- 2013‑10‑25:
LinkedIn 'Intro'duces email man-in-the-middle attack on its users.
- 2013‑10‑25:
Reinventing storage: ethernet über alles!
- 2013‑10‑25:
Optimizing TLS record size and buffering latency.
- 2013‑10‑25:
A relatively easy to understand primer on elliptic curve cryptography.
- 2013‑10‑25:
NASD: network-attached secure disks.
- 2013‑10‑25:
The Seagate Kinetic open storage vision.
- 2013‑10‑24:
OS X Mavericks ruined Apple Mail for Gmail users.
- 2013‑10‑23:
Security fixes in OS X Mavericks v10.9.
- 2013‑10‑23:
Trace and replay retrospective debugging?
- 2013‑10‑23:
Curl: a note to users of OS X Mavericks 10.9.
- 2013‑10‑23:
Color blindness and palette choice.
- 2013‑10‑23:
Edit the HTML of sites that insist on binary gendered titles.
- 2013‑10‑23:
Gerrit code review: Change-IDs.
- 2013‑10‑22:
Regenerator: Let's get serious about ES6 generator functions.
- 2013‑10‑22:
Tubewhacking.
- 2013‑10‑22:
The decline of Wikipedia: as more people rely on it, fewer people create it.
- 2013‑10‑22:
Raspberry Pi GPS NTP without soldering.
- 2013‑10‑22:
Maps of average cloud coverage.
- 2013‑10‑22:
How to lose $172,222 a second for 45 minutes.
- 2013‑10‑21:
The roots of the US government shutdown.
- 2013‑10‑21:
Why civil resistance works: the strategic logic of nonviolent conflict.
- 2013‑10‑21:
TP-Link TL-WR703N: an extremely small networked computer.
- 2013‑10‑21:
Is math a gift? Beliefs that put females at risk.
- 2013‑10‑21:
Everything you always wanted to know about synchronization but were afraid to ask.
- 2013‑10‑21:
Six decades of the USA's most popular names for girls, state-by-state.
- 2013‑10‑21:
The invention of switch mode power supplies.
- 2013‑10‑20:
13 nutrition lies that made the world sick and fat.
- 2013‑10‑20:
A few Utah panoramas.
- 2013‑10‑20:
Anti-racism campaigner and immigration caseworker sent 'go home' text message by Home Office.
- 2013‑10‑20:
Graph of Radiohead songs by genre.
- 2013‑10‑20:
Dianne Feinstein's bragging about NSA surveillance program may lead to I t being declared unconstitutional.
- 2013‑10‑20:
Every position of Rubik's Cube can be solved in twenty moves or less.
- 2013‑10‑20:
Sweden becomes first western nation to reject low-fat dogma in favor of low-carb high-fat nutrition.
- 2013‑10‑20:
Showing you this map of aggregated bullfrog occurrences would be illegal.
- 2013‑10‑20:
Engineering the LOUDS succinct tree representation.
- 2013‑10‑20:
Analysis of Apple iMessage privacy.
- 2013‑10‑20:
4 reasons clang is becoming my go-to compiler.
- 2013‑10‑20:
The ocean is broken.
- 2013‑10‑20:
Six weeks to provision a VM?!?
- 2013‑10‑17:
Recovering a corrupted git packfile.
- 2013‑10‑17:
Your brain on beer vs coffee.
- 2013‑10‑16:
Is Bitcoin an NSA honeypot?
- 2013‑10‑15:
Bollocks cycling infrastructure.
- 2013‑10‑15:
The Cambridge CAP capability-based computer.
- 2013‑10‑15:
The BCS computer conservation society.
- 2013‑10‑15:
Stained glass sundials.
- 2013‑10‑15:
Land unknown to humans before the European age of discovery.
- 2013‑10‑14:
GCHQ hid its network spying capability from parliamentary snoopers charter scrutiny.
- 2013‑10‑14:
A diary of four wars: where war reporting goes wrong.
- 2013‑10‑14:
How to design a city for women.
- 2013‑10‑14:
A review of the Avegant Virtual Retinal Display.
- 2013‑10‑14:
Time to leave leap seconds behind?
- 2013‑10‑14:
A cylindrical cut-glass sundial.
- 2013‑10‑14:
SafeCurves: choosing safe curves for elliptic-curve cryptography.
- 2013‑10‑14:
The trouble with timestamps in distributed databases.
- 2013‑10‑14:
Proofs as Cryptography: a new interpretation of Curry-Howard for software certificates.
- 2013‑10‑13:
Unemployment is not a sign of bad character.
- 2013‑10‑13:
Cambridge bike theft conviction rate barely above 1%.
- 2013‑10‑13:
Property in London is like a global reserve currency.
- 2013‑10‑13:
Labour will be more right wing than the Tories.
- 2013‑10‑13:
Reverse engineering a D-Link backdoor.
- 2013‑10‑13:
The US fears back-doored hardware because they are building it too.
- 2013‑10‑12:
Why email is hard: internationalization.
- 2013‑10‑12:
The awful body-shaming future of 3D printing.
- 2013‑10‑12:
Microsoft Word must die.
- 2013‑10‑12:
The registrars who obeyed City of London police demands to disable web sites likely violated ICANN policy.
- 2013‑10‑11:
The London Ringways: a post-war plan for a dense network of motorways through and around the capital.
- 2013‑10‑11:
European ruling spells trouble for unmoderated online comment.
- 2013‑10‑10:
evldns: libevent + ldns.
- 2013‑10‑10:
"What happened to me after I read dinosaur erotica."
- 2013‑10‑10:
The 9 kinds of physics seminar.
- 2013‑10‑09:
Chelsea Manning: I'm no "pacifist".
- 2013‑10‑09:
802.11ac 'gigabit Wi-Fi' starts to show its potential and limits.
- 2013‑10‑09:
Name That Blue.
- 2013‑10‑09:
Commodore Pet killer poke.
- 2013‑10‑09:
Why and how Ben Goldacre wrote Bad Pharma.
- 2013‑10‑09:
The Great Library at Alexandria was destroyed by budget cuts, not fire.
- 2013‑10‑09:
The Financial Times switches to a digital-first publishing model.
- 2013‑10‑09:
Constructing the Sierpinsky triangle.
- 2013‑10‑09:
The bogus Starbucks duffin trademark is provoking cake rage.
- 2013‑10‑08:
Shards: How the high-wizard Mordaine invented NoSQL.
- 2013‑10‑08:
An informal anti-virus comparison.
- 2013‑10‑08:
Optimizing Linux memory management for low-latency / high-throughput databases.
- 2013‑10‑08:
Lossless decompression and the generation of random samples.
- 2013‑10‑08:
Intellectual Ventures buys patent donated by AmEx for the public good... and starts suing.
- 2013‑10‑08:
How the FBI forced Lavabit to shut down.
- 2013‑10‑08:
BioLite fan-assisted wood stove and generator with USB power out.
- 2013‑10‑08:
GADT meet subtyping.
- 2013‑10‑07:
Tea Party radicalism is misunderstood: meet the "newest right".
- 2013‑10‑07:
A profile of Alan Rusbridger and the Guardian in the New Yorker.
- 2013‑10‑07:
Grandma's cooking from around the world.
- 2013‑10‑07:
How (not) to trigger a layout in WebKit.
- 2013‑10‑07:
Preventing web page layout thrashing.
- 2013‑10‑06:
nedtries.
- 2013‑10‑06:
ZeroMQ: helping OpenDNS block malicious domains in real time.
- 2013‑10‑06:
The coming world of automated mass anti-terror false positives.
- 2013‑10‑06:
Dogs are people too.
- 2013‑10‑06:
Luje: a pure Lua JVM.
- 2013‑10‑06:
The shutdown prophet: maybe Washington was destined to go dark all along.
- 2013‑10‑06:
A scientific guide to saying "no": How to avoid temptation and distraction.
- 2013‑10‑06:
A federal budget crisis months in the planning.
- 2013‑10‑06:
Coffee experiments.
- 2013‑10‑05:
Maven is broken by design.
- 2013‑10‑05:
1m2 space-saving staircase from EeStairs.
- 2013‑10‑04:
And then Steve said, 'let there be an iPhone'.
- 2013‑10‑04:
Patent troll Lodsys settles for nothing to avoid trial.
- 2013‑10‑04:
"RFCs were just a temporary expedient intended to last just a few months."
- 2013‑10‑04:
Guillermo del Toro's Simpsons couch gag is the best thing ever. (video)
- 2013‑10‑03:
extprot: compact, efficient, extensible, binary, cross-language, long-term serialization protocols.
- 2013‑10‑03:
Visualizing suffix primes.
- 2013‑10‑03:
Silk Road, Lavabit, and the limits of crypto.
- 2013‑10‑02:
Edward Snowden's email provider defied FBI demands to turn over private crypto keys.
- 2013‑10‑02:
The hallmark of a truly effective internal security system would be the maximum possible disclosure.
- 2013‑10‑02:
Cockblocked by redistribution: a pick-up artist fails in Denmark.
- 2013‑10‑02:
Bathys Hawaii Cesium 133 atomic wristwatch.
- 2013‑10‑02:
Kardashev scale of levels of civilization. Type III is about 4E37 W.
- 2013‑10‑02:
The Death Star used 1E38 joules to destroy Alderaan.
- 2013‑10‑01:
Write build rules in Lua with tup.
- 2013‑10‑01:
What will the completed Sagrada Família look like? (YouTube)
- 2013‑10‑01:
Efficient custom allocators in C.
- 2013‑10‑01:
Food verbiage that should be banned.
- 2013‑09‑30:
Why whistleblowers should be listened to.
- 2013‑09‑30:
Responsive web design tips from BBC News.
- 2013‑09‑30:
Steal this research paper! (You already paid for it.) Michael Eisen and open access publishing.
- 2013‑09‑29:
Judge tosses Apple motion, allows patent troll Lodsys to continue rampage.
- 2013‑09‑29:
ARM64 and Objective C.
- 2013‑09‑29:
Topological rope trick.
- 2013‑09‑29:
Knight v Snail in medieval manuscripts.
- 2013‑09‑29:
Why mathematicians make great comedy writers.
- 2013‑09‑29:
US nuclear commander suspended for gambling problems.
- 2013‑09‑28:
Internet centralization is not a conspiracy.
- 2013‑09‑27:
Edward Snowden has started a global debate. So why the silence in Britain?
- 2013‑09‑27:
FastMail staff purchase the business from Opera.
- 2013‑09‑25:
Preparing an IPv6 addressing plan.
- 2013‑09‑25:
The Seven Lady Godivas: Dr. Seuss's little-known book of nudes.
- 2013‑09‑25:
Make a Minecraft map of Britain with 230 lines of Python.
- 2013‑09‑25:
Norway: tobacco harm reduction in the real world.
- 2013‑09‑25:
Zab vs. Paxos: distributed consensus in ZooKeeper.
- 2013‑09‑25:
Normal vs fat-tailed distributions.
- 2013‑09‑25:
How does Dutch street design work for pedestrians?
- 2013‑09‑24:
Availability in globally distributed storage systems: Google's failure stats.
- 2013‑09‑24:
Name server selection of DNS caching resolvers. (slides)
- 2013‑09‑24:
Authority selection in DNS caching resolvers.
- 2013‑09‑24:
iodine: IPv4 over DNS.
- 2013‑09‑24:
US DHS DNS security reference architecture.
- 2013‑09‑24:
Could you pass a Dutch cycling exam?
- 2013‑09‑24:
Stateless TCP for higher DNS capacity on FreeBSD.
- 2013‑09‑24:
LPEG tutorial.
- 2013‑09‑24:
A brief introduction to LPEG.
- 2013‑09‑24:
Job offer: user admin database manager for the University of Cambridge Computing Service.
- 2013‑09‑24:
A Minecraft map of Great Britain from the Ordnance Survey.
- 2013‑09‑24:
Hacking around with Reading Borough Council's urban traffic management and real-time passenger information infrastructure.
- 2013‑09‑23:
The myth of the 10x programmer.
- 2013‑09‑22:
IRIX alert sounds for iOS.
- 2013‑09‑22:
The 500 highest bridges.
- 2013‑09‑22:
Chaos Computer Club breaks Apple TouchID.
- 2013‑09‑22:
Weird machines in ELF: the RTLD is Turing complete.
- 2013‑09‑22:
Percussive Maintenance. (Vimeo)
- 2013‑09‑22:
Hardened stateless session cookies.
- 2013‑09‑22:
Carpet designer threatens cosplayers with legal action.
- 2013‑09‑21:
iOS 7 includes support for Multipath TCP.
- 2013‑09‑21:
Edward C++Hands.
- 2013‑09‑21:
Git internals.
- 2013‑09‑21:
SecurID: security through obscurity.
- 2013‑09‑21:
iPhone 5s: basic fingerprint replication fails to defeat TouchID sensor.
- 2013‑09‑20:
Frog's knickers: a review of "Holy Shit: A Brief History of Swearing".
- 2013‑09‑19:
Time to tame the NSA behemoth trampling our rights.
- 2013‑09‑19:
The cltq story: undefined behaviour in code that seems to use only unsigned integers.
- 2013‑09‑18:
The d-left CBF has the same functionality as a counting Bloom filter, but generally uses half the space or less.
- 2013‑09‑18:
How Tim O'Reilly failed.
- 2013‑09‑18:
CEO who sold Doubleclick to Google replies to patent troll with racketeering lawsuit.
- 2013‑09‑18:
Cryptography for the paranoid.
- 2013‑09‑18:
A jewel at the heart of quantum physics.
- 2013‑09‑17:
Cryptography coding standard.
- 2013‑09‑17:
Getting real about distributed system reliability.
- 2013‑09‑17:
CDC report links use of antibiotics as livestock growth enhancer to human deaths.
- 2013‑09‑17:
Not the morphine: the size of the cage! Rat Park upturns conventional wisdom on addiction.
- 2013‑09‑17:
Updated SSL/TLS deployment best practices deprecate RC4.
- 2013‑09‑16:
Ronn: markdown to manpage converter.
- 2013‑09‑16:
The bizarre evolution of the word "cyber".
- 2013‑09‑16:
The banality of systemic evil.
- 2013‑09‑16:
DNSSEC validation for the PowerDNS Recursor.
- 2013‑09‑16:
SmartFacts: factorizing crypto keys created by certified secure smart cards.
- 2013‑09‑16:
NSA performs active MITM attacks.
- 2013‑09‑16:
The Republican plot to kill Obamacare.
- 2013‑09‑16:
Towards representing APL in Haskell.
- 2013‑09‑16:
Betrayal of the Internet imaginaire.
- 2013‑09‑15:
Good SSL server configuration is absurdly difficult in practice.
- 2013‑09‑14:
The Cambridge Tab has improved student journalism.
- 2013‑09‑14:
Things you should NEVER say during presentations.
- 2013‑09‑14:
Mac OS X security configuration guides.
- 2013‑09‑14:
Photos from the roof above King's Cross Station.
- 2013‑09‑14:
The ugliest C feature: tgmath.h
- 2013‑09‑14:
The Feynman lectures on physics.
- 2013‑09‑14:
Four options for reopening Varsity train line from Cambridge to Bedford revealed by Railfuture.
- 2013‑09‑13:
Solaris random number generation.
- 2013‑09‑13:
Stealthy dopant-level hardware trojans: malicious chips resistant to microscopic inspection.
- 2013‑09‑13:
The Hornsleth deep storage project is deeply, darkly, weird.
- 2013‑09‑13:
Software engineering: a great discipline for an academic fraudster.
- 2013‑09‑13:
Ray Dolby, 1933-2013.
- 2013‑09‑12:
It takes a village to save a hard drive.
- 2013‑09‑12:
Battle Mountain world human-powered speed challenge 2013.
- 2013‑09‑12:
Graeme Obree is aiming for 100mph on his "Beastie" at Battle Mountain this week.
- 2013‑09‑12:
History and implementation status of Opportunistic Encryption for IPsec.
- 2013‑09‑12:
Cambridge Teslathon, 26th/27th October 2013.
- 2013‑09‑12:
Defeating ebook DRM with a Kindle, an iSight, and Lego Mindstorms.
- 2013‑09‑11:
ZooKeeper vs. Doozer vs. Etcd.
- 2013‑09‑11:
(Intellectual) Property is Theft!
- 2013‑09‑11:
Gems mined from NSA documents and FISA court opinions.
- 2013‑09‑11:
The NSA machine: Too big for anyone to understand.
- 2013‑09‑11:
NSA: still bound by laws of computational complexity.
- 2013‑09‑11:
x86 oddities.
- 2013‑09‑10:
Bring back monad comprehensions.
- 2013‑09‑10:
How to fake fingerprints.
- 2013‑09‑10:
Polymer banknotes coming to the UK in 2016.
- 2013‑09‑10:
Superlinear indexes research project.
- 2013‑09‑10:
The TokuFS streaming file system.
- 2013‑09‑10:
Tokutek fractal tree indexing overview.
- 2013‑09‑10:
Hoxton Street Monster Supplies.
- 2013‑09‑10:
Counting to four billion really fast.
- 2013‑09‑10:
Fake storefronts in New York. (The Brooklyn Superhero Supply Company is super cool.)
- 2013‑09‑10:
The real NSA tradeoff: quality of governance.
- 2013‑09‑09:
Understanding the robustness of SSDs under power fault.
- 2013‑09‑09:
Code archaeology with Git.
- 2013‑09‑09:
How the cult of shareholder value wrecked American business.
- 2013‑09‑09:
Nothing up my sleeve number.
- 2013‑09‑09:
A guide to branching in Mercurial.
- 2013‑09‑09:
An in-depth analysis of Mercurial and Git branches.
- 2013‑09‑09:
git-remote-gcrypt: gpg-encrypted git remote storage.
- 2013‑09‑09:
NSA intelligence coup: terrorist suspects use pizza shops.
- 2013‑09‑09:
Authenticated encryption: encrypt-and-MAC vs encrypt-then-MAC vs MAC-then-encrypt.
- 2013‑09‑09:
ReDS: a framework for reputation-enhanced distributed hash tables.
- 2013‑09‑09:
Problems with IPSEC crypto. (1995)
- 2013‑09‑08:
On the British press's lack of interest in the NSA/GCHQ scandal.
- 2013‑09‑08:
National Service Bill. The 1950s called: they want their policies back.
- 2013‑09‑08:
Smoothies and fruit juices are a risk to health.
- 2013‑09‑08:
Dubstep: the musical.
- 2013‑09‑08:
Harvard Business School case study: gender equity.
- 2013‑09‑08:
Obama administration had restrictions on NSA reversed in 2011.
- 2013‑09‑08:
NSA can spy on all kinds of smart phones.
- 2013‑09‑07:
Global jellyfish populations appear to fluctuate on a decadal basis.
- 2013‑09‑07:
90% of Tor keys can be broken by the NSA.
- 2013‑09‑07:
Jellyfish are taking over!
- 2013‑09‑07:
UK government plans to take money from the working poor.
- 2013‑09‑07:
Sweden sits on pipeline of communications intelligence 'gold'.
- 2013‑09‑07:
1Password and the crypto wars.
- 2013‑09‑07:
A brief history of unusual punctuation marks.
- 2013‑09‑07:
Speculation on NSA activity in IPSEC standardization.
- 2013‑09‑07:
NSA access is built into Windows.
- 2013‑09‑06:
Certified lies: detecting and defeating government interception attacks against SSL.
- 2013‑09‑06:
A path forward for an LLVM toolchain on Windows.
- 2013‑09‑06:
What if an attacker tampers with /etc/ssh/moduli?
- 2013‑09‑06:
How CMU increased the proportion of women in computer science from 7% to 42%.
- 2013‑09‑06:
Nginx is taking over the Internet.
- 2013‑09‑06:
Toys R Us pledges to stop gender specific product marketing.
- 2013‑09‑06:
BeeLine reader: colour gradients help eyes track lines more easily.
- 2013‑09‑06:
The public interest argument for publishing the NSA decryption story.
- 2013‑09‑06:
Matt Green on the NSA.
- 2013‑09‑06:
Security dangers of NIST elliptic curves.
- 2013‑09‑06:
Cambridge parkour POV. (YouTube)
- 2013‑09‑06:
Did the NSA put a backdoor in new crypto RNG standard?
- 2013‑09‑06:
Cambridge UKIP candidate Hugh Mennie fined for forging election signatures.
- 2013‑09‑06:
How advanced is the NSA's cryptanalysis, and can we resist it?
- 2013‑09‑06:
How to remain secure against NSA surveillance.
- 2013‑09‑06:
Bias in computer systems.
- 2013‑09‑06:
Technological due process.
- 2013‑09‑06:
Welcome to human rights: make yourself uncomfortable. Internet freedom and humanitarian aid.
- 2013‑09‑05:
NSA and GCHQ defeat crypto and security on the internet.
- 2013‑09‑05:
Train toilets of the world.
- 2013‑09‑05:
1000 Americans try to name a British city other than London.
- 2013‑09‑05:
The baby and the Ba'ath water: US interference in Syria in the 1940s.
- 2013‑09‑04:
DNS cache poisoning: new vulnerabilities and implications.
- 2013‑09‑04:
DNS UDP fragmentation considered poisonous.
- 2013‑09‑04:
Don't run a Tor router and a hidden service from the same connection!
- 2013‑09‑04:
Bridge over troubled bolts: safety concerns about new Bay Bridge.
- 2013‑09‑04:
Soviet cable cars above a Georgian mining town.
- 2013‑09‑03:
Microsoft plus Nokia: Pending patent troll?
- 2013‑09‑03:
Trying for academic tenure without publishing.
- 2013‑09‑03:
The patent troll crisis is really a software patent crisis.
- 2013‑09‑03:
Sealand is planning Havenco 2.0.
- 2013‑09‑02:
Google Play Services: the closed-source meta-app that is defragging Android.
- 2013‑09‑02:
Generators vs fibers in node.js: statically marked vs unmarked coroutines.
- 2013‑09‑02:
On compiling 34 year old C code.
- 2013‑09‑02:
Wikipedia decides to disregard Manning's change of name.
- 2013‑09‑02:
How to choose colours procedurally.
- 2013‑09‑02:
The Leaky Establishment: nuclear comedy ebook.
- 2013‑09‑02:
Offender tagging: electronic curfew in the UK.
- 2013‑09‑02:
Syria: climate change, drought and social unrest.
- 2013‑09‑01:
One-legged man accused of benefit fraud after officials examine wrong leg.
- 2013‑09‑01:
Indiana man accused of teaching people to beat lie detector tests faces prison.
- 2013‑09‑01:
Who has more info: Guantánamo defense lawyers or Hollywood?
- 2013‑08‑31:
Build cycling infrastructure like Livingston!
- 2013‑08‑31:
What happens when someone takes on US consumer protection regulators.
- 2013‑08‑31:
MOV is Turing complete.
- 2013‑08‑31:
A properly untranslatable word: 爽
- 2013‑08‑31:
Ballmer: The man who got the Innovator's Dilemma too much.
- 2013‑08‑31:
The US GAO on the problems with software patents.
- 2013‑08‑31:
The sovereign double-standard: US power and interventionism.
- 2013‑08‑31:
All 9,866,539 buildings in the Netherlands, shaded according to year of construction.
- 2013‑08‑31:
After patent loss, Apple tweaks FaceTime to route all calls via their servers.
- 2013‑08‑31:
Reversing Sinclair's amazing 1974 single chip scientific calculator.
- 2013‑08‑31:
How much does HFT latency arbitrage take from other traders?
- 2013‑08‑31:
California's foie gras ban is upheld by appeals court.
- 2013‑08‑31:
CoffeeScript is 4 times more concise than C.
- 2013‑08‑30:
High school journalists successfully test shield law In cyberbullying suicide case.
- 2013‑08‑30:
How to make your own halloumi.
- 2013‑08‑30:
The active badge location system. (1992)
- 2013‑08‑30:
Guided busway legal battle with BAM Nuttall settled by Cambridgeshire County Council.
- 2013‑08‑30:
Success for LGBT+ campaign, as Cambridge University drops gendered dress codes.
- 2013‑08‑30:
UK government may develop new chemical weapon for use on protesters.
- 2013‑08‑29:
Spy Kids: the NSA and the end of jobs for life.
- 2013‑08‑29:
The strange death of the British middle class.
- 2013‑08‑28:
London to Brighton by train, in 1953, 1983, and 2013.
- 2013‑08‑28:
SQLite's next-generation query planner.
- 2013‑08‑28:
Looking inside the Dropbox client: reverse engineering and security analysis.
- 2013‑08‑28:
Dang ol' babies!
- 2013‑08‑28:
Gallery of multiprocessor cache effects.
- 2013‑08‑27:
The CODE keyboard. (Pity about the typography.)
- 2013‑08‑27:
8 questions to ask before you automate.
- 2013‑08‑27:
Spoof geolocation with a rogue WiFi AP.
- 2013‑08‑27:
Necessary and proportionate surveillance?
- 2013‑08‑27:
Righting the ship on US higher education costs.
- 2013‑08‑27:
GitHub featured in the New Yorker.
- 2013‑08‑27:
The Bristol bus boycott that led to the race relations acts.
- 2013‑08‑27:
Cryptobox: a crypto API modelled on DJB's NaCl using NIST ciphers.
- 2013‑08‑27:
How might the feds have snooped on Lavabit?
- 2013‑08‑27:
Wireless mesh networks will save us from censorship.
- 2013‑08‑26:
High resolution photographs and 3D models of British fossils.
- 2013‑08‑26:
Wireless mesh networks won't save us from censorship.
- 2013‑08‑26:
The spooks' aim: To make journalism harder, slower, less secure.
- 2013‑08‑26:
How Snowden did it.
- 2013‑08‑26:
Mind the gap: London Underground station platform gaps.
- 2013‑08‑26:
Security Debianisms.
- 2013‑08‑26:
Accidentally Turing-Complete.
- 2013‑08‑26:
Lessons learned from mistakes made scaling Reddit to 1 billion pageviews a month.
- 2013‑08‑26:
Phone hack can block calls and SMS on GSM networks.
- 2013‑08‑26:
The greatest mystery of the Inca Empire was its strange economy.
- 2013‑08‑26:
ostree: atomic upgrade and rollback for Linux systems.
- 2013‑08‑26:
The Posix filesystem API sucks.
- 2013‑08‑26:
Comparing U.S. vs world covers of TIME magazine.
- 2013‑08‑26:
State of innovation: Busting the private-sector myth.
- 2013‑08‑26:
The best map ever made of America's racial segregation.
- 2013‑08‑26:
Write-optimized B-trees.
- 2013‑08‑26:
The Science of Cycology: can you draw a bicycle?
- 2013‑08‑26:
When authorities confiscate your electronics they will install malware before returning them.
- 2013‑08‑26:
Fewer accidents in Oxford after speed limits reduced to 20mph.
- 2013‑08‑26:
Mesh networking approaches the mainstream.
- 2013‑08‑26:
olsrd: an adhoc wireless mesh routing daemon.
- 2013‑08‑26:
Comparing AODV and OLSR mesh routing protocols.
- 2013‑08‑26:
Economic reductionism stops here.
- 2013‑08‑26:
Declassified CIA files prove America helped Saddam target chemical weapons against Iran.
- 2013‑08‑26:
Pregnancy: the hard facts.
- 2013‑08‑26:
Use two-factor authentication for Mozilla Persona on your own domain.
- 2013‑08‑25:
Net into dire muck (an anagram of Nominet Direct UK).
- 2013‑08‑25:
A third party report on the open .uk 2LD proposal.
- 2013‑08‑25:
Nimrod: a statically typed language with macros and message-passing concurrency.
- 2013‑08‑25:
Idea: git push requests.
- 2013‑08‑25:
Boilerplate for autotools-based C project.
- 2013‑08‑25:
The seven deadly sins of distributed systems.
- 2013‑08‑25:
1980s horror movie poster logos and typography.
- 2013‑08‑24:
Met police refusing to co-operate with IPCC investigation into abuse of border interrogation powers.
- 2013‑08‑24:
Closing TCP connections is unreliable.
- 2013‑08‑24:
The Lib Dems used to keep us honest. Not any more.
- 2013‑08‑24:
Somebody's listening: Duncan Campbell's report on Echelon. (1988)
- 2013‑08‑24:
How the government finally ruins 3D printing.
- 2013‑08‑24:
Banned hallucinogen ibogaine could cure heroin addiction.
- 2013‑08‑24:
What Manning revealed.
- 2013‑08‑24:
Parsing C++ is undecidable.
- 2013‑08‑24:
C++ and the culture of complexity.
- 2013‑08‑24:
CoVim: collaborative editing for vim.
- 2013‑08‑23:
CloudFlare's new WAF: compiling to Lua.
- 2013‑08‑23:
Two cheers for GitHub.
- 2013‑08‑23:
Divisibility rules for hex.
- 2013‑08‑23:
The obesity epidemic started around 1980.
- 2013‑08‑23:
UK government now leaking documents about itself.
- 2013‑08‑23:
UK's secret Mid-East internet surveillance base.
- 2013‑08‑23:
How biased is the BBC?
- 2013‑08‑23:
Soldering is Easy: here's how to do it.
- 2013‑08‑23:
SMT soldering: it's easier than you think!
- 2013‑08‑23:
Another Sokal takedown: the number 2.9013 will go down in the history of bad science.
- 2013‑08‑23:
The confidential memo at the heart of the global financial crisis.
- 2013‑08‑23:
How computers took over trading.
- 2013‑08‑23:
How to make perfect coffee.
- 2013‑08‑23:
The silent power of the NSA. (1983)
- 2013‑08‑23:
Chelsea Manning: on pressing the button.
- 2013‑08‑23:
NSA domestic spying: Mathematicians should speak out.
- 2013‑08‑22:
Authentication flaws in the Tesla Model S REST API.
- 2013‑08‑22:
Why do so many incompetent men become leaders?
- 2013‑08‑22:
The real, terrifying reason why the British authorities detained David Miranda.
- 2013‑08‑22:
SourceForge making money from malware installers.
- 2013‑08‑22:
Forward secrecy for asynchronous messaging.
- 2013‑08‑22:
OpenSSL PRNG is not really fork-safe.
- 2013‑08‑22:
nanomsg: an improved ØMQ.
- 2013‑08‑22:
Social Engineering: security through education.
- 2013‑08‑22:
Deterministic builds for Tor: why? Cyberwar and global compromise.
- 2013‑08‑22:
CIA closes office that declassifies historical materials.
- 2013‑08‑22:
DHS lawyer says travelers need not submit to TSA VIPR searches.
- 2013‑08‑22:
UK government considers banning tiny mobile phones.
- 2013‑08‑22:
Real spies got shorter sentences than Bradley Manning.
- 2013‑08‑22:
A PHP implementation written in PHP.
- 2013‑08‑21:
The algebra of Unix shell history substitution.
- 2013‑08‑21:
A week with Mozilla Rust.
- 2013‑08‑21:
Painted rainbow nails are too gay for the Olympics.
- 2013‑08‑21:
US intelligence on the record.
- 2013‑08‑21:
Surveillance, censorship, and secrecy - Pacific island style.
- 2013‑08‑21:
Volkan the Intruder: one-man underpants party in Merkel's jet.
- 2013‑08‑21:
The whistleblower's mad moral courage.
- 2013‑08‑21:
2011 FISA court opinion ruling some NSA surveillance unconstitutional.
- 2013‑08‑21:
The only way to avoid the US invention secrecy act is to forgo patent protection.
- 2013‑08‑21:
Containers and Docker: how secure are they?
- 2013‑08‑21:
Does the Cabinet Secretary think democracy is a frivolous game?
- 2013‑08‑21:
Pixarific Rim.
- 2013‑08‑21:
Four fears for authoritarians.
- 2013‑08‑21:
August 2013 GNU Toolchain update.
- 2013‑08‑21:
The key to happiness? love something to the point of ridicule.
- 2013‑08‑21:
Surveillance, totalitarianism and botched up causality.
- 2013‑08‑21:
Bradley Manning's sentence: 35 years for exposing us to the truth.
- 2013‑08‑21:
Zircon affair: UK government secrecy vs journalism in the 1980s.
- 2013‑08‑21:
NSA taps 75% of Internet traffic in the USA.
- 2013‑08‑21:
An astronaut nearly drowned in space.
- 2013‑08‑21:
The 5-in-1 network admin's cable.
- 2013‑08‑21:
The great App.net mistake.
- 2013‑08‑21:
DNS reflection attacks, and measuring resolver support for DNS over TCP.
- 2013‑08‑20:
NSA documents released to the public since June 2013.
- 2013‑08‑20:
What the spooks know. (2005)
- 2013‑08‑20:
Count the women. Count the people of color.
- 2013‑08‑20:
Heuristics and rules: why CloudFlare built a new old WAF.
- 2013‑08‑20:
Louise Mensch provides a right wing view of Snowden / Greenwald / Miranda.
- 2013‑08‑20:
Mac OS X hardening tips from the NSA.
- 2013‑08‑20:
Getopt::Declare: generate command line parsers for Perl programs from their usage documentation.
- 2013‑08‑20:
genparse: command line parser generator.
- 2013‑08‑20:
docopt: generate a command-line argument parser from your usage documentation.
- 2013‑08‑20:
Patent trolls: Tracking down the litigious invention owners.
- 2013‑08‑20:
Groklaw shuts down due to pervasive surveillance.
- 2013‑08‑20:
John le Carré: the spies who lost it.
- 2013‑08‑20:
John le Carré: "I was a secret even to myself."
- 2013‑08‑20:
Bradley Manning and the two Americas.
- 2013‑08‑20:
UK defence authority notice system: quasi-unofficial press censorship.
- 2013‑08‑20:
US government prosecuting instructors of polygraph-beating methods.
- 2013‑08‑19:
What did the US government ask Lavabit to do?
- 2013‑08‑19:
Research software engineers have no recognised career path within universities.
- 2013‑08‑19:
Srelipmoc in esruoc tsrif a.
- 2013‑08‑19:
The danger that reporters now face: GCHQ think destroying laptops in London will stop Snowden's stories.
- 2013‑08‑19:
New features in JavaScript / ECMAScript 6.
- 2013‑08‑19:
David Miranda detention at Heathrow and schedule 7 of the Terrorism Act.
- 2013‑08‑19:
Google claims it is not subject to UK privacy laws.
- 2013‑08‑19:
Moore's law could stay on track with progress in extreme UV photolithography.
- 2013‑08‑19:
The phenomenon of bullshit jobs.
- 2013‑08‑19:
JavaScript ~~ double bitwise not is a fast alternative to Math.floor.
- 2013‑08‑19:
Measuring the practical impact of DNSSEC deployment.
- 2013‑08‑19:
B4: Google's private globally-deployed software-defined WAN.
- 2013‑08‑19:
python-raven: ucam-webauth and Raven application agent in Python.
- 2013‑08‑19:
Managed runtime initiative: a (failed) attempt to improve Linux kernel support for userland garbage collection.
- 2013‑08‑19:
Teaching race to white kids.
- 2013‑08‑19:
How Laura Poitras helped Snowden spill his secrets.
- 2013‑08‑18:
C++ resumable functions: async and await.
- 2013‑08‑18:
UK limits on political campaign spending will criminalize dissent.
- 2013‑08‑18:
Update on PyPy software transactional memory.
- 2013‑08‑18:
I hate the Pumping Lemma.
- 2013‑08‑18:
UK border guards detain and interrogate journalist's partner over NSA/GCHQ spying reports.
- 2013‑08‑18:
Jeff Dean on how neural networks are improving everything Google does.
- 2013‑08‑18:
Are short methods actually worse?
- 2013‑08‑18:
Truffle/Graal: one VM to rule them all: fast dynamic languages, with a Ruby prototype.
- 2013‑08‑18:
Kal: a JavaScript reskin with async wait.
- 2013‑08‑18:
Preferential voting explained by a dingo-punching koala.
- 2013‑08‑18:
Cookieless cookies using ETag.
- 2013‑08‑18:
40 interesting maps.
- 2013‑08‑17:
New tweets per second record: how it became possible.
- 2013‑08‑17:
C ints are finite numbers! Using _Generic to define isnan().
- 2013‑08‑17:
Graceful degradation of SVG image tags.
- 2013‑08‑17:
Travels with Smalltalk.
- 2013‑08‑17:
PiCL crypto review: Firefox sync / profile in the cloud.
- 2013‑08‑17:
Effect of drug prohibition spending on addiction rates.
- 2013‑08‑17:
C# async: Callbacks are our generation's goto statement.
- 2013‑08‑16:
The International Olympic Committee supports Russia's homophobic law.
- 2013‑08‑14:
What mercury being liquid at room temperature has to do with Einstein's theory of relativity.
- 2013‑08‑14:
UK ISPs blindly block innocent web sites.
- 2013‑08‑14:
Aircrew map of Britain.
- 2013‑08‑14:
Understanding Russia's homophobia.
- 2013‑08‑14:
Subverting BIND's SRTT algorithm: derandomizing NS selection.
- 2013‑08‑14:
Why is cycling so popular in the Netherlands?
- 2013‑08‑14:
Latitude, longitude? MQTTitude! A decentralized Google Latitude.
- 2013‑08‑14:
Proof pearl: a verified bignum implementation in x86-64 machine code.
- 2013‑08‑13:
Beery type designers hack Jupiler coasters.
- 2013‑08‑13:
Babelmark FAQ: on the differences between Markdown implementations.
- 2013‑08‑13:
Hacking Transcend WiFi SD cards.
- 2013‑08‑13:
Railway safety doesn't need scare quotes: it works.
- 2013‑08‑13:
64-bit time_t now on OpenBSD.
- 2013‑08‑12:
Return by value in C.
- 2013‑08‑12:
Straight Pride UK try to censor their own press release.
- 2013‑08‑12:
Hyperloop.
- 2013‑08‑12:
Randomly failed! Weaknesses in Java SecureRandom.
- 2013‑08‑12:
Every important person in Bitcoin just got subpoenaed by New York's financial regulator.
- 2013‑08‑12:
Redefining 'undefined' in JavaScript.
- 2013‑08‑12:
LightSquared investor sues GPS companies in attempt to recover wasted money.
- 2013‑08‑12:
UKIP Cambridgeshire county council candidate charged with forging signatures on nomination form.
- 2013‑08‑12:
Mio: a high-performance multicore IO manager for GHC.
- 2013‑08‑11:
Newspapers in the US: How the post was lost.
- 2013‑08‑11:
Reverse engineering Megamos car security crypto?
- 2013‑08‑11:
When did we start trusting code without security management?
- 2013‑08‑11:
Hamlet is banned at the British Library.
- 2013‑08‑10:
Tallinn becomes "capital of free public transport".
- 2013‑08‑10:
The history of the default iPhone message alert sound.
- 2013‑08‑10:
The datacenter as a computer: an introduction to the design of warehouse-scale machines. (second edition)
- 2013‑08‑09:
Kids can't use computers... and this is why it should worry you.
- 2013‑08‑09:
Maybe the real state secret is that spies aren't very good at their jobs.
- 2013‑08‑09:
British court blocks publication of VW Megamos security analysis.
- 2013‑08‑09:
Two providers of secure email shut down.
- 2013‑08‑09:
STACK: optimisation-unstable code checker.
- 2013‑08‑09:
NSA to sack 90% of its system administrators.
- 2013‑08‑09:
Urban grid management and the police state in China.
- 2013‑08‑09:
Encrypted e-mail service linked to Edward Snowden shut down by US government.
- 2013‑08‑09:
Americans are eight times more likely to be killed by cops than by terrorists.
- 2013‑08‑09:
Why I changed my mind about cannabis.
- 2013‑08‑09:
What is it about the Internet that turns people into massive dicks?
- 2013‑08‑08:
Why everyone is pissed off about Google Chrome's password storage.
- 2013‑08‑08:
A leap second bug led Facebook to develop better data center infrastructure management tools.
- 2013‑08‑08:
The quiet carriage proficiency test.
- 2013‑08‑08:
Staring at the sun: Dalvik vs. ASM.js vs. native code.
- 2013‑08‑08:
What derailed the UK economic recovery?
- 2013‑08‑07:
Typo: a programming language that runs in Haskell's type system.
- 2013‑08‑07:
Shanghai 26 years ago and now.
- 2013‑08‑07:
Should legal codes be copyrighted? Let's sue to find out!
- 2013‑08‑07:
Defending against the BREACH https compression information leak attack.
- 2013‑08‑07:
If Bruce Schneier ran the NSA, he'd ask a basic question: "Does it do any good?"
- 2013‑08‑07:
The Toobin principle: repeal the concept of an informed public, repress your decision to take such a drastic step.
- 2013‑08‑06:
Resistive RAM: a terabyte on a chip, smaller than flash.
- 2013‑08‑06:
Former NSA chief terrified of nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings.
- 2013‑08‑06:
Bruce Sterling vs Internet freedom activists.
- 2013‑08‑06:
The simplest periodic table: no numbers, no letters, just dots.
- 2013‑08‑06:
Phabricator: code review, bug tracker, source browser, wiki...
- 2013‑08‑06:
Configuring Apache, nginx, and OpenSSL for forward secrecy.
- 2013‑08‑06:
Sterling's "The Ecuadorian Library" vs civil liberties groups.
- 2013‑08‑06:
The use and abuse of civil forfeiture.
- 2013‑08‑06:
Welcome to post-constitutional America.
- 2013‑08‑06:
Remembering the Apple Newton's prophetic failure and lasting impact.
- 2013‑08‑05:
Car hacking research paper and software.
- 2013‑08‑05:
cson: compact textual json variant.
- 2013‑08‑05:
A switch failure in Utah took out four big hosting providers.
- 2013‑08‑05:
hlld: A high performance C server for HyperLogLog cardinality estimation.
- 2013‑08‑05:
SNMP reflection/amplification DDoS: the vulnerability you might not know you have.
- 2013‑08‑05:
Dava Sobel on leap seconds.
- 2013‑08‑05:
Co-ordinated omission: when high-latency requests make performance statistics look better.
- 2013‑08‑04:
Strongly universal string hashing is fast.
- 2013‑08‑04:
Sharing science is a crime.
- 2013‑08‑04:
Xerox scanners/photocopiers randomly alter numbers in scanned documents.
- 2013‑08‑04:
Half of TOR sites compromised.
- 2013‑08‑04:
Ethics and power in the long war.
- 2013‑08‑04:
How to support both Python 2 and 3.
- 2013‑08‑03:
Raft: an understandable consensus algorithm.
- 2013‑08‑03:
etcd: a highly-available key value store for shared configuration and service discovery.
- 2013‑08‑03:
Dust: a censorship-resistant Internet transport protocol.
- 2013‑08‑03:
40 unusual maps.
- 2013‑08‑03:
Why did the NSA not have a contingency plan?
- 2013‑08‑03:
Embedded C++
- 2013‑08‑03:
International principles on the application of human rights to communications surveillance.
- 2013‑08‑03:
The Ecuadorian Library: Bruce Sterling on the NSA.
- 2013‑08‑03:
How we all pay for bankers.
- 2013‑08‑03:
Archaeology: The milk revolution.
- 2013‑08‑03:
Most Dutch undersea cables are operated by friends of GCHQ.
- 2013‑08‑03:
If we ignore the human in the 'troll', they will always exist.
- 2013‑08‑03:
Universal Credit staff describe chaos behind scenes of flagship Tory reform.
- 2013‑08‑03:
Writing advice from Chuck Palahniuk.
- 2013‑08‑03:
Patient lost £18,000 data protection battle over GP medical records.
- 2013‑08‑03:
Bikes are taking over London.
- 2013‑08‑03:
Twitter issues new rules to crack down on abuse.
- 2013‑08‑03:
What are your rights if stopped by Home Office officials in the street?
- 2013‑08‑03:
Forebruary: a calendar for every month.
- 2013‑08‑03:
Sweden does not produce enough rubbish to feed its power plants.
- 2013‑08‑03:
How the Snowden saga will end.
- 2013‑08‑03:
And I'm like, Quotative 'like' isn't just for quoting.
- 2013‑08‑03:
Penguin's insane policy on electronic galleys for authors.
- 2013‑08‑02:
I can still see your actions on Google Maps over SSL.
- 2013‑08‑02:
Carriers rush to fix SIM card vulnerability by hacking into them.
- 2013‑08‑02:
Entire University of California goes open access.
- 2013‑08‑02:
More UKBA racism.
- 2013‑08‑02:
Paypal turns blind eye to payments totaling $35,000 for on-demand DDoS.
- 2013‑08‑02:
How to talk to your daughter about her body.
- 2013‑08‑02:
Updates to online archived news stories need to be kept current, rules High Court.
- 2013‑08‑02:
The Snowden Effect: definition and examples.
- 2013‑08‑02:
Goldman Sachs overstepped by criminally prosecuting its ex-programmer.
- 2013‑08‑02:
Fast and loose reasoning is morally correct: treating languages as if they are total.
- 2013‑08‑01:
Employer tipped off police to pressure cooker and backpack searches.
- 2013‑08‑01:
The future of https on Wikipedia.
- 2013‑08‑01:
NSA pays £100m in secret funding for GCHQ.
- 2013‑08‑01:
Pressure cookers, backpacks and quinoa: Internet searches lead to visit from terrorist task force.
- 2013‑08‑01:
NSA's Utah data centre construction project.
- 2013‑07‑31:
OSI: the internet that wasn't.
- 2013‑07‑31:
Great visualizations of twitter activity.
- 2013‑07‑31:
PEG.js: parser generator for JavaScript.
- 2013‑07‑31:
Most toxic behaviour does not come from toxic people.
- 2013‑07‑31:
Practical demo of GPS spoofing with an $80 million yacht.
- 2013‑07‑31:
How to help someone stopped for an immigration ID check.
- 2013‑07‑31:
Testing embedded applications with greatest.
- 2013‑07‑31:
Pictures of Tottenham Court Road Station works.
- 2013‑07‑31:
The struct hack invokes undefined behaviour, from Pascal strings to Python tuples.
- 2013‑07‑30:
NSA: the decision problem.
- 2013‑07‑30:
A hole in our collective memory: copyright made mid-century books vanish.
- 2013‑07‑30:
Naked ladies infected with smut fungus.
- 2013‑07‑30:
There are plenty of contexts in which to be "neutral" is simply to be wrong.
- 2013‑07‑30:
John Carmack's .plan files from 1997.
- 2013‑07‑30:
OMG! They're using Windows RT!
- 2013‑07‑30:
The "sea of nodes" approach in the Java HotSpot server compiler.
- 2013‑07‑30:
Fungicides implicated in bee colony collapse disorder.
- 2013‑07‑30:
Semantic hashing for similar document retrieval.
- 2013‑07‑30:
Regulation, technology and caution are making fires a thing of the past.
- 2013‑07‑30:
On the security of TLS: a systematic analysis.
- 2013‑07‑30:
New York Subway map based on radial lines.
- 2013‑07‑30:
Those who deny access to history are condemned repeatedly.
- 2013‑07‑30:
Serco: the company that is ru[in]ning Britain.
- 2013‑07‑30:
UK to charge £3000 bond for visas from six former colonies.
- 2013‑07‑30:
A purely hypothetical conversation about censorship.
- 2013‑07‑29:
A brief history of sour beer.
- 2013‑07‑29:
Simplifying OTR deniability.
- 2013‑07‑29:
GPS jamming.
- 2013‑07‑29:
Who are the trolls?
- 2013‑07‑29:
Raspberry Pi dashcam overlaid with OBD telemetry.
- 2013‑07‑29:
Why YouTube buffers: The secret deals that make and break online video.
- 2013‑07‑29:
Clever card fraud based on a land line user interface gotcha.
- 2013‑07‑29:
Women-hating trolls come out on a radio call-in.
- 2013‑07‑29:
How to choose randomly with a coin.
- 2013‑07‑29:
Political momentum builds against NSA surveillance.
- 2013‑07‑29:
The difference between Boolean objects and primitives in JavaScript.
- 2013‑07‑29:
The surprisingly short history of the history of technology.
- 2013‑07‑29:
SkyMall's SkyFall.
- 2013‑07‑28:
Variable scoping in CoffeeScript and JavaScript.
- 2013‑07‑28:
Scientist banned from revealing codes used to start luxury cars.
- 2013‑07‑28:
US government is trying to get user account passwords.
- 2013‑07‑27:
Le systeme Chappe: Napoleon's semaphore telegraph.
- 2013‑07‑27:
Government bee scientist behind controversial study joins pesticide firm.
- 2013‑07‑27:
Rape threats on Twitter won't get women to shut up. If we shout back we'll win.
- 2013‑07‑27:
20 years of attacks on RSA.
- 2013‑07‑27:
We need an engineering-oriented replacement for Applied Cryptography.
- 2013‑07‑27:
Hackers reveal nasty new car attacks.
- 2013‑07‑27:
Anita Sarkeesian and the gamification of misogyny.
- 2013‑07‑27:
Asciiflow: ASCII art flow diagram tool.
- 2013‑07‑26:
When smart homes get hacked.
- 2013‑07‑26:
Nate Silver's departure from the New York Times and fake vs real objectivity.
- 2013‑07‑26:
Group messaging crypto and the CAP theorem.
- 2013‑07‑26:
Stickonspy: NSA branded web cam stickers.
- 2013‑07‑26:
Performance of Haskell vs ninja C.
- 2013‑07‑26:
A measure of sacrifice: the mechanisation of time.
- 2013‑07‑26:
Mozilla's work on eliminating conservative GC to support moving generational GC.
- 2013‑07‑26:
Hollywood's takeover by Blake Snyder's formulaic screenwriting book, Save the Cat!
- 2013‑07‑25:
Switching from Gmail to FastMail.
- 2013‑07‑25:
The .pw and .la domain name auctions show there isn't much money in new TLDs.
- 2013‑07‑25:
The hourglass: an underrated invention.
- 2013‑07‑25:
US government is trying to get TLS private keys.
- 2013‑07‑25:
FAQs: why gov.uk doesn't have them.
- 2013‑07‑25:
Butterick's Practical Typography.
- 2013‑07‑25:
Anti-usability dark patterns: the slippery slope.
- 2013‑07‑25:
The unprofitable SaaS business model.
- 2013‑07‑25:
The Mail claims victory in moral crusade.
- 2013‑07‑25:
Macaw: the code-savvy web design tool.
- 2013‑07‑25:
Is overblocking defamatory?
- 2013‑07‑25:
LL and LR parsing demystified.
- 2013‑07‑24:
The evolution of Direct3D.
- 2013‑07‑24:
The vitamin myth.
- 2013‑07‑24:
Lots of ideas for software.
- 2013‑07‑24:
Common misconceptions about computers.
- 2013‑07‑24:
CloudFlare's fourth generation server design.
- 2013‑07‑24:
Crypto flaw makes millions of phone SIMs susceptible to hijacking.
- 2013‑07‑24:
First confirmed patent application rejected due to Ask Patents.
- 2013‑07‑24:
Visual Poi: very swish LED light-writing.
- 2013‑07‑24:
Distributed flight array: autonomous robots self-assemble and take flight as one.
- 2013‑07‑24:
What teachers make.
- 2013‑07‑19:
Our new same-sex marriage is not yet equal marriage.
- 2013‑07‑19:
AppleScript is protestant with a lower-case "p", as iOS and much of OS X is catholic with a lower-case "c".
- 2013‑07‑19:
JavaScript isn't Scheme.
- 2013‑07‑19:
North Sentinel: the forbidden island.
- 2013‑07‑19:
Archives of the Board of Longitude now online.
- 2013‑07‑19:
An arrest in response to the March DDoS attacks on Spamhaus.
- 2013‑07‑18:
Pitch drop experiment drops pitch after 69 years.
- 2013‑07‑18:
Gay marriage: a database engineering perspective.
- 2013‑07‑18:
Your dog can get vaccinated against Lyme disease but you can't.
- 2013‑07‑17:
What is the difference between common and civil law?
- 2013‑07‑17:
If the NSA can't do it over the net, the CIA will pwn your computer in person.
- 2013‑07‑17:
Should we regard young driver deaths as a scandal? RAC proposes graduated drivers licences.
- 2013‑07‑17:
Which proposed new gTLDs suffer the most from squatting and bogus query traffic?
- 2013‑07‑17:
Mission creep: when everything is terrorism.
- 2013‑07‑17:
Update on Computing Service moves.
- 2013‑07‑16:
A mechanical mosquito deterrent.
- 2013‑07‑16:
Is the EU data protection regulation revision dead? If not, should it be?
- 2013‑07‑15:
Who has the most web servers?
- 2013‑07‑15:
USA gave asylum to someone who leaked classified documents.
- 2013‑07‑15:
GitHub finally takes open source licenses seriously.
- 2013‑07‑15:
Dyninst API for runtime code insertion.
- 2013‑07‑15:
Cello: higher level programming in GNU C99.
- 2013‑07‑15:
US CALEA supports the use of strong end-to-end encryption.
- 2013‑07‑15:
Leaked letter shows ISPs and government at war over porn filters.
- 2013‑07‑15:
Water is a better metaphor for the great firewall of China.
- 2013‑07‑15:
Where the hell is the economic and political outrage?
- 2013‑07‑15:
NSA backdoors in old Crypto AG ciphering machines.
- 2013‑07‑15:
When a mathematical hypothesis is neither true nor false.
- 2013‑07‑15:
Engineers and the managers they make.
- 2013‑07‑15:
Where will all the traffic go when you remove an inner-city highway?
- 2013‑07‑15:
Has patent, will sue: an alert to corporate America.
- 2013‑07‑15:
Think your office is soulless? Check out this Amazon warehouse.
- 2013‑07‑14:
HyperRogue III: a roguelike game in non-Euclidean space.
- 2013‑07‑14:
A human-powered helicopter wins the $250,000 Sikorsky prize.
- 2013‑07‑14:
Reduce latency by putting TLS endpoints near users.
- 2013‑07‑14:
dygraphs: JavaScript visualization library.
- 2013‑07‑14:
Travellers' mobile phone data seized by police at UK border.
- 2013‑07‑14:
Why James Chartrand wears women's underpants.
- 2013‑07‑13:
There is no benefit in reducing salt intake and it may even be dangerous.
- 2013‑07‑13:
The USA's incarceration epidemic.
- 2013‑07‑13:
Stig of the Dump: an appreciation on its 50th anniversary.
- 2013‑07‑13:
Mozilla's root CA certificate store continues to grow.
- 2013‑07‑13:
David Cameron told to sack strategy chief over corrupt link to tobacco giants.
- 2013‑07‑13:
The death of David Kelly 10 years on.
- 2013‑07‑13:
Wanting to build first without Javascript is not the same as hating it.
- 2013‑07‑13:
An ingenious paper map with multiple zoom levels.
- 2013‑07‑13:
What most Americans don't know about America.
- 2013‑07‑13:
Changing the Creepy Guy narrative.
- 2013‑07‑13:
The history of CTRL + ALT + DELETE.
- 2013‑07‑13:
Using Phones/SMS for 2FA is unwise.
- 2013‑07‑13:
The Ireland abortion debate, summed up in one disrespectful gesture.
- 2013‑07‑13:
Staying on top of TLS attacks.
- 2013‑07‑13:
Barrett Brown, political prisoner of the information revolution.
- 2013‑07‑13:
Disrupting the pink aisle: an engineering toy that went from Kickstarter to bestseller.
- 2013‑07‑13:
The latest in a series of terrorist attacks in Britain.
- 2013‑07‑13:
A heart surgeon explains what really causes heart disease.
- 2013‑07‑13:
Why is nobody using SSL client certificates?
- 2013‑07‑12:
Data protection enforcement in UK, France and Germany.
- 2013‑07‑12:
Simon Tatham's adages, laws, and rules of thumb.
- 2013‑07‑12:
F-ing modules: an ML-style module system in System Fω.
- 2013‑07‑12:
Fandomized algorithms and fandom number generation.
- 2013‑07‑12:
Stop hiding your imperfect and incomplete ideas.
- 2013‑07‑11:
Desert Bus: the worst video game ever created.
- 2013‑07‑11:
Lightweight contention management for efficient CAS operations.
- 2013‑07‑11:
Calca: a symbolic calculating text editor for engineers.
- 2013‑07‑11:
Snooping on Microsoft wireless keyboards with cheap hardware.
- 2013‑07‑11:
Finding undefined behavior bugs by finding dead code.
- 2013‑07‑10:
The complete Calvin and Hobbes.
- 2013‑07‑10:
I made one change that day. I put Mr in front of my name on my CV.
- 2013‑07‑10:
Jordan Hubbard moves from Apple to iXsystems.
- 2013‑07‑10:
Combien de bises faites-vous dans votre département ?
- 2013‑07‑10:
Robotron and assembly language OOP.
- 2013‑07‑10:
Low latency requires smart queuing.
- 2013‑07‑10:
Senseless spying: the NSA's self-defeating espionage against the EU.
- 2013‑07‑10:
Programming by reasoning or from memory?
- 2013‑07‑10:
Snowden, Morales, and the Bolivian presidential plane: a massive own goal.
- 2013‑07‑10:
NSA scandal delivers record numbers of internet users to DuckDuckGo.
- 2013‑07‑10:
Full steam ahead for Chesterton station.
- 2013‑07‑10:
Why mobile web apps are slow.
- 2013‑07‑10:
Secret government: America against democracy.
- 2013‑07‑09:
Bunnie Huang's open laptop, "Novena".
- 2013‑07‑09:
Twitter's architecture.
- 2013‑07‑08:
Zombie Google Reader's reanimated corpse can browse archived data.
- 2013‑07‑08:
Microsoft announces minimal support for C99 in Visual Studio, fourteen years late.
- 2013‑07‑08:
Technical aspects of lawful interception. ITU technology watch report no.6. (2008)
- 2013‑07‑08:
Ambient backscatter: wireless communication out of thin air.
- 2013‑07‑08:
Mining PGP key servers for guilt-by-association.
- 2013‑07‑07:
"Peak water" for the Middle East.
- 2013‑07‑06:
Apple's security strategy: make it invisible.
- 2013‑07‑05:
Ban qat? The Tories might as well ban cats.
- 2013‑07‑05:
The life of Pi: how Britain's biggest hardware hit for a generation came to be.
- 2013‑07‑05:
Jomsborg and CUSFS reunion at Loncon 2014.
- 2013‑07‑04:
Finding out why guillemots have self-cleaning eggs after accidentally spilling a jug of water.
- 2013‑07‑04:
Révélations sur le Big Brother français.
- 2013‑07‑04:
Tron escapes from an Apple IIgs in real life.
- 2013‑07‑03:
Doug Engelbart obituary in the New York Times.
- 2013‑07‑03:
Berkeley DB changes licence to AGPL.
- 2013‑07‑03:
Homebrewing has only just become legal throughout the USA.
- 2013‑07‑03:
Detecting outliers.
- 2013‑07‑03:
Driving E-ink displays.
- 2013‑07‑03:
Burritos the size of babies, with photographic proof.
- 2013‑07‑03:
Motorola Droid X2 quietly sends your login credentials to Motorola.
- 2013‑07‑03:
Any examples of unwanted but authorized access?
- 2013‑07‑03:
Highly Automated Method for Maintaining Expiring Records (in your DNS cache).
- 2013‑07‑03:
How to build (and how not to build) secure persistent web logins.
- 2013‑07‑03:
Security analysis of children in the home.
- 2013‑07‑03:
In the land of the morally blind, the blind lead the way: the Marrakesh copyright treaty.
- 2013‑07‑03:
BBC blocking articles from UK residents.
- 2013‑07‑02:
Maximize shareholder value: the world's dumbest idea.
- 2013‑07‑02:
List of wars extended by diplomatic irregularity.
- 2013‑07‑02:
18 wars unimaginitively named after their length.
- 2013‑07‑02:
Death of the Internet.
- 2013‑07‑02:
The Helvetica Logo Agency.
- 2013‑07‑01:
The recomputation manifesto.
- 2013‑07‑01:
Ofcom rules Sky News did not breach the broadcasting code by illegally hacking an email account.
- 2013‑07‑01:
"The day I hit a child at 20mph - and realised the speed limit must be cut."
- 2013‑07‑01:
Embedded database microbenchmarks.
- 2013‑07‑01:
US IRS put open source on its "be on look out" list, restricting grants of non-profit status.
- 2013‑07‑01:
Austerity and the mistaken lessonss of history.
- 2013‑07‑01:
What it is like to receive a national security letter.
- 2013‑06‑30:
Alice Kober: Unsung heroine who helped decode Linear B.
- 2013‑06‑30:
Delightful puzzles.
- 2013‑06‑30:
Entrepreneurs get better with age.
- 2013‑06‑30:
Apple does not care about your living room.
- 2013‑06‑30:
undupfs: deduplicating layered filesystem.
- 2013‑06‑30:
A eulogy for AltaVista.
- 2013‑06‑30:
Some typography cheat sheets.
- 2013‑06‑29:
A quick review of Google's QUIC.
- 2013‑06‑29:
Google making the Web faster with new transport protocol that reduces round trips.
- 2013‑06‑29:
The scariest library.
- 2013‑06‑29:
c++filt: demangle C++/Java symbols.
- 2013‑06‑29:
G-Cloud: how to win government IT procurement contracts.
- 2013‑06‑29:
Encryption has foiled wiretaps for first time ever, feds say.
- 2013‑06‑29:
Anatomy of a two-compiler bug.
- 2013‑06‑29:
FBI tracking device teardown.
- 2013‑06‑29:
The Stephen Lawrence 'smear' proves that we cannot trust the state to snoop.
- 2013‑06‑29:
Vi Hart on twelve tone music. (YouTube)
- 2013‑06‑29:
The origin of "tweet".
- 2013‑06‑29:
Clojure core.async CSP channels.
- 2013‑06‑28:
A surprising JavaScript memory leak.
- 2013‑06‑28:
First passenger trains start using the new Hitchin flyover.
- 2013‑06‑28:
The changing shape of cinema: a history of aspect ratio.
- 2013‑06‑28:
sed.js: a JavaScript implementation of Unix sed running on node.js.
- 2013‑06‑28:
Snooper's charter has practically zero chance of becoming law, say senior MPs.
- 2013‑06‑28:
Memories of Stasi color Germans' view of U.S. surveillance programs.
- 2013‑06‑28:
AT&T helped the FBI calculate guilt by association.
- 2013‑06‑28:
How to botch TLS forward secrecy.
- 2013‑06‑28:
Useless box with surprises. (YouTube)
- 2013‑06‑27:
Biblical marriage.
- 2013‑06‑27:
Speeding up "counting objects" with bitmap data in Git.
- 2013‑06‑27:
Using bitmaps to accelerate fetch and clone in JGit.
- 2013‑06‑27:
Scaling up JGit.
- 2013‑06‑26:
Everything Jesus said against gay marriage.
- 2013‑06‑26:
How Texas Republicans will crush the Wendy Davis SB5 abortion filibuster.
- 2013‑06‑26:
American legislators are restricted in how they may defend civil liberties against the secret state.
- 2013‑06‑26:
Can Apple read your iMessages?
- 2013‑06‑26:
Perfect forward secrecy and SSL: Intercepted today, decrypted tomorrow.
- 2013‑06‑26:
Why do computers stop and what can be done about it? (1985)
- 2013‑06‑26:
Wendy Davis Texas senate abortion filibuster ends in chaotic dispute over midnight vote.
- 2013‑06‑26:
Marrakech treaty for the blind signed despite efforts of copyright lobby.
- 2013‑06‑25:
Privatising the courts: if anyone needs advice, it's the judiciary.
- 2013‑06‑25:
Why the IRS is targeting open source software groups.
- 2013‑06‑25:
Anglo-Saxon spies: German national security is at stake.
- 2013‑06‑25:
ECHR requires Serbian intelligence agency to reveal electronic snooping data.
- 2013‑06‑25:
Oh, Canada: America's friendly northern neighbor has become a rogue, reckless petrostate.
- 2013‑06‑25:
Proposed Histon Road traffic improvements.
- 2013‑06‑25:
More entries for the computer contradictionary.
- 2013‑06‑25:
Setting up perfect forward secrecy for nginx or stud.
- 2013‑06‑25:
Typhoid Mary.
- 2013‑06‑25:
NixOps: deploy NixOS machines in a cloud.
- 2013‑06‑25:
America's shameful human rights record.
- 2013‑06‑24:
A patent on ad-funded content was upheld in a US court.
- 2013‑06‑24:
Apple's Lightning connector authentication check 'permanently' cracked.
- 2013‑06‑24:
The other Snowden drama: a desire to prosecute journalists.
- 2013‑06‑24:
rss2imap.
- 2013‑06‑24:
Accuweather 25 day long-rage forecast inaccuracy.
- 2013‑06‑24:
Facebook's shadow profiles include personal data of people without Facebook accounts.
- 2013‑06‑24:
Hidden OS X features, tips and tricks.
- 2013‑06‑24:
AudioSerial: JavaScript code to use headphone socket as send-only serial port.
- 2013‑06‑24:
The physics of traffic jams.
- 2013‑06‑24:
Perfect forward secrecy can block the NSA from retrospectively snooping TLS traffic, but no one uses it.
- 2013‑06‑24:
Why Skype is no longer p2p with e2e crypto.
- 2013‑06‑23:
Frontend development bookmarks.
- 2013‑06‑23:
Apart from The Guardian the British press stays silent about mass surveillance.
- 2013‑06‑23:
Why to build your HTTP APIs around linking.
- 2013‑06‑23:
Building LLVM using Shake.
- 2013‑06‑23:
The infinitely profitable program.
- 2013‑06‑22:
The strange case of Barrett Brown.
- 2013‑06‑22:
The mathematics and statistics of Monopoly.
- 2013‑06‑22:
The HoTT book: Homotopy Type Theory.
- 2013‑06‑22:
Two dozen mathematicians wrote a 600 page book in less than 6 months using GitHub.
- 2013‑06‑22:
GCHQ's Master the Internet project. (2009)
- 2013‑06‑22:
IPMI passwords are easy to crack remotely.
- 2013‑06‑20:
A line of sages have to guess the colours of their hats, or get beheaded.
- 2013‑06‑20:
How not to handle a critical security vulnerability.
- 2013‑06‑20:
Derivatives are weapons of slow economic destruction.
- 2013‑06‑20:
A model for when disclosure helps security: what is different about computer and network security?
- 2013‑06‑20:
An introduction to nginx.
- 2013‑06‑19:
Puppet YAML+Ruby remote code execution vulnerability.
- 2013‑06‑19:
IO-Lite: a unified I/O buffering and caching system.
- 2013‑06‑19:
MegaPipe: a new programming interface for scalable network I/O.
- 2013‑06‑19:
Line comments versus line splicing in programming languages.
- 2013‑06‑19:
People who believe lack of exercise (rather than overeating) causes obesity tend to be fatter.
- 2013‑06‑19:
Pipelined FPGA Mandelbrot generator.
- 2013‑06‑19:
Java garbage collection distilled.
- 2013‑06‑19:
Memory barriers: a hardware view for software hackers.
- 2013‑06‑19:
How FPGAs work, and why you'll buy one.
- 2013‑06‑19:
Discussion about Exchange 2013 recipient verification breakage on the Postfix list.
- 2013‑06‑19:
Recipient filtering broken in Exchange 2013.
- 2013‑06‑19:
Is the rape porn cultural harm argument another rape myth?
- 2013‑06‑18:
LCPP: a Lua C pre-processor.
- 2013‑06‑18:
The Porter stemming algorithm: then and now.
- 2013‑06‑18:
The whistleblower's guide to secretly tipping off the press in a "turnkey totalitarian" state.
- 2013‑06‑18:
Supreme Court of the US mostly abolishes the right to remain silent.
- 2013‑06‑18:
Nominet brings back "direct.uk" proposal for unrestricted second-level .uk domains.
- 2013‑06‑18:
Ultimate tic-tac-toe.
- 2013‑06‑18:
Want to file a motion in the FISA court? First you have to find them.
- 2013‑06‑18:
If those services don't trust me enough to give me an RSS feed, why should I trust them with my data?
- 2013‑06‑17:
An old mystery solved: 1940s project C-43 and public key encryption.
- 2013‑06‑17:
Old age: the diminished thing.
- 2013‑06‑17:
Advanced bash scripting guide.
- 2013‑06‑17:
There are almost no films about women.
- 2013‑06‑17:
Big multiple sclerosis breakthrough.
- 2013‑06‑17:
The real enemy of privacy is the MEPs selling our rights to the direct marketing lobby.
- 2013‑06‑17:
Throwing children in prison turns out to be a really bad idea.
- 2013‑06‑17:
Simple linear-time suffix array construction.
- 2013‑06‑16:
UK intercepted most Irish international comms traffic 1990-1997.
- 2013‑06‑16:
roffit: convert man pages to HTML.
- 2013‑06‑16:
Archive on 4: Very British Dystopias.
- 2013‑06‑16:
On coalitions, courts, and the future after legal aid.
- 2013‑06‑16:
Leading programmers remember the impact of Kernighan and Ritchie: The C Programming Language.
- 2013‑06‑16:
The BBC's factual television is an insult to the nation.
- 2013‑06‑16:
The low-transaction-fee argument for Bitcoin is silly.
- 2013‑06‑15:
Why Boston and Skegness could be UKIP's Brighton Pavillion.
- 2013‑06‑15:
Bank of America lied to homeowners seeking remortgages and rewarded employees for foreclosing.
- 2013‑06‑15:
Secret to Prism success: Even bigger data seizure.
- 2013‑06‑15:
Not just spies: councils want your communications data too.
- 2013‑06‑15:
Melvyn Bragg on William Tyndale: his genius matched that of Shakespeare.
- 2013‑06‑15:
You do have the right to record council meetings.
- 2013‑06‑15:
Landmark US Patent Office ruling strikes abstract software patent.
- 2013‑06‑15:
Apple laptop charging vibration effect: "earth finger". (Informative comments.)
- 2013‑06‑15:
Ancient Roman concrete lasts 40 times longer than modern Portland cement.
- 2013‑06‑15:
The influence of spies has become too much. It's time politicians said no.
- 2013‑06‑15:
"Hardware eventually fails. Software eventually works."
- 2013‑06‑15:
On the legal importance of viewing genes as code.
- 2013‑06‑14:
Lawsuit claims "Happy Birthday" is not in copyright, and Warner owes hundreds of millions in improperly collected royalties.
- 2013‑06‑14:
Secret Courts: 8 nightmare scenarios now possible in Britain.
- 2013‑06‑14:
Spamalot reigns: data protection and Ireland's EU presidency.
- 2013‑06‑14:
Insubordination and the surveillance state.
- 2013‑06‑13:
Planning a computer system: Project Stretch. (1962)
- 2013‑06‑13:
Main Core: US government database of 8 million Americans who are supposedly threats to national security.
- 2013‑06‑13:
NSA has massive database of American phone calls. (2006)
- 2013‑06‑13:
Hopscotch hashing.
- 2013‑06‑13:
Two years of Cambridge Noir.
- 2013‑06‑12:
HHVM and the repurposed JIT phenomenon.
- 2013‑06‑12:
Thomas Drake on being an NSA whistleblower.
- 2013‑06‑12:
gitdown: moderate commit activity based on blood alcohol content.
- 2013‑06‑12:
America's price-gouging cable companies are latter-day robber barons.
- 2013‑06‑12:
Bike helmets and the law: Canadian legislation had minimal effect on serious head injuries.
- 2013‑06‑12:
McBits: fast constant-time code-based cryptography.
- 2013‑06‑12:
Attackers using chargen for UDP reflection/amplification attacks.
- 2013‑06‑12:
IBM jargon and general computing dictionary.
- 2013‑06‑12:
Banks rig foreign exchange benchmark rates.
- 2013‑06‑12:
PRISM explains the wider lobbying issues surrounding EU data protection reform.
- 2013‑06‑12:
Disagree with an Atos decision? Then starve, says DWP.
- 2013‑06‑12:
Politics and Iain Banks.
- 2013‑06‑11:
Public WiFi is mostly crappy and user-hostile.
- 2013‑06‑11:
The PRISM details matter: if it works like the UK communications data bill, it is apparently no big deal.
- 2013‑06‑11:
Opera desktop mail client.
- 2013‑06‑11:
Family courts risk 'collapse' as surge in custody cases follows legal aid cuts.
- 2013‑06‑11:
The value of a hacked email account.
- 2013‑06‑11:
The Case for compressed caching in virtual memory systems.
- 2013‑06‑11:
Has the US become the type of nation from which you have to seek asylum?
- 2013‑06‑11:
Expect more intrusive surveillance now that PRISM is public.
- 2013‑06‑11:
Why didn't tech company leaders blow the whistle?
- 2013‑06‑10:
libottery: drop-in fast secure replacement for your RNG.
- 2013‑06‑10:
The end is nigh for OpenVMS.
- 2013‑06‑10:
Snowden/Greenwald contact delayed by weeks owing to difficulty of using PGP.
- 2013‑06‑10:
Ken MacLeod on Iain Banks: A science fiction star first and foremost.
- 2013‑06‑10:
Counter-cryptanalysis exploits unavoidable anomalies to detect and block cryptanalytic attacks.
- 2013‑06‑10:
Daniel Ellsberg says Edward Snowden is saving us from the United Stasi of America.
- 2013‑06‑10:
PRISM: The real concern is that governments may not be breaking any law at all.
- 2013‑06‑10:
As Bradley Manning's trial begins, the press predictably misses the point.
- 2013‑06‑10:
These are the mobile phones and tablet computers that will give you the fastest Internet speeds.
- 2013‑06‑10:
Viviane Reding dismantles UK's arguments against effective data protection.
- 2013‑06‑10:
The omniscient states: seven decades of shared intelligence.
- 2013‑06‑10:
University admission happens far to late to fix school inequality.
- 2013‑06‑10:
Safety triangle / misogyny triangle.
- 2013‑06‑10:
A few notes on the Culture.
- 2013‑06‑10:
There is more to anticompetitive patent licensing than trolls.
- 2013‑06‑10:
Some links about Iain Banks.
- 2013‑06‑10:
Council of the EU releases compromise draft the proposed data protection regulations.
- 2013‑06‑10:
LobbyPlag: which MEPs support less data privacy and more spam.
- 2013‑06‑09:
How the US turned three pacifists into violent terrorists.
- 2013‑06‑09:
Security against compelled disclosure.
- 2013‑06‑09:
Greene King accused of cultural vandalism after scrapping more than 200 traditional pub signs.
- 2013‑06‑09:
Boundless Informant: the NSA's secret tool to track global surveillance data.
- 2013‑06‑09:
The sealed bottle garden still thriving after 40 years without fresh air or water.
- 2013‑06‑09:
Shortcat: keyboard productivity app for Mac OS X.
- 2013‑06‑09:
Seeing ultraviolet after cataract surgery with Crystalens.
- 2013‑06‑08:
The ABC trial: a 1970s prosecution for revealing UK spying activity.
- 2013‑06‑08:
UK government censors PRISM news with a D-notice.
- 2013‑06‑08:
Public documents contradict government claim that mass surveillance foiled terror plot.
- 2013‑06‑08:
A lesson from history for those who strive to bring intelligence agencies to account.
- 2013‑06‑07:
All the infrastructure a tyrant would need.
- 2013‑06‑07:
Anonymous just leaked a trove of NSA documents. (See also UKUSA / Five Eyes.)
- 2013‑06‑07:
On whistleblowers and government threats of investigation.
- 2013‑06‑07:
Was the Communications Data Bill just a cover for Prism Data?
- 2013‑06‑07:
Melton: A static memory leak detector for C programs.
- 2013‑06‑07:
Lawfully Good vs Lawfully Evil.
- 2013‑06‑07:
Anyone (with a PhD in physics) can design a nuclear bomb.
- 2013‑06‑07:
Kismet: WiFi sniffing software.
- 2013‑06‑07:
inSSIDer: WiFi monitoring software.
- 2013‑06‑07:
Senators knew the NSA's universal snooping has been going on since 2007.
- 2013‑06‑07:
Value of the cloud: CPU performance.
- 2013‑06‑07:
Metadata matters: spying on comms records harms civil liberties and the free press.
- 2013‑06‑07:
US NSA is mining data from 9 leading Internet firms.
- 2013‑06‑07:
EU council of ministers proposes to gut data protection regulations, to please direct marketing lobby.
- 2013‑06‑06:
Universal Credit: government closer to recognising failure of world's largest agile development project.
- 2013‑06‑06:
Top US patent judge pens anti-troll op-ed in the New York Times.
- 2013‑06‑06:
Best practices for designing a pragmatic RESTful API.
- 2013‑06‑06:
CamelCase is less readable than under_score.
- 2013‑06‑06:
CamelCase is more readable than under_score.
- 2013‑06‑06:
The NSA is spying on millions of Americans.
- 2013‑06‑06:
Bureaucratic needs assessments and the debate over IP address conservation.
- 2013‑06‑06:
Calling for an end to the war on drugs.
- 2013‑06‑06:
What would British politics look like with small parties and proportional representation?
- 2013‑06‑06:
Affordable quality: comparing childcare in the UK and Europe.
- 2013‑06‑06:
Amazon S3 failure in July 2008 due to single bit corruption. Checksum all the things!
- 2013‑06‑06:
Game theory of IPv6.
- 2013‑06‑05:
Pink/Blue.
- 2013‑06‑05:
Microsoft asks for feedback on the standards conformance of Outlook and Exchange.
- 2013‑06‑05:
Guile and delimited continuations.
- 2013‑06‑05:
Japan's radiation disaster toll: none dead, none sick.
- 2013‑06‑05:
The bright side of dark silicon.
- 2013‑06‑05:
Tetris printer algorithm.
- 2013‑06‑05:
The network is reliable?
- 2013‑06‑04:
Cameron eyes 'non legislative options' to extend domestic spying powers.
- 2013‑06‑04:
Prosecute the patent trolls!
- 2013‑06‑04:
A "child pornographer", according to the police.
- 2013‑06‑04:
The risks of Microsoft Exchange features that use Oracle Outside In.
- 2013‑06‑04:
45 ways to communicate two quantities.
- 2013‑06‑04:
Brompton stunts. (YouTube)
- 2013‑06‑04:
Huge registrar shake-up coming to .biz and .info.
- 2013‑06‑04:
A look at the Crossrail tunnels under Oxford Street.
- 2013‑06‑04:
Elsevier-style bulk licences the answer to taming patent trolls?!
- 2013‑06‑04:
Call-by-push-value: a model for the lambda calculus that subsumes call-by-name and call-by-value.
- 2013‑06‑03:
On "geek" versus "nerd".
- 2013‑06‑03:
First intercontinental 100 Gbps link for research and education.
- 2013‑06‑03:
Reinventing the wheel: Loopwheels: bike wheels with built-in suspension.
- 2013‑06‑03:
Reinventing the train: Ideas coming down the track.
- 2013‑06‑03:
How curly braces got included in ASCII.
- 2013‑06‑03:
Think the Greens are the party of the middle-class? Think again.
- 2013‑06‑03:
Possible ban on factory food in French restaurants.
- 2013‑06‑03:
O, BIND, BIND, wherefore art thou BIND? Results of fingerprinting all Internet DNS servers.
- 2013‑06‑03:
What can't you do with a criminal conviction?
- 2013‑06‑03:
LangSec: safely dealing with magical text.
- 2013‑06‑03:
A unified theory of garbage collection.
- 2013‑06‑03:
Removing garbage collection from the Rust language.
- 2013‑06‑03:
Civil legal aid reforms in the UK: what will this mean for you?
- 2013‑06‑03:
The reaction to Eric Weinstein's lecture at Oxford on the geometric prospects for unification.
- 2013‑06‑03:
Istanbul's demonstrators celebrate victory in Istiklal and Taksim Square.
- 2013‑06‑03:
Sustainable fishing success story, but why do we have to trawl for the facts about Britain and the EU?
- 2013‑06‑03:
Max Headroom and the strange world of pseudo-CGI.
- 2013‑06‑03:
Hexagonal grids.
- 2013‑06‑03:
Apple, betrayed by its own patent law firm.
- 2013‑06‑02:
Five ugly lessons hiding in every superhero movie.
- 2013‑06‑02:
More background on the violence in Isranbul.
- 2013‑06‑02:
Teardown and exploration of Apple's Magsafe connector.
- 2013‑06‑02:
Researcher decodes prairie dog language and discovers they've been talking about us. (video)
- 2013‑06‑02:
Michael Douglas says cunnilingus gives you cancer - but is he right?
- 2013‑06‑02:
What mobile internet filtering tells us about porn blocks.
- 2013‑06‑02:
What is happenning in Istanbul.
- 2013‑06‑02:
Examining the IWF's claim that 1.5 million adults have stumbled across child porn online.
- 2013‑06‑02:
The real Cuban missile crisis.
- 2013‑06‑02:
Vinegar could save 73,000 women a year from cancer.
- 2013‑06‑02:
H.264 patent pools kill web video competitors.
- 2013‑06‑02:
The algebra of algebraic data types.
- 2013‑06‑02:
Funny computer books?
- 2013‑06‑01:
Clay programming language.
- 2013‑06‑01:
Google/Motorola prototype authentication tokens: pill passwords and electronic tattoos.
- 2013‑06‑01:
Haskell apply ($) vs F#'s pipe forward operator (|>).
- 2013‑05‑31:
The new nutritional consensus: key opinion leaders.
- 2013‑05‑31:
Joe Armstrong spends a week with Elixir: a Ruby-ish language for the Erlang virtual machine.
- 2013‑05‑31:
Facebook bans campaigner against images of violence against women.
- 2013‑05‑31:
Former head of ACPO weighs in against snoopers' charter.
- 2013‑05‑31:
Short cuts: the consequences of restricting access to the law.
- 2013‑05‑31:
First-ever high-resolution images of a molecule as it breaks and reforms chemical bonds.
- 2013‑05‑31:
Why DIY fecal transplants are a thing (and the FDA is only part of the reason).
- 2013‑05‑31:
The NRA's end: a real gun control movement has arrived.
- 2013‑05‑30:
Proof of existence: embed the SHA256 of a document in the Bitcoin block chain.
- 2013‑05‑30:
Watchman: faster builds of large source trees by tracking file alterations.
- 2013‑05‑30:
Google, Microsoft, Facebook, Yahoo! and Twitter weigh in against snooper's charter.
- 2013‑05‑30:
Falsehoods programmers believe about addresses.
- 2013‑05‑30:
Industrial influences on the evolution of landscape in North Wales.
- 2013‑05‑30:
Origins of generational garbage collection.
- 2013‑05‑30:
Weston display/window manager on Raspberry Pi.
- 2013‑05‑30:
Moore's Law fail at NAND flash node 1Ynm.
- 2013‑05‑29:
Snoopers' charter is a domestic policy problem, but a foreign policy disaster.
- 2013‑05‑29:
Long live the local pub in Cambridge.
- 2013‑05‑29:
A lock-free ... linear search?
- 2013‑05‑29:
Videos of Blackhole malware-in-the-browser attack.
- 2013‑05‑29:
A brief overview of Chapel: a parallel language from Cray.
- 2013‑05‑29:
Unlicensed code: movement or madness?
- 2013‑05‑29:
'Snooper's charter' would not have prevented Woolwich attack, says MI5.
- 2013‑05‑29:
Peer-review practices of psychological journals: The fate of published articles, submitted again.
- 2013‑05‑28:
Array languages for Lisp programmers.
- 2013‑05‑28:
DNS anomaly detection: Defend against sophisticated malware.
- 2013‑05‑28:
Is sugar toxic?
- 2013‑05‑28:
PlexConnect: DNS hijacking to make Apple TV view media from a Plex server.
- 2013‑05‑28:
Snoopers' charter: how you can stop it coming back ... again.
- 2013‑05‑28:
Elsevier journals: has anything changed?
- 2013‑05‑28:
parboiled2: compile-time PEG parser generator in Scala macros.
- 2013‑05‑28:
Easy MS IE VMs under Linux.
- 2013‑05‑28:
Courts may be privatised to siphon public money to hedge fund managers.
- 2013‑05‑28:
The zombie communications data snooping bill is back.
- 2013‑05‑28:
Twin beam phase conjugation for 400Gbit/s transoceanic fibre.
- 2013‑05‑28:
Agatha Christie and computerised foulups.
- 2013‑05‑28:
HTTPS and Referer: headers.
- 2013‑05‑28:
How far can you overhang blocks?
- 2013‑05‑28:
Better estimation when perfection is unlikely: a Bayesian example.
- 2013‑05‑28:
Raspberry Pi eye in the sky.
- 2013‑05‑28:
You are dangerously bad at cryptography.
- 2013‑05‑27:
The ZigZag database and visualization system.
- 2013‑05‑27:
Autodependencies with GNU make.
- 2013‑05‑27:
Rules with multiple outputs in GNU make.
- 2013‑05‑27:
How NOT to review a paper: the tools and techniques of the adversarial reviewer.
- 2013‑05‑27:
How to reject any scientific manuscript.
- 2013‑05‑27:
International Space Station upgrades from Windows XP to Linux.
- 2013‑05‑27:
Less than 1% of European terrorist attacks are by Muslims.
- 2013‑05‑27:
Mythbusting modern hardware to gain "mechanical sympathy".
- 2013‑05‑27:
DNS traffic logging, summarizing, and presentation with Logstash, ElasticSearch, and Kibana.
- 2013‑05‑27:
Three implementation models for Scheme.
- 2013‑05‑27:
Three types of build-system dependency.
- 2013‑05‑27:
42 symmetries.
- 2013‑05‑27:
High levels of home ownership can seriously damage the labor market.
- 2013‑05‑26:
X.org security advisory: protocol handling issues in X client libraries.
- 2013‑05‑25:
Yitang Zhang, twin primes conjecture: A huge discovery about prime numbers - and what it means for the future of math.
- 2013‑05‑24:
History of zero.
- 2013‑05‑24:
Improving the security of your SSH private key files.
- 2013‑05‑24:
Log-shuttle delivers messages to log routers and processors via https.
- 2013‑05‑24:
Eric Weinstein may have found the answer to the biggest problems of physics.
- 2013‑05‑24:
SIGGRAPH 2013 technical papers preview. (YouTube)
- 2013‑05‑23:
Kim Dotcom is now a two-factor-authentication patent troll.
- 2013‑05‑23:
MinimaLT: minimal-latency networking through better security.
- 2013‑05‑22:
Stop using linked lists.
- 2013‑05‑22:
Myth: DRAM costs and buying in bulk.
- 2013‑05‑22:
Dowser: a guided fuzzer to find buffer overflow vulnerabilities.
- 2013‑05‑22:
Average home sizes around the world.
- 2013‑05‑22:
The oldest algorithmic patent?
- 2013‑05‑22:
Plan 9 coding style.
- 2013‑05‑22:
UK supported 1622 CIA kidnap flights.
- 2013‑05‑21:
Bertrand Russell: "Why I am not a Christian."
- 2013‑05‑21:
The day that hell was abolished in Britain.
- 2013‑05‑21:
Scripps News reporters use Google, find breach, get branded as "hackers", like Weev.
- 2013‑05‑21:
James Burke's classic rocket takeoff piece-to-camera. (YouTube)
- 2013‑05‑21:
Google abandons open instant messaging. (But some xmpp support still lurks.)
- 2013‑05‑21:
LuaJIT 2.1 status and sponsorships.
- 2013‑05‑21:
Twitter granted patent on pull-to-refresh, promises to only use it defensively.
- 2013‑05‑21:
Next steps for the Firefox cookie policy.
- 2013‑05‑21:
How tcmalloc works.
- 2013‑05‑21:
Obituary of George Gray, liquid crystal scientist.
- 2013‑05‑21:
Implicit type conversion in MySQL and SQL injection attacks.
- 2013‑05‑21:
Windcatcher airbed inflates in seconds without power or pumping.
- 2013‑05‑21:
Cyclists hate road narrowing schemes, but have our cycling campaigns been asking for them all along?
- 2013‑05‑21:
Virtually everything the US government did to WikiLeaks is now being done to mainstream reporters.
- 2013‑05‑21:
But that's impossible! Clients fetching v6-only URLs over v4.
- 2013‑05‑21:
Network congestion, TCP's initial window, and web browsing.
- 2013‑05‑20:
Shor's quantum factorisation algorithm.
- 2013‑05‑20:
US DOJ criminalizes investigative journalism.
- 2013‑05‑20:
On average, we have built one large dam every day for the last 130 years.
- 2013‑05‑20:
Harwell Dekatron / Atomic Energy Research Establishment WITCH is oldest working computer.
- 2013‑05‑20:
Sonar-scanning usine a Macbook: synethetic aperture sonar using consumer electronics.
- 2013‑05‑20:
Labour are to blame for UKIP.
- 2013‑05‑20:
Conversations with a bulletproof hoster: did someone other than Kamphuis run the Spamhaus DDoS?
- 2013‑05‑20:
Stability patterns and antipatterns.
- 2013‑05‑20:
Sven Olaf Kamphuis, accused of the Spamhaus DDoS attack.
- 2013‑05‑20:
Attack by compiler: undefined behaviour and underhanded optimisation.
- 2013‑05‑20:
Your login form posts to HTTPS, but you blew it when you loaded it over HTTP.
- 2013‑05‑20:
"A manifestly unjustified, inappropriate or improper use of a formal procedure." Vexatious FOI requests.
- 2013‑05‑20:
Cambridge Airport unveils 50 new flights a week to Amsterdam, Paris, Milan and Geneva. (Hope they don't win a Darwin prize!)
- 2013‑05‑20:
CSS Tube map.
- 2013‑05‑20:
The trouble with the Enlightenment.
- 2013‑05‑20:
Becoming an American can be bad for your health.
- 2013‑05‑20:
Parallel and concurrent programming in Haskell. (draft book)
- 2013‑05‑20:
Plug-in covers reduce the safety of UK BS1363 mains sockets.
- 2013‑05‑20:
Statistical formulae for programmers.
- 2013‑05‑20:
SCADA vulnerabilities: how to hack a nation's infrastructure.
- 2013‑05‑20:
Docker: copy-on-write Linux containers.
- 2013‑05‑18:
Noether: a concurrent security-oriented language.
- 2013‑05‑18:
Contactless tills take money from the wrong cards at several UK retailers.
- 2013‑05‑18:
Elsevier, NewsCorp, Facebook, and Yahoo join ignorant attack on open access.
- 2013‑05‑18:
Opening the lid on StrongBox, the anonymous leak system coded by Aaron Swartz.
- 2013‑05‑18:
Rainbow Europe: UK is the most LGBTI friendly country.
- 2013‑05‑18:
D-Wave quantum computing devices: truth finally starts to emerge.
- 2013‑05‑18:
Bunny is a wireless meshing darknet that hides its comms in parts of 802.11.
- 2013‑05‑17:
Modern programming language syntax is not like C.
- 2013‑05‑17:
Vaughan Pratt's paper on top-down operator precedence parsers.
- 2013‑05‑17:
Nationwide survey reveals picture of UK's attitudes to science and medicine (and vaccines).
- 2013‑05‑17:
Explanation of yesterday's mozilla.org DNSSEC validation failures.
- 2013‑05‑17:
Newegg nukes "corporate troll" Alcatel in third patent appeal win this year.
- 2013‑05‑17:
1966 plan for segregated cycle routes in Cambridge.
- 2013‑05‑16:
BBC boosts UKIP: their 23% national projected vote debunked down to 10%.
- 2013‑05‑16:
The great google goat rodeo.
- 2013‑05‑16:
A collection of links about secure random number generation.
- 2013‑05‑16:
Extensible scannerless statically typed Pratt parser in C#.
- 2013‑05‑16:
Parallelism and concurrency need different tools.
- 2013‑05‑16:
Rachel on pregnancy and consent.
- 2013‑05‑16:
The New Yorker Strongbox and Aaron Swartz.
- 2013‑05‑15:
Simple top-down operator precedence Pratt parsing in Python.
- 2013‑05‑15:
Vetinari Clock: a clock that ticks randomly but still keeps accurate time.
- 2013‑05‑15:
MapBox: A cloudless atlas.
- 2013‑05‑15:
Euphemisms inspired by political scandals.
- 2013‑05‑15:
Rusty Russell's API design rating scheme.
- 2013‑05‑15:
2m40: un blog impactant.
- 2013‑05‑14:
Linux Containers on AWS.
- 2013‑05‑14:
The Hawkeye Initiative IRL.
- 2013‑05‑14:
At 10 million concurrent connections, the kernel is the problem, not the solution.
- 2013‑05‑14:
CAP Confusion: problems with 'partition tolerance'.
- 2013‑05‑14:
Approximate heavy hitters: the SpaceSaving algorithm.
- 2013‑05‑14:
JavaScript is already the elusive universal web bytecode.
- 2013‑05‑14:
What made Chris Hadfield's time on the ISS special.
- 2013‑05‑14:
ITU pursues Internet control - again - at WPTF13 this week.
- 2013‑05‑14:
Terms of service; didn't read. Aiming to fix the biggest lie on the web.
- 2013‑05‑14:
URLs in private Skype chats are accessed by Microsoft.
- 2013‑05‑14:
Dropping in on the Gottfried Leibniz archives.
- 2013‑05‑14:
Bees need Europe's neonicotinoid pesticide ban.
- 2013‑05‑14:
UK government study agrees with previous research: top downloaders spend the most on legit media.
- 2013‑05‑14:
Terra and Lua offer new high performance computing strategy.
- 2013‑05‑14:
Cellular encryption and interception.
- 2013‑05‑14:
Pregnancy, farting, and abortion law.
- 2013‑05‑14:
Crossrail 2 consultation and route options.
- 2013‑05‑14:
D-Wave's quantum optimizer pitted against traditional computers.
- 2013‑05‑14:
$45M in stolen cash still won't get rid of hackable ATM cards.
- 2013‑05‑14:
The sound of silence: the texture of background noise in quiet cities.
- 2013‑05‑14:
InterMune lies about clinical trial results and sues to preven European Medicines Agency from publishing data.
- 2013‑05‑14:
Do people turn mean because they're helpless?
- 2013‑05‑14:
Half of Labour supporters believe the welfare state is too generous.
- 2013‑05‑14:
A proof of the odd Goldbach conjecture that every odd number greater than five is the sum of three primes.
- 2013‑05‑14:
Getting closer to a proof that infinitely many primes come in pairs.
- 2013‑05‑14:
Triangular variable radix unary 12h clock face.
- 2013‑05‑14:
Met raid home of family who successfully sued police for racial abuse.
- 2013‑05‑14:
So long, Commander Hadfield - and thanks for all the awesome!
- 2013‑05‑13:
Ipsos MORI response to the EE personal data story.
- 2013‑05‑13:
Texting at wheel kills more US teens than drunk-driving.
- 2013‑05‑13:
Daniel Morgan axe murder, criminal private investigators, Murdoch papers, and senior Tories.
- 2013‑05‑13:
How Mythic Beasts dealt with the Raspberry Pi DDoS attacks.
- 2013‑05‑13:
The differing treatment of men and women on Reddit.
- 2013‑05‑13:
Ethical consequences of a Saudi Arabia telecoms surveillance pitch.
- 2013‑05‑13:
Executable archaeology: the stupid thing that eats RAM when shaken.
- 2013‑05‑13:
Fulton surface-to-air recovery system. (Featuring a flying pig.)
- 2013‑05‑13:
GM crops do not have better yields nor a much lower environmental footprint.
- 2013‑05‑13:
Neonicotinoids do not improve yields.
- 2013‑05‑13:
EE selling personal data to pollsters and police.
- 2013‑05‑13:
The devil in plain text.
- 2013‑05‑13:
Unfairness of FPTP leads to parties ignoring 59% of voters in Oxfordshire.
- 2013‑05‑13:
How certificate revocation (doesn't) work in practice.
- 2013‑05‑13:
ActiveHistory replies to Gove's accusation of 'infantilisation'.
- 2013‑05‑13:
Everything Everywhere, IpsosMori and the mystery of 27m people's data.
- 2013‑05‑13:
Kaspersky on patents against innovation.
- 2013‑05‑13:
Michael Gove bases education policy on bogus marketing surveys.
- 2013‑05‑13:
All about the new EU anti-diversity seed law.
- 2013‑05‑13:
CSS architecture.
- 2013‑05‑13:
Python's sad, unimaginative Enum.
- 2013‑05‑13:
WAN vs. datacenter link reliability.
- 2013‑05‑12:
DNS needs TCP.
- 2013‑05‑11:
Nobody reads the terms of service - not even those who write them.
- 2013‑05‑11:
Thieves stole $45 million from ATMs because the US uses absurd 40-year-old tech.
- 2013‑05‑11:
Communications interception bill in New Zealand.
- 2013‑05‑11:
"I contribute to the Windows kernel. We are slower than other operating systems. Here is why."
- 2013‑05‑11:
pdf2htmlEX: high-quality PDF to modern HTML converter.
- 2013‑05‑11:
Why is science behind a paywall?
- 2013‑05‑11:
Faster curve25519 with precomputation.
- 2013‑05‑11:
How to intercept and decrypt Snapchat images.
- 2013‑05‑11:
Wine tasting is bullshit.
- 2013‑05‑10:
The Daniel Morgan murder: an unsolved mystery of the Murdoch hacking scandal.
- 2013‑05‑10:
Daniel Morgan axe murder: independent panel to investigate police failings.
- 2013‑05‑10:
The justifications for airport expansion turn out to be bogus.
- 2013‑05‑10:
The human-powered helicopter challenge.
- 2013‑05‑10:
Average distance between tweeter and responder is about 750 miles.
- 2013‑05‑10:
The paradox of the ABC proof.
- 2013‑05‑10:
No boundary changes and no AV improve Labour's chances in 2015.
- 2013‑05‑10:
Apple platonic solids.
- 2013‑05‑10:
A FAQ about Brewer's CAP theorem.
- 2013‑05‑10:
Millenials aren't lazy: they're fucked.
- 2013‑05‑10:
The secret world of submarine cables.
- 2013‑05‑09:
Towards adoption of DNSSEC: availability and security challenges.
- 2013‑05‑09:
GeoGuessr: a Google Street View game.
- 2013‑05‑09:
Dodgy food practices banned in Europe but just fine in the USA.
- 2013‑05‑08:
Spamhaus DDoS suspect extradited to the Netherlands.
- 2013‑05‑08:
Taiwanese / Mandarin: how to forget your mother tongue and remember your national language.
- 2013‑05‑08:
Critique of the IO monad being viewed as a state monad operating on the world.
- 2013‑05‑08:
Why the UK government tried ID cards: because biometrics supposedly made identity theft 'impossible'.
- 2013‑05‑08:
SSH authentication forwarding with Mosh.
- 2013‑05‑08:
JDNS: a portable asynchronous stub resolver with mDNS support.
- 2013‑05‑08:
Why haven't the Greens become popular since the financial crash, rather than UKIP?
- 2013‑05‑08:
Feds drop hacking charges in video poker glitching case.
- 2013‑05‑08:
Obama may back FBI plan to wiretap web users.
- 2013‑05‑07:
The wrongly attributed statement: our democratic poetry.
- 2013‑05‑07:
A short introduction to TPMs.
- 2013‑05‑07:
Florence Nightingale's hockey stick: the real message of her rose diagram.
- 2013‑05‑07:
North American English dialects, based on pronunciation patterns.
- 2013‑05‑07:
Protected bicycle lanes boost local business in NYC.
- 2013‑05‑07:
Elon Musk talking to Google about autopilot systems for Tesla cars.
- 2013‑05‑07:
Megaupload, the copyright lobby, and the future of digital rights.
- 2013‑05‑07:
Bob Alberti: gopher was doomed by Moore's law, but what killed it was licensing.
- 2013‑05‑07:
BT retail is testing carrier-grade NAT under their own brand as well as PlusNet.
- 2013‑05‑07:
The definitive history of the colors of Crayola.
- 2013‑05‑07:
WWW: Why the Web Worked and why Gopher didn't go far.
- 2013‑05‑07:
Aquatic apes are the stuff of creationism, not evolution.
- 2013‑05‑07:
git? tig! A text-mode UI for git.
- 2013‑05‑07:
Firefox's inspector as a 3D modelling tool.
- 2013‑05‑07:
KSRegistry takes over .gd but questions remain about two other hijacked ccTLDs.
- 2013‑05‑07:
Population distribution of the US in units of Canadas.
- 2013‑05‑07:
Hacking the JVM by inducing memory glitches with an incandescent lamp.
- 2013‑05‑07:
2013 European LLVM conference slides / videos / papers.
- 2013‑05‑07:
Hacking into a Google building management system.
- 2013‑05‑07:
How to spot a weak argument.
- 2013‑05‑07:
Measuring DNSSEC performance.
- 2013‑05‑07:
Digging out the craziest bug you never heard about from 2008: a Linux threading regression.
- 2013‑05‑07:
Transferring domains from GoDaddy to Hover.
- 2013‑05‑07:
How much would it cost to store every phone call in the USA?
- 2013‑05‑07:
HTML canvas performance tips and tricks.
- 2013‑05‑06:
Implementation strategies for first-class continuations.
- 2013‑05‑06:
A great way of explaining delimited continuations.
- 2013‑05‑06:
More than half the world's population lives inside this circle.
- 2013‑05‑06:
Health and safety gone mad: government axes strict liability for workplace injuries.
- 2013‑05‑06:
Argonauts of the incredibly specific: anthropological field notes on the Liberal Democrat animal.
- 2013‑05‑06:
Unconditional income reduces poverty and corruption in India.
- 2013‑05‑06:
Honeywords: making password-cracking detectable.
- 2013‑05‑06:
A cultural shift in computing started with EDSAC.
- 2013‑05‑05:
Pictures of a NeXT cube.
- 2013‑05‑05:
Big-O algorithm complexity cheat sheet.
- 2013‑05‑04:
A determined 'hacker' decrypts RDS-TMC FM traffic broadcasts.
- 2013‑05‑04:
All telephone calls are recorded for access by the US government.
- 2013‑05‑04:
Predicting Google service shutdowns.
- 2013‑05‑04:
Golang and Rust: objects without class.
- 2013‑05‑04:
Video codecs in Javascript are the future.
- 2013‑05‑03:
Beating bufferbloat with fq_codel.
- 2013‑05‑03:
Active queue management algorithms for DOCSIS 3: a simulation study of CoDel, SFQ-CoDel and PIE.
- 2013‑05‑02:
MLWorks: a Standard ML compiler and development environment written at Harlequin in the 1990s, now open source.
- 2013‑05‑02:
SQLite as a standard layered image file format.
- 2013‑05‑02:
On sapphire screens, PV cells, and advanced material manufacturing efficiency.
- 2013‑05‑02:
The Internet archive: what 10 petabytes of data looks like. (video)
- 2013‑05‑02:
Acorn 4: a Mac OS X image editor.
- 2013‑05‑02:
Practical HTTP Host header attacks.
- 2013‑05‑01:
How to play Tetris forever.
- 2013‑05‑01:
Algorithms are replacing stock analysts and investors.
- 2013‑05‑01:
Eric Brewer on why banks are BASE not ACID.
- 2013‑05‑01:
Hoptroff is putting a chip-scale atomic clock into a pocket watch.
- 2013‑05‑01:
The communications data bill was a zombie bill that has been killed before. When will it be back?
- 2013‑05‑01:
Cambridge station ticket hall to be expanded.
- 2013‑05‑01:
World's most cycle-friendly cities.
- 2013‑05‑01:
How the hell is this photo of the Moon even possible?
- 2013‑05‑01:
Using a software bug to win at video poker leads to a federal computer hacking prosecution.
- 2013‑05‑01:
Blip: a tool for seeing your Internet latency.
- 2013‑05‑01:
"I don't know why people aren't freaking out about the fact that we're nearly at a post-antibiotic era."
- 2013‑05‑01:
Effective use of spare capacity at London airports could be better alternative to more runways.
- 2013‑05‑01:
Cambridge bids for money to build "Chisholm Trail" on-road segregated cycle lanes.
- 2013‑04‑30:
Reasoning about the heap in Rust, with Hoare logic and separation logic.
- 2013‑04‑30:
Why those who assault cyclists are usually not prosecuted.
- 2013‑04‑30:
Creative abuse of TLS servers as notaries.
- 2013‑04‑30:
On the lack of pure functions in the Rust programming language type system.
- 2013‑04‑30:
Mozilla to sue Gamma Group for trademark violation: making FinFisher look like Firefox.
- 2013‑04‑30:
An intro to the Mozilla Rust programming language.
- 2013‑04‑30:
Drones: when the future sneaks up on you.
- 2013‑04‑30:
The Hovenring: a new level of bike infrastructure.
- 2013‑04‑30:
Court ruling stops European Medicines Agency from releasing clinical study reports.
- 2013‑04‑30:
Eight things I like about universal benefits.
- 2013‑04‑30:
MiniPiOut: tiny breakout accessory for Raspberry Pi.
- 2013‑04‑30:
C=64 <-> PC data transfer the hard way.
- 2013‑04‑30:
Dutch roundabouts could be seen in London next year.
- 2013‑04‑30:
What happened to the crypto dream? Its failure to protect personal privacy.
- 2013‑04‑30:
First judicial determination of the meaning of RAND patent licences in the USA.
- 2013‑04‑29:
Beware the rise of the government scientists turned lobbyists.
- 2013‑04‑29:
Dead trees have been replaced by a paywall.
- 2013‑04‑29:
DNSSEC / EDNS0 fallback interop problem between BIND and PowerDNS.
- 2013‑04‑29:
The company that's buying up all the key pieces of the online news ecosystem.
- 2013‑04‑29:
In the future our police, lawyers and jails will be run by G4S.
- 2013‑04‑29:
Ironically named British Beer and Pub Ass'n fails to get judicial review of Cambridge's pub protection policy.
- 2013‑04‑29:
Hundreds of cycles in the Kite; no parking spaces.
- 2013‑04‑29:
Bee-harming pesticides banned in Europe.
- 2013‑04‑29:
EU pesticide restrictions are a victory for bees.
- 2013‑04‑29:
The disapproval matrix.
- 2013‑04‑29:
A cucumber map of Europe.
- 2013‑04‑29:
Joining an open WiFi network creates a long-term security risk to your device.
- 2013‑04‑29:
Who can stop these marauding wild pigs?
- 2013‑04‑29:
Bad seed law: EU planning to ban genetic diversity.
- 2013‑04‑29:
jq is like sed for JSON data.
- 2013‑04‑28:
A collection of programming fonts.
- 2013‑04‑28:
History of San Francisco street and landmark names.
- 2013‑04‑28:
A manifesto for the simple scribe: 25 commandments for journalists.
- 2013‑04‑28:
A crime mystery. It's going down, but no one really knows why.
- 2013‑04‑28:
Wikipedia's sexism.
- 2013‑04‑28:
Insecticide firms secretly lobbying against ban that could save bees.
- 2013‑04‑28:
Cook's continental time tables, March 1873.
- 2013‑04‑28:
A review and history of the Haymakers, Chesterton, Cambridge.
- 2013‑04‑28:
ISDAfix: the biggest price-fixing scandal ever.
- 2013‑04‑27:
Why your supermarket only sells 5 kinds of apples.
- 2013‑04‑27:
Matasano crypto challenges.
- 2013‑04‑26:
Dutchman arrested over the 300Gb/s Spamhaus DDoS attack.
- 2013‑04‑26:
Stevenage, and the sad tale of a cycle network innovator forgotten by the New Town he built.
- 2013‑04‑26:
Symantec / Brightmail IP mail reputation lookup.
- 2013‑04‑26:
Why one GP is retiring early to avoid NHS reforms.
- 2013‑04‑26:
Design, implementation and evaluation of congestion control for multipath TCP.
- 2013‑04‑26:
Eventual consistency today: limitations, extensions, and beyond.
- 2013‑04‑26:
US judge refuses to grant a warrant to hack.
- 2013‑04‑26:
Wandering around an Albuquerque airport terminal.
- 2013‑04‑25:
Feed reading is an open web problem, and what browsers could do about it.
- 2013‑04‑25:
Policy paper: identity assurance: enabling trusted transactions.
- 2013‑04‑25:
Government digital service: identity assurance.
- 2013‑04‑25:
Parliamentary office of science and technology: managing online identity.
- 2013‑04‑25:
Position based fluid simulation.
- 2013‑04‑24:
Slash: not just a punctuation mark anymore.
- 2013‑04‑24:
The first federated indieweb comment thread.
- 2013‑04‑24:
JavaScript demo of path finding algorithms.
- 2013‑04‑24:
Dyson: a Debian derivative using the Illumos kernel, libc, and SMF init.
- 2013‑04‑24:
DNS leak test.
- 2013‑04‑24:
ARIN projected to run out of IPv4 addresses in August 2013.
- 2013‑04‑24:
Coding, fast and slow: the psychology of development time estimates.
- 2013‑04‑24:
75th anniversary of the University of Cambridge Computer Laboratory.
- 2013‑04‑24:
Get Britain cycling: press release and links to parliamentary reports.
- 2013‑04‑24:
Intel's return to the DRAM business.
- 2013‑04‑24:
Special characters in a Content-Disposition filename.
- 2013‑04‑24:
The power of silence: why the SimCity story went away.
- 2013‑04‑23:
SoK: eternal war in memory. A survey of vulnerabilities and defences.
- 2013‑04‑23:
Dara O'Briain calls for more taxing exams after taking 10 minutes to get A* in GCSE maths.
- 2013‑04‑23:
Home Office fears Clegg will veto 'snooper's charter'.
- 2013‑04‑23:
BitTorrent's secure Dropbox alternative goes public.
- 2013‑04‑23:
The communications data bill: what's happening?
- 2013‑04‑23:
A detailed analysis of contemporary ARM and x86 architectures.
- 2013‑04‑23:
UK national debt: current, recent, and historical charts.
- 2013‑04‑23:
Government plans to eliminate at least 70% of criminal solicitor firms.
- 2013‑04‑23:
A heartbreaking work of staggering folly. (Econ 101 and the depression.)
- 2013‑04‑23:
List of English words without rhymes.
- 2013‑04‑23:
The Reinhart/Rogoff paper is a mostly-irrelevant sideshow.
- 2013‑04‑23:
Meagre legal aid fees could lead to criminals going free.
- 2013‑04‑23:
Dynamic map of predicted UK election results.
- 2013‑04‑23:
Section 75 of the health act is the engine for destruction of the NHS.
- 2013‑04‑23:
Assange's WikiLeaks party is popular in Australia.
- 2013‑04‑23:
$45 BeagleBone Black Arm Linux PC.
- 2013‑04‑22:
Connect an iPad retina LCD to a PC using DisplayPort.
- 2013‑04‑22:
Nuclear power saves millions of lives.
- 2013‑04‑22:
Running PostgreSQL on compression-enabled ZFS.
- 2013‑04‑22:
CISPA is a global problem.
- 2013‑04‑22:
Developers should be allowed to destroy nature reserves, says Government review.
- 2013‑04‑22:
Reimplementing `git clone` in Haskell from the bottom up.
- 2013‑04‑22:
Campaign to stop killer robots.
- 2013‑04‑22:
Discoverer of the Reinhart/Rogoff flaws explains why they are fundamentally wrong.
- 2013‑04‑22:
Lua: from Brazil to Wikipedia.
- 2013‑04‑22:
Detecting DNS censorship without an internal vantage point.
- 2013‑04‑22:
Mapumental and fire engine journey times.
- 2013‑04‑22:
Data Communications Bill: the Home Office is trying to trap Britain in the past.
- 2013‑04‑22:
Notes about an odd, esoteric, yet incredibly useful thread-aware debugging library: libthread_db.
- 2013‑04‑22:
Interesting DNS hacks.
- 2013‑04‑22:
Computer security researchers tell government to drop net snooping plans.
- 2013‑04‑22:
Why is social care facing the deepest cuts?
- 2013‑04‑22:
Amazon sells lots of erotica, but does not want you to find it.
- 2013‑04‑22:
tlsdate: secure parasitic rdate replacement.
- 2013‑04‑22:
Reinhart/Rogoff: ignoring fundamental issues in the use and abuse of statistical studies.
- 2013‑04‑22:
There's no need for all this economic sadomasochism.
- 2013‑04‑22:
VSRE: very short reply expected. A netiquette idea.
- 2013‑04‑22:
Swansea measles outbreak: a local paper's contribution to the MMR scare.
- 2013‑04‑21:
"The tail's wagging the dog": How outsourcing is eroding NHS services.
- 2013‑04‑21:
Four years of decoding UTF-8.
- 2013‑04‑21:
The REF is now pretty much the only reason why physicists have to use traditional journals.
- 2013‑04‑21:
Patients' guide to magic medicine.
- 2013‑04‑21:
Linux on an 8-bit micro.
- 2013‑04‑20:
Little known technologies that helped save the human genome.
- 2013‑04‑20:
Mystery aircraft parts and atomic clocks.
- 2013‑04‑20:
Smaller: the disposable diaper and the meaning of progress.
- 2013‑04‑20:
The Excel depression: Reinhart/Rogoff.
- 2013‑04‑20:
The most difficult bug: MSX sound chip emulation and human auditory perception.
- 2013‑04‑20:
Generic Merkelized authenticated data structures.
- 2013‑04‑20:
YouTube again beats Viacom's massive copyright infringement lawsuit.
- 2013‑04‑19:
The eternal mainframe.
- 2013‑04‑19:
The death of upcoming.org.
- 2013‑04‑19:
Tern: JavaScript editor integration with error-tolerant parsing and type inference.
- 2013‑04‑19:
Meet the grad student who demolished the Reinhart/Rogoff austerity argument.
- 2013‑04‑19:
OpenPGP best practices.
- 2013‑04‑19:
You lookin' at me? Reflections on Google Glass.
- 2013‑04‑19:
Hacking and rooting SOHO home routers.
- 2013‑04‑19:
Open home gateway forum: commercial consortium for open source secure functional upgradable router firmware.
- 2013‑04‑19:
Maybe is better than NULL.
- 2013‑04‑19:
Yahoo! Chat: a eulogy to a crazy protocol.
- 2013‑04‑18:
Bufferbloat vs codel: see how much faster the Internet could be. (video)
- 2013‑04‑18:
Thin films of water in space. (YouTube)
- 2013‑04‑18:
What happens if you wring out a washcloth in space? (video)
- 2013‑04‑18:
Pourquoi le droit d'auteur viole la constitution.
- 2013‑04‑18:
A history of coffee.
- 2013‑04‑18:
Weird and wonderful London Underground maps.
- 2013‑04‑18:
DNSmasq is not the best intermediary for a reflection/amplification attack.
- 2013‑04‑18:
TXDNS: aggressive multithreaded DNS digger for Windows.
- 2013‑04‑17:
Genome size, complexity, and the c-value paradox.
- 2013‑04‑17:
Extrapolating Moore's Law backwards, and applying it to the origin of life.
- 2013‑04‑17:
Viewing a web page is not a breach of copyright in the UK.
- 2013‑04‑17:
Adventures in undefined behaviour: monkey-patching malloc() for fun and profit.
- 2013‑04‑17:
We are still saving British science from Margaret Thatcher.
- 2013‑04‑17:
IMAP as the proto personal cloud.
- 2013‑04‑17:
Template Haskell on impossible architectures.
- 2013‑04‑16:
Enabling DNSSEC validation on Windows 2012 server.
- 2013‑04‑16:
Copyright: a new prohibition.
- 2013‑04‑16:
Guidelines for bias-free writing: a review by P.J. O'Rourke.
- 2013‑04‑16:
The myth of Margaret Thatcher.
- 2013‑04‑16:
Certificate revocation and the performance of OCSP.
- 2013‑04‑15:
Mimi Silbert and rehabilitation at the Delancey Street Foundation.
- 2013‑04‑15:
ldp: LDAP distributed shell profile.
- 2013‑04‑15:
That's a big transistor: why you are not going to space on a coil gun today.
- 2013‑04‑15:
37,112 insert/remove cycles for Lego pieces to lose their clutch power.
- 2013‑04‑15:
On the trail of malicious dynamic DNS domains.
- 2013‑04‑15:
Dotfiles distribution at login with git and LDAP.
- 2013‑04‑15:
DNSSEC zone signing made easy.
- 2013‑04‑15:
Why dodgy downloads use RAR files.
- 2013‑04‑15:
WiFi Pineapple: hot-spot honeypot pen-testing platform.
- 2013‑04‑15:
Ked: the first scripting language to emerge from The People's Republic of Cork.
- 2013‑04‑15:
IT security in a nutshell.
- 2013‑04‑15:
Tailmatching them cookies: the latest cURL security bug.
- 2013‑04‑15:
Hacktivists as gadflies: the crime of being too clever and annoying the powerful.
- 2013‑04‑14:
Be careful on your birthday!
- 2013‑04‑14:
Want to block common passwords? Sorry, that is patented.
- 2013‑04‑14:
The exploding toilet.
- 2013‑04‑14:
Paradise Silk Mills, Macclesfield.
- 2013‑04‑14:
Google deal with EU regulates search results.
- 2013‑04‑14:
Junction design the Dutch cycle friendly way. (YouTube)
- 2013‑04‑14:
More thoughts on why Python, Ruby, and Javascript are slow.
- 2013‑04‑13:
"Do you use Boy Words or Girl Words? Or the other words, but I can't 'amember them."
- 2013‑04‑13:
Stanford scientists develop new reflective/emissive structure that cools buildings in full sunlight.
- 2013‑04‑13:
The post-Thatcher generation: We might be young, but we weren't born yesterday.
- 2013‑04‑13:
Forecast: it's not a web app, it's an app you install from the web.
- 2013‑04‑12:
Peak Oil as seen through the eyes of Arab oil producers.
- 2013‑04‑12:
Measuring DNSSEC deployment, and Google Public DNS.
- 2013‑04‑12:
Obscure C.
- 2013‑04‑12:
Charles Carreon the Oatmeal/Funnyjunk lawyer has to pay $46K in legal fees.
- 2013‑04‑12:
Zerocoin: making Bitcoin anonymous.
- 2013‑04‑12:
Elm is a functional reactive programming language that compiles to HTML, CSS, and JS.
- 2013‑04‑12:
My comments on ICANN's root zone KSK rollover consultation.
- 2013‑04‑12:
You know, Google, the web already had this feature.
- 2013‑04‑12:
IBM VM and the VM community: past, present, and future.
- 2013‑04‑11:
Hijacking airplanes with an Android phone.
- 2013‑04‑11:
Building BSD in meta mode.
- 2013‑04‑11:
Panda IMAP: Mark Crispin's successor to UW-IMAP.
- 2013‑04‑11:
The Empire acquires the rebel alliance: Mendeley users revolt against Elsevier takeover.
- 2013‑04‑10:
Can someone explain Haskell's wager to me?
- 2013‑04‑10:
Bean leaves stop bedbugs in their tracks.
- 2013‑04‑10:
"Everything I had been taught to regard as a vice, under Thatcherism became a virtue." (video)
- 2013‑04‑10:
The economic achievements and failures of Margaret Thatcher.
- 2013‑04‑10:
No tail call elimination in Rust.
- 2013‑04‑10:
Managing SSH keys for automated access: current recommended practice.
- 2013‑04‑10:
A town without poverty? A 1970s Canadian experiment with Citizens' Income.
- 2013‑04‑10:
Artist's impression of the refurbished Arup building. (Vimeo)
- 2013‑04‑10:
A practical utopian's guide to the coming collapse.
- 2013‑04‑10:
Margaret Thatcher and the constitution.
- 2013‑04‑09:
Motorola Android devices unlocked by exploiting flaw in TrustZone kernel.
- 2013‑04‑09:
Dispelling the Thatcher myths.
- 2013‑04‑09:
Papers from the lost culture of array languages.
- 2013‑04‑09:
Thatcher: the woman who wrecked Britain.
- 2013‑04‑09:
Tamale: a TAble MAtching Lua Extension.
- 2013‑04‑09:
Mozilla Persona beta 2, including "identity bridging".
- 2013‑04‑09:
DNSSEC validator plugin for browsers.
- 2013‑04‑09:
Facebook HipHop HHVM is 2.3x .. 2.5x faster than standard PHP.
- 2013‑04‑09:
General purpose programming languages' maximal complexity.
- 2013‑04‑09:
BIND on RHEL6 now includes RRL patch.
- 2013‑04‑09:
The only Susan Greenfield article you'll ever need.
- 2013‑04‑09:
Thatcherism was a national catastrophe that still poisons us.
- 2013‑04‑09:
Verizon deploying carrier-grade NAT on DSL customers.
- 2013‑04‑09:
Meet the "nice-guy" patent trolls who want $1,000 per worker for using scanners.
- 2013‑04‑09:
Margaret Thatcher left a dark legacy that has still not disappeared.
- 2013‑04‑08:
Shodan: the scariest search engine on the Internet.
- 2013‑04‑08:
Puzzle: make three NOT gates using only two NOT gates.
- 2013‑04‑08:
If hackers didn't exist, governments would have to invent them.
- 2013‑04‑08:
Git koans.
- 2013‑04‑08:
David Willetts on Margaret Thatcher. (2009)
- 2013‑04‑08:
What can politicians learn from Margaret Thatcher.
- 2013‑04‑08:
Designing Kerberos IV: a dialogue in four scenes.
- 2013‑04‑08:
Wearable video cameras reduce police violence.
- 2013‑04‑08:
Explain like I'm 5: Kerberos.
- 2013‑04‑08:
More US ISPs doing man-in-the-middle ad injection.
- 2013‑04‑08:
Waffles: a collection of command-line tools for machine learning and data mining.
- 2013‑04‑07:
Tony Blair and Iraq: The damning evidence.
- 2013‑04‑06:
Lies about the Key Stage 2 spelling, punctuation, and grammar test.
- 2013‑04‑06:
The impact of the lambda calculus in logic and computer science.
- 2013‑04‑06:
With a broken promise, the government has handed the NHS over to the market private sector.
- 2013‑04‑06:
A review of Android for blind and partially sighted users.
- 2013‑04‑06:
Learn vimscript the hard way.
- 2013‑04‑06:
CSS media queries are the wrong thing.
- 2013‑04‑05:
AMI firmware source code and test private key leaked.
- 2013‑04‑05:
Apple to cripple VPN On Demand in iOS 6.1 due to VirnetX patent lawsuit.
- 2013‑04‑05:
Google says it's time to take action against patent trolls and patent privateering.
- 2013‑04‑05:
The baseline compiler has landed in Firefox Nightly.
- 2013‑04‑05:
Possible security disasters loom with rollout of new top-level domains.
- 2013‑04‑05:
Programming Erlang 2nd edition.
- 2013‑04‑05:
Closing the door on hackers.
- 2013‑04‑05:
The most ridiculous scene in Jurassic Park.
- 2013‑04‑04:
Do more to prevent DNS DDoS attacks.
- 2013‑04‑04:
Consortium for Plant Biotechnology Research plagiarised a web page, and sued its author when asked to respect copyright.
- 2013‑04‑04:
AMD declares the end of Moore's law.
- 2013‑04‑04:
Rackspace is suing the most notorious patent troll in America.
- 2013‑04‑04:
US DEA says it is impossible to intercept iMessages between two Apple devices even with a court order.
- 2013‑04‑04:
Why aren't we all talking with our devices yet? On voice UI design.
- 2013‑04‑04:
An explanatory model for the Senate's surge in support for same-sex marriage.
- 2013‑04‑04:
Q&A: Iain Banks / Rationalist Association.
- 2013‑04‑04:
American teenagers who read news online can be prosecuted under the CFAA.
- 2013‑04‑04:
Re-enacting the Night Watch. (video)
- 2013‑04‑04:
MIT puts up a firewall.
- 2013‑04‑04:
What you're reading about Blink is probably wrong.
- 2013‑04‑04:
Translation from bullshit to English of the Chrome Blink FAQ.
- 2013‑04‑03:
Next time you see a plea for cybersecurity spending on more cyberwarriors ...
- 2013‑04‑03:
Google Chrome Blink and security.
- 2013‑04‑03:
Google Chrome Blink developer FAQ.
- 2013‑04‑03:
Google forks WebKit to make Blink, a rendering engine for Chrome.
- 2013‑04‑03:
Links about programming for kids.
- 2013‑04‑03:
A mother tongue spoken by millions of Americans still gets no respect.
- 2013‑04‑03:
The patent protection racket.
- 2013‑04‑03:
"Not even wrong" and "wronger than wrong".
- 2013‑04‑03:
Hack the music industry to get from YouTube to an xmas top ten hit in under 8 weeks.
- 2013‑04‑03:
An interview with computing pioneer Alan Kay.
- 2013‑04‑03:
Andrew Tyrie: the most powerful backbencher in the House of Commons.
- 2013‑04‑03:
The Underhanded C Contest 2013.
- 2013‑04‑03:
Nuclear power has prevented about 1.84 million air pollution-related deaths.
- 2013‑04‑03:
Honest download meter prototype.
- 2013‑04‑02:
First sale doctrine does not apply to MP3s in the US.
- 2013‑04‑02:
checkedthreads: bug-free shared memory parallelism.
- 2013‑04‑02:
How the BBC betrayed the NHS.
- 2013‑04‑01:
Paradoxical gears.
- 2013‑04‑01:
Inside the gcc size overflow plugin.
- 2013‑04‑01:
We have to talk about why some people agree with benefit cuts.
- 2013‑04‑01:
Defrosting a cold storage building frozen for 90 years.
- 2013‑04‑01:
Crude benchmarks of NaCl and scrypt in the browser.
- 2013‑03‑31:
Terrorists of the right colour.
- 2013‑03‑31:
Callbacks are imperative, promises are functional: Node's biggest missed opportunity.
- 2013‑03‑30:
Fast collision attack on MD5.
- 2013‑03‑30:
Another NYT article on the Spamhaus DDoS; should have emphasised BCP 38 more.
- 2013‑03‑30:
Intellectual Property rights and innovation: evidence from the human genome.
- 2013‑03‑30:
The Spamhaus DDoS attack: how big a deal was it?
- 2013‑03‑30:
Donglegate: why the tech community hates feminists.
- 2013‑03‑30:
Looking at the Spamhaus BGP hijack.
- 2013‑03‑30:
How the Spamhaus DDoS could have been prevented.
- 2013‑03‑29:
Cisco's chronology of the Spamhaus DDoS.
- 2013‑03‑29:
Verisign does not think ICANN is ready for a thousand new TLDs.
- 2013‑03‑29:
The Wiley/Kirtsaeng first sale decision has echoes of Betamax.
- 2013‑03‑29:
The Spamhaus DDoS was hyped by shoddy journalism.
- 2013‑03‑29:
No, ZFS really doesn't need a fsck.
- 2013‑03‑29:
Is your open DNS resolver part of a criminal conspiracy?
- 2013‑03‑29:
What is the maximum DNS amplification factor?
- 2013‑03‑29:
Chilling effects of the DMCA on security research.
- 2013‑03‑29:
What can be done about source address spoofing and amplification attacks?
- 2013‑03‑29:
Open acces material published under a CC-BY-NC licence cannot be used for teaching.
- 2013‑03‑29:
Adobe Blank: a non-spacing non-marking typeface.
- 2013‑03‑28:
One of CloudFlare's bandwidth providers on the 300Gbit/s DDoS attack.
- 2013‑03‑28:
A 300Gbit/s DDoS is not enough to break the Internet.
- 2013‑03‑27:
Update from CloudFlare on the Spamhaus DDoS.
- 2013‑03‑27:
The BBC on the massive Spamhaus DDoS.
- 2013‑03‑27:
The power of the RSS reader.
- 2013‑03‑27:
Spamhaus DDoS grows to 300Gbit/s.
- 2013‑03‑27:
Memory address disclosure via weak hash tables and garbage collection.
- 2013‑03‑27:
Preparing for Google Groups shutdown.
- 2013‑03‑27:
Persona supports distributed identity providers today.
- 2013‑03‑26:
IBM 1360 Photostore at LLNL.
- 2013‑03‑26:
Entire editorial board of the Journal of Library Administration resigns over open access following death of Aaron Swartz.
- 2013‑03‑26:
The twisted London Underground map.
- 2013‑03‑26:
The highest-level feature of C.
- 2013‑03‑26:
Antipodean punting.
- 2013‑03‑26:
On the distribution of DNS TTLs.
- 2013‑03‑26:
"Cargo Cult Science" - by Richard Feynman.
- 2013‑03‑26:
The fragility of AES-GCM authenticated encryption.
- 2013‑03‑26:
Testing Cambridge's safer cycle network.
- 2013‑03‑26:
Reflections on a foray into post-publication peer review.
- 2013‑03‑26:
A Cambridge cycling infrastructure safari.
- 2013‑03‑26:
Inquiry-based learning about data structures, when teaching computer science.
- 2013‑03‑26:
Apple text APIs and upper/lower case digits.
- 2013‑03‑26:
USPS discrimination against atheist packing tape.
- 2013‑03‑26:
IBM 1360 photo-digital storage system: terabit capacity in the 1960s.
- 2013‑03‑26:
GCHQ recruitment website stores passwords in plain text.
- 2013‑03‑26:
The Irish approach to sharing roads between cars, bikes, and pedestrians.
- 2013‑03‑26:
When a deaf man has Tourette's.
- 2013‑03‑26:
Shrinking blob gets within 5%-10% of optimal in small travelling salesman problems.
- 2013‑03‑26:
The end of needs assessments in IPv4?
- 2013‑03‑25:
What happens when a domain registrar shuts down?
- 2013‑03‑25:
The million-plus open DNS resolver challenge.
- 2013‑03‑25:
Frozen spring linked to dramatic loss of Arctic sea ice.
- 2013‑03‑25:
A big password cracking wordlist.
- 2013‑03‑25:
Compiling LLJS to asm.js.
- 2013‑03‑25:
Prince Rupert's Drop: glass with interesting properties. (video)
- 2013‑03‑25:
miTLS: a formally verified reference implementation of TLS 1.2.
- 2013‑03‑25:
Open recursive DNS server survey.
- 2013‑03‑25:
A review of OneTab for Chrome.
- 2013‑03‑25:
DANE: the next big thing after DNSSEC.
- 2013‑03‑25:
Unix crypt encoding for scrypt.
- 2013‑03‑25:
How a self-confessed script kiddie became a password cracker.
- 2013‑03‑25:
Python speed optimization for reposurgeon.
- 2013‑03‑25:
Graphene supercapacitors sound promising.
- 2013‑03‑25:
The brains of the animal kingdom.
- 2013‑03‑25:
Difficulties in backing up live git repositories.
- 2013‑03‑24:
The origin of ketchup.
- 2013‑03‑24:
The future of the NHS—irreversible privatisation?
- 2013‑03‑24:
Normal human infant sleep.
- 2013‑03‑23:
CIA CTO on big data and mass surveillance.
- 2013‑03‑23:
Land of plenty (of government).
- 2013‑03‑23:
T-Mobile WiFi calling unverified X.509 MITM vulnerability.
- 2013‑03‑23:
DakaRand 1.0: revisiting clock drift for entropy generation.
- 2013‑03‑23:
Timer entropy daemon.
- 2013‑03‑23:
twuewand: a truerand algorithm for generating entropy.
- 2013‑03‑23:
How to kill Wi-Fi.
- 2013‑03‑23:
Securing ZeroMQ: CurveZMQ protocol and implementation.
- 2013‑03‑23:
The Crystal programming language: a compiled version of Ruby.
- 2013‑03‑23:
Cycling in two university cities: Cambridge and Münster.
- 2013‑03‑23:
Changing the way social scientists think about human behavior and culture.
- 2013‑03‑23:
Assemble two IKEA stools into a balance bike. (video)
- 2013‑03‑22:
Apple uses only renewable energy in its data centers.
- 2013‑03‑22:
20 years of NetBSD.
- 2013‑03‑22:
Major security hole allows Apple passwords to be reset with only email address and date of birth.
- 2013‑03‑22:
Cloudflare's CDNJS vs. Google hosted libraries.
- 2013‑03‑22:
Google's trust problem.
- 2013‑03‑22:
Setting your JavaScript free.
- 2013‑03‑22:
Firefox Nightly now includes OdinMonkey, an asm.js optimization module.
- 2013‑03‑22:
Radio jammers in the Sistine Chapel protected the secrecy of the papal election.
- 2013‑03‑22:
Two reasons the functional style is slow in SpiderMonkey.
- 2013‑03‑22:
Neil Gaiman on political correctness.
- 2013‑03‑22:
The Big Brother Watch amendment to limit the damage of the Leveson press regulations.
- 2013‑03‑21:
Verify DANE TLSA records.
- 2013‑03‑21:
Advice for writing messages for technical mailing lists.
- 2013‑03‑21:
gdnsd: geographic DNS server.
- 2013‑03‑21:
An old patch to BIND for matching by country in ACLs using MaxMind's GeoIP database.
- 2013‑03‑21:
Geolocation-aware DNS with BIND views.
- 2013‑03‑21:
The DDoS attack that knocked the Spamhaus website offline, and how Cloudflare mitigated it.
- 2013‑03‑21:
The invasion of Iraq was the single worst foreign policy decision in American history.
- 2013‑03‑20:
The end of the ISBN?
- 2013‑03‑20:
Sugar, not fat, is the deadly villain in the obesity epidemic.
- 2013‑03‑20:
The growth of BGP, or lack thereof.
- 2013‑03‑20:
BGP scaling revisited.
- 2013‑03‑20:
AdamsNames ccTLD hijack resolved.
- 2013‑03‑20:
Report of the 19th meeting of the consultative committee for time and frequency.
- 2013‑03‑20:
UTCr (rapid UTC) nears official production status.
- 2013‑03‑20:
Thieves in $80 million Eli Lilly heist used warehouse security schematics.
- 2013‑03‑20:
The purpose of DRM is to give content providers leverage against creators of playback devices.
- 2013‑03‑20:
Brian Krebs attacked by script kiddie "Phobia", previously involved in the Matt Honan hack.
- 2013‑03‑20:
The lesser of two Weevs.
- 2013‑03‑20:
Things publishers can't do: alternate business models for books.
- 2013‑03‑19:
Avoid silent data corruption in MySQL by setting sql_mode.
- 2013‑03‑19:
Python Software Foundation wins battle for EU Python trademark.
- 2013‑03‑19:
Fedora 19 bugs cannot be reported because the server side cannot handle the release name "Schrödinger's Cat".
- 2013‑03‑19:
Guardian's StrongTrustManager vulnerabilities: a case study in X.509 validation failure.
- 2013‑03‑19:
Steubenville is rape culture's Abu Ghraib moment.
- 2013‑03‑19:
What if Weev had just read one record and done "responsible disclosure"?
- 2013‑03‑19:
First sale doctrine upheld by US Supreme Court. Kirtsaeng wins against Wiley.
- 2013‑03‑19:
Open access: The 'avalanche of change' in higher education must be contextualised in terms of the government's broader neoliberal policies.
- 2013‑03‑19:
Bloomd: high performance Bloom filter server.
- 2013‑03‑19:
WikiLeaks cables and the end of the Iraq War.
- 2013‑03‑19:
Google Public DNS now supports DNSSEC validation.
- 2013‑03‑19:
Leveson's Royal Charter will not establish a blog regulator.
- 2013‑03‑19:
CRIME attack against TLS adapted to decrypt compressed server responses.
- 2013‑03‑19:
Some companies chasing innovations that really matter.
- 2013‑03‑19:
Internal-use X.509 certificates pose security risk for new gTLDs.
- 2013‑03‑19:
Post-quantum cryptography.
- 2013‑03‑18:
Port scanning /0 using insecure consumer routers.
- 2013‑03‑18:
When speaking, entertain, don't teach.
- 2013‑03‑18:
The insupportable equilibrium of economic thought.
- 2013‑03‑18:
Optimizing a single producer/consumer lock free queue, step by step.
- 2013‑03‑18:
Computer science in primary and secondary schools in Vietnam.
- 2013‑03‑18:
Preview of JSON support in BIND 9.10's statistics server.
- 2013‑03‑18:
Dangers of trailing dots in web host names.
- 2013‑03‑17:
Cryptography worst practices.
- 2013‑03‑17:
Terrain flyover demo in JavaScript and WebGL.
- 2013‑03‑17:
PayPal's concerns with new gTLDs that match popular internal private TLDs.
- 2013‑03‑17:
How beer gave us civilization.
- 2013‑03‑17:
Qthreads: a library for programming with millions of lightweight threads.
- 2013‑03‑16:
Plaintext recovery attack on broadcast RC4.
- 2013‑03‑16:
Using a Raspberry Pi to trojan a Dell laptop docking station.
- 2013‑03‑16:
Half of spam comes from just 20 ISPs.
- 2013‑03‑16:
MesoCalc: a Mesopotamian base-60 calculator.
- 2013‑03‑16:
Ubuntu unveils its next-generation graphical shell and display server.
- 2013‑03‑15:
C compiled to Lua runs on LuaJIT as fast as native gcc.
- 2013‑03‑15:
National security letters with gag orders are an unconstitutional restriction on free speech.
- 2013‑03‑15:
Longest C++ error message?
- 2013‑03‑15:
An overview of spam botnets.
- 2013‑03‑15:
CPC: continuation passing C.
- 2013‑03‑15:
Google Reader lived on borrowed time: its creator Chris Wetherell reflects.
- 2013‑03‑15:
DRM is such a fucking stupid idea.
- 2013‑03‑15:
Anonymity in the real world is very hard.
- 2013‑03‑15:
Avast! anti-virus intercepts TLS connections, and resets non-invasive settings after boot.
- 2013‑03‑15:
sthttpd
- 2013‑03‑15:
Dashes and hyphens and Unicode.
- 2013‑03‑14:
Two new attacks on TLS allow decryption of authentication cookies.
- 2013‑03‑14:
UK bank fraud up by 11% in 2012, but how much do customers lose?
- 2013‑03‑13:
Any time we deviate from object-capability security, we regret it.
- 2013‑03‑13:
NSFWCORP gets banned by Vegas distributors: freedom of the press in the USA.
- 2013‑03‑13:
Reading indeterminate contents might as well be undefined in C.
- 2013‑03‑13:
GitSync: connect PlasticSCM to GitHub
- 2013‑03‑13:
Aaron Swartz lawyers accuse prosecutor Stephen Heymann illegally withholding exculpatory evidence.
- 2013‑03‑13:
DNS domain names: 253 or 255 bytes/octets?
- 2013‑03‑13:
Tim O'Reilly defends his company's soul.
- 2013‑03‑13:
9th Circuit appeals court says 4th Amendment applies at US border, and encrypted files are not suspicious.
- 2013‑03‑13:
Destructors, finalizers, and synchronization.
- 2013‑03‑13:
O'Reilly has lost its soul.
- 2013‑03‑13:
Where and when did the symbols "+" and "-" originate?
- 2013‑03‑13:
Torque: an OBD2 performance and diagnostic tool for Android devices.
- 2013‑03‑13:
Automatic: transmit car telemetry data from the on-board diagnostics port to your phone.
- 2013‑03‑13:
Confessions of a job destroyer.
- 2013‑03‑12:
Lego robot folds and shoots paper planes.
- 2013‑03‑12:
Retailer sues Visa over $13 million 'fine' for being hacked.
- 2013‑03‑12:
RC4 is kind of broken in TLS.
- 2013‑03‑12:
Confusion reigns over three "hijacked" ccTLDs.
- 2013‑03‑12:
Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters.
- 2013‑03‑12:
Come and help save posterous from oblivion!
- 2013‑03‑12:
Sample code for verifying TLS certs with OpenSSL.
- 2013‑03‑12:
A salute to Bradley Manning, whistleblower, as we hear his words for the first time.
- 2013‑03‑12:
A theorem fit to terrify bankers: M&M implies banks should be less indebted.
- 2013‑03‑12:
What I wish Tim Berners-Lee understood about DRM.
- 2013‑03‑12:
Notes on Intel microcode updates.
- 2013‑03‑12:
Securing ØMQ with libsodium.
- 2013‑03‑12:
You can ring my bell! Adventures in sub-GHz RF land.
- 2013‑03‑12:
Version skew leads to Bitcoin netsplit; price temporarily falls 23%.
- 2013‑03‑12:
AdamsNames TLD registry hijack due to corporate infighting.
- 2013‑03‑12:
Failures of secret key cryptography.
- 2013‑03‑12:
US-EU free trade deal: foundation for a new global economic order.
- 2013‑03‑12:
Sugar industry's secret documents echo tobacco tactics.
- 2013‑03‑11:
Registry operator AdamsNames hacked, locking up .TC, .GD, and .VC.
- 2013‑03‑11:
Improve the volume and quality of contributions by giving commit access to anyone who sends a pull request.
- 2013‑03‑11:
Hacking Donkey Kong so Pauline rescues Mario.
- 2013‑03‑11:
Optimizing software occlusion culling in 3D graphics.
- 2013‑03‑11:
Fenland ditch fire blamed on pigeon fireball.
- 2013‑03‑11:
Here come the encryption apps!
- 2013‑03‑11:
The Lazy K esoteric programming language.
- 2013‑03‑10:
How OCaml type checking works; or what polymorphism and garbage collection have in common.
- 2013‑03‑10:
The perfect error message.
- 2013‑03‑10:
A manifesto for error reporting.
- 2013‑03‑10:
Yo as a gender-neutral pronoun in Baltimore.
- 2013‑03‑10:
Fit LEDs into Lego minifigures for Halloween.
- 2013‑03‑10:
Extreme debugging: fixing microcode with an oven.
- 2013‑03‑09:
Introducing Sodium, a new cryptographic library.
- 2013‑03‑09:
RetroArch emulates nearly every classic gaming console on Android.
- 2013‑03‑09:
TLS PKIX tree of trust.
- 2013‑03‑09:
MySQL performance hurt by glibc malloc on manycore machines.
- 2013‑03‑08:
Consultation on DNSSEC root trust anchor rollover.
- 2013‑03‑08:
A visualisation of contradictions in the Bible.
- 2013‑03‑07:
The US military uses IRC as a primary comms path.
- 2013‑03‑07:
Arup building redevelopment plans.
- 2013‑03‑07:
passwdqc: password strength checking and policy enforcement toolset.
- 2013‑03‑07:
Fast submenus that don't disappear out from under you.
- 2013‑03‑07:
Golang at Google: language design in the service of software engineering.
- 2013‑03‑06:
Printer ink costs more than human blood.
- 2013‑03‑06:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
- 2013‑03‑06:
Lord Puttnam's Leveson amendment has put libel reform in serious danger.
- 2013‑03‑06:
Malicious Java applet is signed with revoked certificate but still runs automatically.
- 2013‑03‑06:
Phidelius: constructing asymmetric keypairs from mere passwords for fun and PAKE.
- 2013‑03‑06:
Prevent DoS attacks against slow password hash functions?
- 2013‑03‑06:
Deep C monsters.
- 2013‑03‑06:
DNSSEC monitoring tools.
- 2013‑03‑06:
ZFS ZIL-related fragmentation.
- 2013‑03‑06:
ZFS write performance: impact of fragmentation.
- 2013‑03‑06:
Helping users create better passwords.
- 2013‑03‑06:
DRM chair.
- 2013‑03‑05:
The Google Glass feature no one is talking about.
- 2013‑03‑05:
The Finkbeiner test for profiles of scientists.
- 2013‑03‑05:
Exploits that do good rather than evil.
- 2013‑03‑05:
Advanced auto-dependency generation for make.
- 2013‑03‑05:
makefile-death: A make-based configuration and build system.
- 2013‑03‑05:
Libre Office now builds with a single instance of make.
- 2013‑03‑05:
Former directors of the DEA warn Obama about his obligations to fight the war on drugs.
- 2013‑03‑05:
Slaughter: a system administration and configuration tool.
- 2013‑03‑05:
Honest job advertisement for a lectureship / assistant professorship.
- 2013‑03‑05:
Cambridge pub study. (Not as fun as it sounds.)
- 2013‑03‑05:
The US industrial revolution was built on piracy.
- 2013‑03‑05:
PHP Manual Masterpieces: strcmp.
- 2013‑03‑05:
Military malware may have killed the iPhone jailbreak.
- 2013‑03‑05:
Bitrig is a free, fast, and secure Unix-like Open Source operating system.
- 2013‑03‑05:
Deep Impact: Unintended consequences of journal rank.
- 2013‑03‑05:
Problems with UK's new open access academic publishing policies.
- 2013‑03‑05:
Facebook Android app uses crazy Dalvik VM patch to load on old phones.
- 2013‑03‑05:
You never, ever, under any circumstances want to use Maven!
- 2013‑03‑05:
Getting started with Ansible.
- 2013‑03‑05:
The first five minutes on a new server with Ansible.
- 2013‑03‑05:
Segway + iPad = telepresence.
- 2013‑03‑05:
The cost of botnets and the implications for Internet voting.
- 2013‑03‑05:
Welcome to peak capitalism.
- 2013‑03‑04:
The BBC's bad (pseudo)science reporting will make people sick.
- 2013‑03‑04:
MPs vote for secret courts. Injustice must not be seen to be done.
- 2013‑03‑04:
The Pirate Bay hosted in North Korea? No, it's fake.
- 2013‑03‑04:
Exotic necktie knots: Eldredge; Trinity; Cape.
- 2013‑03‑04:
Parsoid: round-trip conversion between HTML5 and wikitext.
- 2013‑03‑04:
Honest trailers: Skyfall. (YouTube)
- 2013‑03‑04:
Breaking the law by reading it.
- 2013‑03‑04:
Centre for Computing History: how you can help.
- 2013‑03‑04:
Objects and aspects: row polymorphism.
- 2013‑03‑04:
Things you should know about the "cured" HIV baby before you get too excited.
- 2013‑03‑04:
Mir: yet another successor to X11.
- 2013‑03‑04:
The various locations and encodings for filenames in Zip archives.
- 2013‑03‑04:
SSD power faults are likely to scramble your data.
- 2013‑03‑04:
Fab stops sending you emails you don't read, even when you don't ask them to.
- 2013‑03‑04:
NHS 'privatisation' reform 'could place people in danger'.
- 2013‑03‑04:
Days since last Java 0day.
- 2013‑03‑04:
Aging canned goods: time and heat can make tuna and Spam even more delicious..
- 2013‑03‑04:
Category theory for scientists.
- 2013‑03‑04:
Pevsner architectural guides (now with app).
- 2013‑03‑04:
Bradley Manning Nobel peace prize nomination 2013.
- 2013‑03‑04:
Techniques for efficient secure computation based on Yao's protocol.
- 2013‑03‑04:
The nonsense math effect.
- 2013‑03‑04:
The financial system as a whole functions as a hostile AI.
- 2013‑03‑04:
A baby has been cured of HIV with antiretroviral drugs.
- 2013‑03‑03:
Human Rights and Bingham's Question: which rights are we to discard?
- 2013‑03‑03:
Algorithmic rape jokes and object spam.
- 2013‑03‑03:
ACM: tear down this paywall.
- 2013‑03‑03:
Sony proposes DRM for electricity.
- 2013‑03‑03:
Interesting JavaScript Webcrypto question.
- 2013‑03‑03:
Peek and poke upstart (init) to fix process states on Linux.
- 2013‑03‑03:
AESOP: an autoparallelizing compiler based on LLVM.
- 2013‑03‑03:
Safe C64 VSP: fix a hardware bug triggered by a demo hack.
- 2013‑03‑03:
Fundamental problems of Lisp: irregular syntax; cons cells.
- 2013‑03‑03:
CloudFlare outage post mortem.
- 2013‑03‑03:
Literally IPv6: Microsoft Exchange vs Apple Mail.
- 2013‑03‑03:
Intellectual debt.
- 2013‑03‑02:
The Apple i-device Lightning digital AV adapter surprise.
- 2013‑03‑02:
Into the continuum.
- 2013‑03‑02:
We know how Eastleigh voted. Here's why.
- 2013‑03‑02:
How to make a Java jar file executable on unix.
- 2013‑03‑02:
Please continue to hold: an empirical study of tolerance to security delays.
- 2013‑03‑02:
"Establishing secure connection..." and other artificial delays.
- 2013‑03‑02:
When slower is better.
- 2013‑03‑02:
Why Python, Ruby, and Javascript are slow.
- 2013‑03‑02:
The resurgence of neural networks.
- 2013‑03‑02:
The contested Barbie: what happens to marginal subcultures as the web becomes popular:
- 2013‑03‑02:
C/C++ gripe: integer types.
- 2013‑03‑01:
Corporations are post-human hostile AI.
- 2013‑03‑01:
Pwn Pad.
- 2013‑03‑01:
Ten years of PyPy.
- 2013‑03‑01:
Tim Gowers on the Episciences project and arXiv overlay journals.
- 2013‑03‑01:
Tim Gowers on the Forum of Mathematics.
- 2013‑03‑01:
Aaron Swartz was right.
- 2013‑03‑01:
Centre for Computing History finds a home in Cambridge.
- 2013‑03‑01:
A new Java memory corruption 0day.
- 2013‑03‑01:
What is (and is not) in WebKit.
- 2013‑03‑01:
Connection management in Chromium.
- 2013‑03‑01:
They found their son in the subway!
- 2013‑03‑01:
The court of public opinion, reputation, revenge, and the unfairness of the courts.
- 2013‑03‑01:
Marvin the meme android.
- 2013‑03‑01:
Two surgeons debate cycle helmets.
- 2013‑02‑28:
It's the sugar, folks.
- 2013‑02‑28:
Video of the planned new Cambridge Station multi-storey cycle parking.
- 2013‑02‑28:
IP upgrade will allow US telcos to escape regulation.
- 2013‑02‑28:
NTP pool DNS server monitor.
- 2013‑02‑28:
NTP pool DNS server rewritten in Golang.
- 2013‑02‑28:
Eating sugar correlated to more diabetes: an econometric analysis of repeated cross-sectional population-level data.
- 2013‑02‑28:
Russian speeding cameras crippled by malware.
- 2013‑02‑28:
Users must give cPanel their root password to get support. cPanel support database hacked.
- 2013‑02‑28:
British citizens get their nationality revoked while on holiday, and killed by US drones.
- 2013‑02‑28:
Fuck you very much, graffiti.
- 2013‑02‑28:
Segregated yoghurts.
- 2013‑02‑28:
A few good things about Ansible.
- 2013‑02‑27:
List of static code analysis tools.
- 2013‑02‑27:
People refusing to co-operate at DHS checkpoints. (video)
- 2013‑02‑27:
In praise of "boring" technology (DNS).
- 2013‑02‑27:
Nominet backs off on direct.uk plan, but still wants open 2LD registration and more DNSSEC deployment.
- 2013‑02‑27:
Microsoft offers security audits to ccTLD registries.
- 2013‑02‑27:
Why is BIND10 written in C++ and Python?
- 2013‑02‑27:
Top universities in social media marketing.
- 2013‑02‑27:
A case where DNSSEC would help. (part 2)
- 2013‑02‑27:
A case where DNSSEC would help. (part 1)
- 2013‑02‑27:
Using PDF as a code distribution archive format.
- 2013‑02‑27:
Keeping it on-topic: the problem with discussing sex at technical conferences.
- 2013‑02‑27:
What happened with Violet Blue's Security BSides SF talk.
- 2013‑02‑26:
Music sales rise when it is easier to buy.
- 2013‑02‑26:
Crypto law survey.
- 2013‑02‑26:
Carne Ross's testimony to the Butler inquiry into the invasion of Iraq.
- 2013‑02‑26:
London taxi history.
- 2013‑02‑26:
F*: secure distributed programming with value-dependent types.
- 2013‑02‑26:
The high cost of a biometric identity card to tackle illegal immigration to the USA.
- 2013‑02‑26:
DoJ admits the Aaron Swartz prosecution was political.
- 2013‑02‑26:
Vi Hart explains how to cope with negative comments.
- 2013‑02‑26:
Broken by design: MongoDB fault tolerance.
- 2013‑02‑26:
Dragonfly key exchange.
- 2013‑02‑26:
A closer look at the performance of Google Chrome.
- 2013‑02‑25:
Bypassing Google's two-factor authentication using application-specific passwords.
- 2013‑02‑25:
Exact chaos.
- 2013‑02‑25:
Canada's DNSSEC setup.
- 2013‑02‑25:
The eminently self-evident effectiveness of C.
- 2013‑02‑25:
The unknown robber barons: Internet monopoly in the US.
- 2013‑02‑25:
Pragmatic Unicode.
- 2013‑02‑25:
DANE maakt het PKI-systeem weer veilig en betaalbaar.
- 2013‑02‑25:
CAs will stop issuing X.509 certificates with non-FQDNs 20 years late.
- 2013‑02‑25:
You're wrong and can never be convinced otherwise.
- 2013‑02‑24:
If boys struggle to learn from women... then why?
- 2013‑02‑24:
Changeset evolution: safe and easy history rewrites for Mercurial.
- 2013‑02‑24:
Lessons from the failed war on drugs.
- 2013‑02‑24:
The dark side of C++.
- 2013‑02‑24:
The bonehouse of St Leonard's church.
- 2013‑02‑23:
Redacted: a font to keep your wireframes free of distracting Lorem Ipsum.
- 2013‑02‑23:
Non-existent "bigger than 7/7" plot.
- 2013‑02‑23:
How "golden eagle snatches kid" ruled the Internet.
- 2013‑02‑23:
A tale of two queues: Redis vs ØMQ, Python vs Golang.
- 2013‑02‑23:
DevOps Reactions.
- 2013‑02‑23:
Cyphernomicon: a cypherpunk FAQ.
- 2013‑02‑23:
Using Silk Road, an anonymous drug marketplace based on Tor and Bitcoin.
- 2013‑02‑22:
Bitter pill: medical bills are killing Americans.
- 2013‑02‑22:
You can't use the live UK train data without accepting a gagging clause.
- 2013‑02‑22:
Chrome OS and open source firmware.
- 2013‑02‑22:
Render PDFs on the server with pdf.js and node-canvas.
- 2013‑02‑22:
Amdahl's law in reverse: the wimpy core advantage.
- 2013‑02‑22:
The extraordinary science of addictive junk food.
- 2013‑02‑22:
The Intel MMU fault handling mechanism is Turing complete.
- 2013‑02‑22:
To understand the iOS passcode bug, consider the use case.
- 2013‑02‑21:
Clarifications and implementation notes for DNSSEC.
- 2013‑02‑21:
DNSSEC deployment: the time is now.
- 2013‑02‑21:
The power of two random choices in load balancing.
- 2013‑02‑21:
Going bright: governments should ensure that systems aren't systematically vulnerable.
- 2013‑02‑21:
Going bright: wiretapping without weakening communications infrastructure.
- 2013‑02‑21:
Custom network stack: it goes to 11.
- 2013‑02‑20:
"Server push" already exists, but SPDY server push is better.
- 2013‑02‑20:
Why does everybody have the same MAC address as me?
- 2013‑02‑20:
Medical research fraud almost destroyed the comics industry.
- 2013‑02‑20:
Mandiant APT1 report has critical analytic flaws.
- 2013‑02‑20:
Tweetbot and the updated Twitter display guidelines.
- 2013‑02‑20:
How we hacked Facebook with OAuth2 and Chrome bugs.
- 2013‑02‑20:
Why have the white British left London?
- 2013‑02‑20:
Thug: a low-interaction honeyclient written in Python.
- 2013‑02‑20:
The NYT public editor on Broder's dodgy Tesla test drive.
- 2013‑02‑19:
An update on the Python trademark dispute.
- 2013‑02‑19:
Total functional programming.
- 2013‑02‑19:
The farmer vs. Monsanto: "to suggest that plants just grow themselves is preposterous."
- 2013‑02‑19:
Remote code execution vulnerability on BlackBerry Enterprise Server triggered by handset users viewing TIFFs.
- 2013‑02‑19:
Hackers may have stolen .edu domain passwords.
- 2013‑02‑19:
I can't let you do that, Dave: what it means to design our computers and devices to disobey us.
- 2013‑02‑19:
BBC China crew detained by military after filming 'cyber-warfare headquarters'.
- 2013‑02‑19:
Kids use Tumblr not Facebook.
- 2013‑02‑19:
Underwater ice hockey.
- 2013‑02‑19:
Mouse-driven colour picker.
- 2013‑02‑19:
Double murder trial halted due to "unfairness" of legal aid cuts.
- 2013‑02‑19:
On partial functions in Idris.
- 2013‑02‑19:
Do something useful with those recruiting emails.
- 2013‑02‑19:
The C10M problem.
- 2013‑02‑19:
Power Struggles: revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures.
- 2013‑02‑19:
SEO for scholarship: hacking citation metrics.
- 2013‑02‑19:
Destabilizing the bullying power structure.
- 2013‑02‑19:
Facebook has a problem with women.
- 2013‑02‑19:
Python trademark filer was ignorant of Python.
- 2013‑02‑19:
F**K CAPTCHA
- 2013‑02‑19:
Serious syslog problems?
- 2013‑02‑19:
Tidal Lock: optional static type checking and inference for Lua.
- 2013‑02‑19:
The Chinese army unit behind hacking attacks on US corporate and government targets.
- 2013‑02‑18:
HDCP is dead. Long live HDCP. A peek into the curious world of HDMI copy protection...
- 2013‑02‑18:
Origin of the abbreviation "i18n".
- 2013‑02‑17:
Colony: a JavaScript to Lua source compiler.
- 2013‑02‑17:
New body mass index (BMI).
- 2013‑02‑16:
If Pixar did Star Trek...
- 2013‑02‑16:
Linux kernel 0day: race condition with PTRACE_SETREGS.
- 2013‑02‑16:
Mogridge's law and the speed of urban traffic.
- 2013‑02‑16:
"Hubris": a new documentary reexamines the Iraq war hoax.
- 2013‑02‑16:
Unlawful Deal arms: heraldry gone mad!
- 2013‑02‑16:
The lesson from Poundland: work pays.
- 2013‑02‑16:
Anti-piracy ad uses pirated music.
- 2013‑02‑15:
A rant about CBC-MAC implementation errors.
- 2013‑02‑15:
A comparison between git and Microsoft Team Foundation Server.
- 2013‑02‑15:
Bert's secret-wg DNS calculator supports DNSSEC.
- 2013‑02‑15:
DNS calculator: how NOT to use the DNS!
- 2013‑02‑15:
Using CryptoStick as an HSM.
- 2013‑02‑15:
Ten years ago we marched against the Iraq war and I learned a lesson in betrayal.
- 2013‑02‑15:
Password hashing competition.
- 2013‑02‑15:
Python trademark at risk in Europe.
- 2013‑02‑14:
No compulsory cycle helmets: instead, save lives by encouraging more cycling, making it a safer and more attractive transport option.
- 2013‑02‑14:
The New York Times's most peculiar Tesla test drive.
- 2013‑02‑14:
A Raspberry Pi VAX cluster.
- 2013‑02‑14:
Braess's paradox: building a new road often increases travel time.
- 2013‑02‑14:
TRILL and 802.1aq are like apples and oranges.
- 2013‑02‑13:
Policy-based evidence: Department of Health and Prince's Foundation censor NHS web pages on homeopathy.
- 2013‑02‑13:
Wi-Fi patent troll emerges unscathed from racketeering lawsuit.
- 2013‑02‑13:
Biggest lies of mainstream nutrition.
- 2013‑02‑13:
What is steampunk for?
- 2013‑02‑13:
NSFNET: the partnership that changed the world.
- 2013‑02‑13:
Collective motion of moshers at heavy metal concerts.
- 2013‑02‑13:
Stop pretending cyberspace exists: it's an idea that makes you dumber the moment you learn of it.
- 2013‑02‑12:
LibTech Auditing Cheatsheet: things to look for when auditing extremely high value applications.
- 2013‑02‑12:
The experimental effectiveness of mathematical proof.
- 2013‑02‑12:
PeerJ, eLIFE, OLH: disruptive innovation in academic publishing.
- 2013‑02‑12:
SSLShader: GPU-accelerated TLS proxy.
- 2013‑02‑12:
The school food plan.
- 2013‑02‑12:
Exponentially decaying lists: log scale for lists.
- 2013‑02‑12:
Exponential decay of history: summarize lots of past activity in bounded space.
- 2013‑02‑12:
Ruby on Rails json_class vulnerability.
- 2013‑02‑12:
"When the Pancake Bell rings we are free": Shrove Tuesday in the 1600s.
- 2013‑02‑12:
Canada gives up on its mass Internet surveillance plan.
- 2013‑02‑12:
Workfare breaks anti-slavery laws.
- 2013‑02‑12:
A beautiful thing happens when you project video onto falling snow.
- 2013‑02‑12:
Minecraft: Raspberry Pi edition.
- 2013‑02‑11:
Tweet-sized mathematics problems.
- 2013‑02‑11:
Coordination costs and EU integration.
- 2013‑02‑11:
Gold is a completely false market.
- 2013‑02‑11:
iWantHue: optimally distinct colour palettes for data scientists.
- 2013‑02‑11:
git-crypt: transparent encryption of some files in a git repo.
- 2013‑02‑11:
Effects of bicycle helmet laws on children's injuries.
- 2013‑02‑11:
Intel 82574L packet of death problem due to motherboard manufacturer's bad EEPROM.
- 2013‑02‑11:
Understanding quarternions.
- 2013‑02‑11:
Atmel SAM7XC crypto co-processor key recovery (with bonus Mifare DESFire hack).
- 2013‑02‑11:
No, The Sun, the Court of Appeal and the Human Rights Act are not the EU.
- 2013‑02‑11:
IRMA versus Frau Mustermann: the advantages of attributes over attestation in smart card authorization.
- 2013‑02‑11:
The continuing ITU meltdown.
- 2013‑02‑11:
The design and implementation of Idris, a general purpose dependently typed programming language.
- 2013‑02‑11:
What we know about spreadsheet errors.
- 2013‑02‑10:
The importance of Excel.
- 2013‑02‑10:
Gender bias in mathematics.
- 2013‑02‑10:
Compile brainfuck to ELF relocation instructions.
- 2013‑02‑10:
Mathics: a free, light-weight alternative to Mathematica.
- 2013‑02‑10:
Native Linux KVM host, without QEMU.
- 2013‑02‑10:
php.js: run PHP code in the browser.
- 2013‑02‑10:
Medians and beyond: new aggregation techniques for sensor networks.
- 2013‑02‑10:
Herd immunity demo.
- 2013‑02‑10:
Base64 has a fixed point.
- 2013‑02‑10:
Exploiting Turing-complete DWARF exception handling data.
- 2013‑02‑10:
Patents and innovation: evidence from economic history.
- 2013‑02‑09:
The evolution of Microsoft's data centre designs.
- 2013‑02‑09:
For sale: trusted X.509 root signing certificates.
- 2013‑02‑09:
How the Star Wars traceroute works.
- 2013‑02‑09:
Xerox PARC, Apple, and the creation of the mouse.
- 2013‑02‑09:
NTSB determines origin of 787 battery fire.
- 2013‑02‑09:
LANGSEC: language-theoretic security.
- 2013‑02‑09:
Cultural values versus economic values: how can low-paid workers have compassion to spare, when they are never shown any?
- 2013‑02‑09:
Fast CPU emulation using LuaJIT.
- 2013‑02‑09:
The Elsevier boycott one year on.
- 2013‑02‑09:
Top ten worst graphs.
- 2013‑02‑09:
The defamation bill is now in thrall to a politically motivated Leveson clause.
- 2013‑02‑09:
Going underneath the Albert Memorial.
- 2013‑02‑09:
Remap key bindings on Mac OS X.
- 2013‑02‑09:
The result of pinging all the Internet IP addresses.
- 2013‑02‑08:
Hooked on DTrace.
- 2013‑02‑08:
Remotely exploiting the PHY layer.
- 2013‑02‑08:
Remotely exploitable buffer overflow in libcurl POP3 and SMTP protocol handlers.
- 2013‑02‑08:
What happened to Lego prices.
- 2013‑02‑08:
Up-goer five: Are you, my love, just like a summer's day?
- 2013‑02‑07:
Ember.js, accessibility, WAI-ARIA, and Mac OS X Voice Over.
- 2013‑02‑07:
European court of human rights decides that copyright interferes with the right to freedom of expression.
- 2013‑02‑07:
MySQL character encoding bugs are awesome!
- 2013‑02‑07:
Not a beard: an example of women's technical contributions going unrecognized.
- 2013‑02‑07:
Debating anti-virus with security experts.
- 2013‑02‑07:
The Twist pencil sharpner.
- 2013‑02‑07:
Equal marriage in France.
- 2013‑02‑07:
Open letter to Andrew Turner MP.
- 2013‑02‑07:
The surprising Menger Sponge slice.
- 2013‑02‑06:
Make a BRIC using FUSE and mdadm.
- 2013‑02‑06:
BRIC (Bunch of Redundant Independent Clouds): using Tahoe-LAFS to RAID data across several Dropbox-alikes.
- 2013‑02‑06:
Access to communications data by UK intelligence and security agencies.
- 2013‑02‑06:
Red Hat Bugzilla discussion on another Intel 82574L hardware lockup.
- 2013‑02‑06:
Packets of death.
- 2013‑02‑06:
House of Lords amends the Defamation Bill to include some of Leveson's press regulation recommendations.
- 2013‑02‑06:
Microsoft Surface with Windows 8 Pro: hotter, thicker, faster, louder.
- 2013‑02‑06:
Anatomy of the Mac OS X file: URL crash bug.
- 2013‑02‑06:
Centennial of Markov chains.
- 2013‑02‑06:
UK communications interception plan rests on "pretty heroic assumptions", said director of MI5.
- 2013‑02‑06:
Techno Viking and the curse of Internet celebrity.
- 2013‑02‑05:
Bad Pharma: "In the 1800s we made huge leaps in medicine with clean, clear water. In the 2000s we'll make the same leaps with clean clear information."
- 2013‑02‑05:
No-fly lists: A new tactic of exile?
- 2013‑02‑05:
Basketball trick shot video of Titus, aged 1.5 - 2. (YouTube)
- 2013‑02‑05:
Function types in Golang.
- 2013‑02‑05:
Civilized Discourse Construction Kit.
- 2013‑02‑05:
The case against patents.
- 2013‑02‑05:
SMACK: static checker for C/C++ programs.
- 2013‑02‑05:
Fractal high precision deep zoom technical info.
- 2013‑02‑05:
British Beer and Pub Association seeks judicial review against Cambridge City Council's pro-pub planning policy.
- 2013‑02‑05:
People of Timbuktu saved 95% of manuscripts from invaders.
- 2013‑02‑05:
Magdalene laundries report to be published.
- 2013‑02‑05:
The Bun Shop to reopen as the Cambridge Brew House.
- 2013‑02‑05:
InterNyet: why the Soviet Union did not build a nationwide computer network.
- 2013‑02‑05:
Programming language checklist.
- 2013‑02‑05:
Pakistan domain registry hacked again: 23000 domains affected.
- 2013‑02‑05:
The Roman Catholic church's convenient morality.
- 2013‑02‑04:
Ross Anderson's "Security Engineering" now available free online.
- 2013‑02‑04:
The trouble with Wall Street: the "shocking" news that Goldman Sachs is greedy.
- 2013‑02‑04:
YAML remote code execution is not limited to Rails or Ruby.
- 2013‑02‑04:
Poynton's stunningly successful shared space scheme on a trunk road junction in the village centre. (YouTube)
- 2013‑02‑04:
Submarine cable map 2013.
- 2013‑02‑04:
Even more delays to the botched Digital Economy Act.
- 2013‑02‑04:
$25 Raspberry Pi Model A now for sale in Europe.
- 2013‑02‑04:
Going from suck to non-suck as a public speaker.
- 2013‑02‑04:
Too fast to fail: is high-speed trading the next Wall Street disaster?
- 2013‑02‑04:
Malvertising campaigns at multiple ad networks invoke Black Hole exploit kit.
- 2013‑02‑04:
Notes on redesigning the Rust runtime.
- 2013‑02‑04:
List of unusual deaths.
- 2013‑02‑04:
Comparing popular and formal scientific writing using Bill Bryson and Simon Peyton Jones as examples.
- 2013‑02‑04:
Geeks are the new guardians of our civil liberties.
- 2013‑02‑04:
A clock referenced to mc^2/ℏ would enable high-precision mass measurements and a fundamental definition of the second.
- 2013‑02‑04:
eSTREAM: the ECRYPT stream cipher project.
- 2013‑02‑04:
How to unlearn economics.
- 2013‑02‑04:
Attack of the week: TLS timing oracles.
- 2013‑02‑04:
Lucky Thirteen attack on TLS CBC.
- 2013‑02‑04:
The distress of the privileged.
- 2013‑02‑04:
Who firebombed London's oldest anarchist bookshop?
- 2013‑02‑04:
How to win arguments by pretending to be a simpleton.
- 2013‑02‑04:
Swiss love affair with rail turns sour.
- 2013‑02‑04:
A map of world alcohol consumption.
- 2013‑02‑04:
Welfare fraud is a drop in the ocean compared to tax avoidance.
- 2013‑02‑04:
Knocking on private back doors with the web browser.
- 2013‑02‑04:
How not to layout cycle parking.
- 2013‑02‑04:
Patent troll sues creator of X-Plane flight simulator for using standard Android copy protection.
- 2013‑02‑04:
Vestas SailRocket 2: How a boat-plane hybrid shattered the sound barrier of sailing.
- 2013‑02‑03:
The robustness principle is a bad idea.
- 2013‑02‑03:
Microsoft cannibalizes ARM Surface RT to boost Intel Surface Pro.
- 2013‑02‑03:
Google two-factor authentication myths and realities.
- 2013‑02‑03:
Authenticated encryption in practice.
- 2013‑02‑02:
How profilers lie: the cases of gprof and KCachegrind.
- 2013‑02‑02:
UK government has spent over £400 million on invasive communications interception before it becomes law.
- 2013‑02‑02:
The PNG image file format is now more popular than GIF.
- 2013‑02‑02:
DNSSEC: what every sysadmin should be doing to keep things working.
- 2013‑02‑01:
A brief chronology of TLS attacks and weaknesses.
- 2013‑02‑01:
Obree's bike includes part of a cooking pot.
- 2013‑02‑01:
Graeme Obree is building a bike for a human-powered speed record attempt.
- 2013‑02‑01:
Hard questions about quantum crypto and quantum computing.
- 2013‑02‑01:
Quantum crypto still not proven, claim Cambridge experts.
- 2013‑02‑01:
Shapecatcher: draw the Unicode character you want.
- 2013‑02‑01:
IPMI: freight train to hell.
- 2013‑01‑31:
The colour of London's commute.
- 2013‑01‑31:
Git support in Microsoft Visual Studio.
- 2013‑01‑31:
Who knows what is in a placebo?
- 2013‑01‑31:
Routine criminal records checks for job applicants are unlawful.
- 2013‑01‑31:
iOS security.
- 2013‑01‑31:
39% of web sites run PHP.
- 2013‑01‑31:
Performance of the SIMON and SPECK families of lightweight block ciphers.
- 2013‑01‑31:
The stupid cookie law is dead at last.
- 2013‑01‑30:
V.90 modem handshake diagram.
- 2013‑01‑30:
Copyleft Next.
- 2013‑01‑30:
Post-open-source software: a rejection of copyright, licensing, and permission culture.
- 2013‑01‑30:
MAKE me a sandwich: shouty sudo for zsh.
- 2013‑01‑30:
The mechanized art of coffee: no barista?
- 2013‑01‑30:
If you can't manage comments well, don't offer comments at all.
- 2013‑01‑30:
If your website's full of assholes, it's your fault.
- 2013‑01‑30:
Commenting threads: good, bad, or not at all.
- 2013‑01‑30:
Haskell: IO inside.
- 2013‑01‑30:
The USA has discovered Eduroam.
- 2013‑01‑30:
Boeing's 787 problems run deeper than outsourcing.
- 2013‑01‑30:
Elon Musk explains why the Boeing 787 batteries are fundamentally unsafe.
- 2013‑01‑30:
Raspberry Jam event news registration page.
- 2013‑01‑30:
Git: a nightmare of mixed metaphors.
- 2013‑01‑30:
Nearly 5 years after Kaminsky's DNS flaw was discovered, few domains have deployed DNSSEC.
- 2013‑01‑29:
Third World Problems.
- 2013‑01‑29:
Bangladesh gains a terrestrial Internet link via India.
- 2013‑01‑29:
Down, by law: the damage being done to the legal system in England and Wales.
- 2013‑01‑29:
23 million IP addresses with remotely exploitable uPnP.
- 2013‑01‑29:
Fun with INT_MIN divided by -1.
- 2013‑01‑28:
Courier Prime: like Courier, but better. (Polishing a turd?)
- 2013‑01‑28:
Computer programming languages are not copyrightable, says High Court judge in SAS vs WPL ruling.
- 2013‑01‑28:
Virtual Pickett N4-ES slide rule.
- 2013‑01‑28:
How to think about OAuth.
- 2013‑01‑28:
Verified LISP implementations on ARM, x86 and PowerPC.
- 2013‑01‑28:
You and your research and the elements of style.
- 2013‑01‑28:
How Gingrich changed Washington.
- 2013‑01‑28:
Cambridge, cabs, and Copenhagen: establishing the study of existential risk.
- 2013‑01‑28:
Fuzzy fingerprints: attacking vulnerabilities in the human brain.
- 2013‑01‑28:
NHS spending has been cut, Tories forced to admit.
- 2013‑01‑28:
Raspberry Pi NTP server image.
- 2013‑01‑28:
Historians argue open access pay-to-publish gives too much power to university administrators.
- 2013‑01‑28:
Secret trials are neither just nor secure.
- 2013‑01‑28:
VulnHub: vulnerable virtual machine images for you to practise pentesting.
- 2013‑01‑28:
New tools and daemons in NetBSD 6.0.
- 2013‑01‑28:
Unattached: emailed links are better than attachments.
- 2013‑01‑28:
Workfare contractors refer to the disabled as "lying thieving bastards".
- 2013‑01‑28:
German children enjoy far more everyday freedom than their English peers.
- 2013‑01‑28:
A farewell to bioinformatics.
- 2013‑01‑28:
Considering MySQL? Use something else.
- 2013‑01‑28:
How Newegg crushed the "shopping cart" patent and saved online retail.
- 2013‑01‑27:
Bad pharma: drug research is riddled with half truths, omissions, and lies.
- 2013‑01‑26:
History of Arabic type.
- 2013‑01‑26:
Nasri Khattar's journey in Arabic typography.
- 2013‑01‑26:
Raspberry Pi AirPlay receiver.
- 2013‑01‑26:
What turned Jaron Lanier against the web?
- 2013‑01‑26:
AtFAB: furniture designs for laser cutters.
- 2013‑01‑26:
uscrypt: a Golang interface to the memory-hard key derivation function scrypt.
- 2013‑01‑26:
The inside story of SQL Slammer.
- 2013‑01‑26:
Apple Core Rot: : OS X is not getting more reliable and more stable, it is instead developing more and nastier problems.
- 2013‑01‑26:
Flowchart: Choosing an open source license.
- 2013‑01‑26:
If everyone just dressed appropriately for the weather, we wouldn't have to heat or cool buildings as much.
- 2013‑01‑26:
Antigua government to launch WTO-approved pirate website in retaliation for US gambling ban.
- 2013‑01‑25:
Verisign is considering enforcing its patents against other DNS registries.
- 2013‑01‑25:
C and C++ aren't future-proof.
- 2013‑01‑25:
Láadan: a feminist artificial natural language.
- 2013‑01‑25:
GitHub search down after crypto keys exposed.
- 2013‑01‑25:
Tips to accelerate TLS.
- 2013‑01‑25:
Magnus Manske day at the Sanger Institute: why Mediawiki was written in PHP.
- 2013‑01‑25:
Henry VIII's wine cellar's journey into the bowels of the Ministry of Defence.
- 2013‑01‑25:
Why everyone eventually hates Maven, or, contextual vs composable, or frameworks vs libraries.
- 2013‑01‑24:
The true power of PCRE regexes.
- 2013‑01‑24:
Strunk and White: fifty years of stupid grammar advice.
- 2013‑01‑24:
BEGIN RSA PRIVATE KEY
- 2013‑01‑24:
Can DNS be protected from spikes in attacks? GCN needs to learn about BIND and NSD RRL.
- 2013‑01‑23:
Megafail: the danger of using CBC-MAC inappropriately.
- 2013‑01‑23:
Turn the Raspberry Pi into an FM transmitter with a 20cm wire and some software.
- 2013‑01‑23:
A new publishing model for computer science.
- 2013‑01‑23:
EU data retention directive on the ropes?
- 2013‑01‑23:
Olimex A10S OLinuXino: another little ARM box.
- 2013‑01‑23:
Cubieboard: another little ARM box.
- 2013‑01‑23:
University of Cambridge Computing Service major infrastructure projects 2013-4.
- 2013‑01‑23:
How can I explain LaTeX to my grandma?
- 2013‑01‑23:
A close look at how Oracle repeatedly tries to install crapware with Java updates.
- 2013‑01‑23:
Disabling Java in Internet Explorer is unreasonably difficult.
- 2013‑01‑23:
Those who give away copyright in their research to paywalled journals are the victims not the perpetrators.
- 2013‑01‑23:
MIDI from the inside.
- 2013‑01‑23:
ITU WCIT was all about anti-US international politics, not network regulation.
- 2013‑01‑23:
Seven EU myths you should never believe.
- 2013‑01‑23:
How academia betrayed Aaron Swartz.
- 2013‑01‑22:
Squaring the square, in stained glass.
- 2013‑01‑22:
Excel induced banking failure.
- 2013‑01‑22:
Hackers take over MIT's DNS in revenge for Aaron Swartz.
- 2013‑01‑22:
Type-level selection sort in Scala.
- 2013‑01‑22:
The 30th anniversary of MIDI.
- 2013‑01‑22:
Assembled Gertboard for Raspberry Pi now for sale from element14.
- 2013‑01‑22:
Mackerel taken off conservationists' 'fish to eat' list.
- 2013‑01‑22:
For years EMI has used giveaway MP3s as a promotional tool to increase sales.
- 2013‑01‑22:
Google declares war on the password.
- 2013‑01‑22:
What the future without passwords will look like.
- 2013‑01‑22:
Mike Hearn / Google: abuse at scale.
- 2013‑01‑22:
The primary design principle of Google's login risk analysis system is to move users gently into the post-password age.
- 2013‑01‑22:
Smalltalk / Haskell / Lisp.
- 2013‑01‑22:
Constant time (table-free) AES bitslice implementation.
- 2013‑01‑22:
Fast elliptic curve cryptography in OpenSSL.
- 2013‑01‑22:
Ham Sandwich Nation: due process when everything is a crime.
- 2013‑01‑22:
Apple, Google and Microsoft still don't understand new TLDs.
- 2013‑01‑22:
Intel Silicon Photonics (another Light Peak successor) touted for splitting up server chassis.
- 2013‑01‑22:
The "quite rubbish" Raspberry Pi QR code clock.
- 2013‑01‑22:
Bringing your religious beliefs to work: what are the limits?
- 2013‑01‑22:
Liberty intervenes in case of autistic child heavily restrained by Met Police.
- 2013‑01‑22:
IMF says deterioration of UK balance of payments deficit 1970s - 2007 explained by rise in inequality.
- 2013‑01‑22:
An implementation of Judy Arrays in 1250 lines of C.
- 2013‑01‑22:
Do the outline after the writing.
- 2013‑01‑22:
Proper data and analysis on the effect of interruptions on programmers.
- 2013‑01‑22:
The non-binary relationship between gender and linguistic style on Twitter.
- 2013‑01‑22:
UK parliamentary cycling inquiry could have important effects on the future of cycling in the UK.
- 2013‑01‑22:
Andrew "weev" Auernheimer's pre-sentencing statement of responsibility.
- 2013‑01‑22:
Copyright law around the world has developed to become an obstacle to scientific research.
- 2013‑01‑22:
Company offers scholarship to student who was expelled after finding security bug in their software.
- 2013‑01‑22:
UK schools' national cipher challenge winners announced.
- 2013‑01‑22:
Lead and crime: Plumb crazy?
- 2013‑01‑22:
Rust's new borrow check (pointer aliasing) in a nutshell.
- 2013‑01‑21:
Status of HTTP pipelining in Google Chrome.
- 2013‑01‑21:
Internet Explorer vs murder rate.
- 2013‑01‑21:
Charles and Ray Eames for Polaroid, 1972. (Video)
- 2013‑01‑21:
The map of the Underground that was and could have been.
- 2013‑01‑21:
Cambs police commissioner Graham Bright proposes to break manifesto promise by increasing council tax.
- 2013‑01‑21:
The proposed getdns API.
- 2013‑01‑21:
Why the price of Raspberry Pi matters.
- 2013‑01‑21:
Almonds have 20% fewer dietary calories than previously thought.
- 2013‑01‑21:
Identifying the DNS server used to fulfill an HTTP request.
- 2013‑01‑21:
How Erlang does scheduling.
- 2013‑01‑21:
Secret key crypto disasters.
- 2013‑01‑21:
ASLR implementation in Linux 3.7.
- 2013‑01‑21:
How to share computer system usage data with academics.
- 2013‑01‑21:
Authenticated encryption using AES-GCM: a 50,000 foot view.
- 2013‑01‑21:
Authenticated encryption and how not to get caught chasing a coyote.
- 2013‑01‑21:
Student expelled from college for reporting security bug that compromised 250,000 students personal data.
- 2013‑01‑21:
When it comes to cycling as everyday transport the UK is so far down the table it's almost scary.
- 2013‑01‑21:
Things learned by writing Chimp's garbage collector.
- 2013‑01‑21:
Josh Nimoy's graphics art for Tron Legacy, featuring Emacs.
- 2013‑01‑20:
Aaron Swartz helped us realise the importance and effectiveness of lobbying for civil liberties online.
- 2013‑01‑20:
Defeating AES without a PhD. "I thought AES was safe. What should I use instead?"
- 2013‑01‑20:
Why can't BBC News 24 do LONG EXPLAINERS instead of repetition?
- 2013‑01‑20:
Publishing a scientific paper without the code is not enough.
- 2013‑01‑20:
Oxford college sued for using 'selection by wealth' for unfunded postgraduate courses.
- 2013‑01‑20:
Solihull court handed down £35 fine for killing cyclist, and £110 fine for bumping a parked car.
- 2013‑01‑20:
JK Rowling gave so much to charity she lost her billionaire status.
- 2013‑01‑19:
If Dr. Seuss books were titled according to their subtexts.
- 2013‑01‑19:
Investors do the opposite of what rational expectations models suggest they should do.
- 2013‑01‑19:
The serif readability myth.
- 2013‑01‑19:
Medical privacy considered harmful?
- 2013‑01‑19:
We must choose privacy or medical breakthroughs.
- 2013‑01‑18:
Why do we have ten fingers?
- 2013‑01‑18:
Mathematicians aim to take the publishers out of academic publishing.
- 2013‑01‑18:
Readable Lisp S-expressions.
- 2013‑01‑18:
Fast packed string matching for short patterns.
- 2013‑01‑17:
"Losing My Religion" adjusted to a major key. (Vimeo)
- 2013‑01‑16:
Doctors and patients can usually see through the blinding in placebo-controlled drug trials.
- 2013‑01‑16:
Police demand DNA samples from gay men.
- 2013‑01‑16:
HAIR: Hierarchical Architecture for Internet Routing.
- 2013‑01‑16:
A very curmudgeonly view of the IETF.
- 2013‑01‑16:
How to extract your download history from the Mac OS X launcher quarantine database.
- 2013‑01‑16:
Deploying a new hash algorithm.
- 2013‑01‑16:
The routing security battles intensify.
- 2013‑01‑16:
The Second Amendment was ratified to preserve slavery.
- 2013‑01‑16:
The RIRs are ITU-T wannabes who represent the interests of self-perpetuating organizational fiefdoms.
- 2013‑01‑15:
19-year-old activist Zack Kopplin is making life hell for Louisiana's creationists
- 2013‑01‑15:
Aaron Swartz memorial JSTOR liberator released by Archive Team.
- 2013‑01‑15:
The USA's enthusiasm for torture and illegal war.
- 2013‑01‑15:
CESAR: competition to develop an authenticated cipher.
- 2013‑01‑15:
Carrier-grade NAT breakage spreads beyond mobile ISPs.
- 2013‑01‑15:
Sandy Hook truthers.
- 2013‑01‑15:
UK drugs policy encourages people to try experimental new narcotics.
- 2013‑01‑15:
Hiding bugs in code even when its tests have complete branch coverage.
- 2013‑01‑15:
Tunlr: access geo-restricted content from foreign countries without a VPN.
- 2013‑01‑14:
Effective Scala.
- 2013‑01‑14:
FBI's Scientology investigation: balancing the First Amendment with charges of abuse and forced labor.
- 2013‑01‑14:
The .CZ domain celebrates its 20th birthday.
- 2013‑01‑14:
Notes on distributed systems for young bloods.
- 2013‑01‑14:
Cycling and the law.
- 2013‑01‑14:
Feminists don't need to police the borders of womanhood.
- 2013‑01‑14:
On Julie Burchill, hatred, and a massive crisis of empathy.
- 2013‑01‑14:
Science, dogma, genetically engineered crops, and Mark Lynas.
- 2013‑01‑14:
Guerilla open access manifesto.
- 2013‑01‑14:
Feds crack down on medical marijuana.
- 2013‑01‑13:
E-luminate Cambridge festival: highlighting clean tech. (February)
- 2013‑01‑13:
Bolivia gains exemption from international narcotics convention for the right to chew coca leaves.
- 2013‑01‑13:
What really powers innovation: high wages.
- 2013‑01‑13:
Live action Toy Story. (YouTube)
- 2013‑01‑13:
Compressorhead: a heavy metal band made of metal.
- 2013‑01‑13:
Building a wireless network for a high density of users.
- 2013‑01‑12:
Redacted torture evidence shows secret courts use "security" to hide political embarrassment.
- 2013‑01‑11:
Should public authorities be able to sue for libel?
- 2013‑01‑11:
Periodic password change myths.
- 2013‑01‑11:
Scalable NDN (named data network) forwarding.
- 2013‑01‑11:
Your gadgets are slowly breaking the Internet.
- 2013‑01‑11:
Textbook publishers claim copyright in tables of contents in order to suppress free educational material.
- 2013‑01‑11:
DNS response policy zones as an anti-spam tool.
- 2013‑01‑10:
The unreasonable effectiveness of C.
- 2013‑01‑10:
Mining your Ps and Qs: detection of widespread weak keys in network devices.
- 2013‑01‑10:
How to fold a Julia fractal: a tale of numbers that like to turn. (WebGL)
- 2013‑01‑10:
The war on terror, by design, can never end.
- 2013‑01‑10:
Notes on a putative BrowserID GSS-API mechanism.
- 2013‑01‑10:
NSFnet and the popularization of the Internet.
- 2013‑01‑10:
Five American misconceptions about healthcare in the civilized world.
- 2013‑01‑09:
Verisign's stupid patent applications for the use of HSMs in DNSSEC.
- 2013‑01‑09:
Cryptographic key length recommendations.
- 2013‑01‑09:
Rob Hansen's crypto FAQ.
- 2013‑01‑09:
Stealing laundry detergent to pay for drugs.
- 2013‑01‑09:
Serialization mischief in Ruby on Rails.
- 2013‑01‑09:
Trinity College New Court energy efficiency upgrade approved by planning committee.
- 2013‑01‑09:
Australian do-not-call register operator fined for do-not-call violations.
- 2013‑01‑08:
Creative Commons "non-commercial" licences are often a bad choice.
- 2013‑01‑08:
Accidentally stealing the Internet: BGP and MitM attacks.
- 2013‑01‑08:
Mail (MX) server survey January 2012.
- 2013‑01‑08:
The government responds to a West Coast Main Line bid from a toy company.
- 2013‑01‑08:
The myth of Tamiflu.
- 2013‑01‑08:
Efficient in-memory indexing with generalized prefix trees.
- 2013‑01‑08:
The adaptive radix tree: ARTful indexing for main-memory databases.
- 2013‑01‑08:
Burst tries: a fast, efficient data structure for string keys.
- 2013‑01‑08:
HAT-trie: a cache-conscious trie-based data structure for strings.
- 2013‑01‑08:
Video of Apollo Robbins pickpocketing.
- 2013‑01‑08:
Matters computational.
- 2013‑01‑07:
The architecture of open source applications: nginx.
- 2013‑01‑07:
A really teensy ELF executable for Linux.
- 2013‑01‑07:
Hammer: bitwise parser combinators in C.
- 2013‑01‑07:
Silence of the labs: Canadian government scientists cannot speak without public relations approval.
- 2013‑01‑07:
An interview with the Republican staffer who was fired for writing a sensible copyright memo.
- 2013‑01‑07:
A world without consent.
- 2013‑01‑07:
Raspberry Pi stratum 1 NTP server: accurate timekeeping at low cost.
- 2013‑01‑07:
The demise of desktop antivirus.
- 2013‑01‑07:
Pain of the new: on high-frame-rate movies.
- 2013‑01‑07:
The incredible shrinking public domain.
- 2013‑01‑07:
An opinionated guide to Scheme implementations.
- 2013‑01‑07:
Verisign Labs DANE demonstration.
- 2013‑01‑07:
Keep using antiquated metaphors in icons.
- 2013‑01‑07:
The Norwegian model of EU non-membership simply wouldn't work for the UK.
- 2013‑01‑07:
UK research councils have stopped giving grants for standalone postgraduate taught master's degrees.
- 2013‑01‑07:
Two factor federated authentication for SURFnet.
- 2013‑01‑07:
Leveson is being subverted by Cameron.
- 2013‑01‑07:
Lego Mindstorms EV3 announced.
- 2013‑01‑07:
A simple string-to-float function showing how beautiful rust's pattern matching is.
- 2013‑01‑07:
Google starts reporting false DMCA takedown requests.
- 2013‑01‑07:
Rape has a purpose.
- 2013‑01‑07:
English word and letter frequency counts: Mayzner revisited.
- 2013‑01‑07:
A grab bag of Git tricks.
- 2013‑01‑07:
How not to catch the norovirus.
- 2013‑01‑07:
How to start a root X.509 certification authority.
- 2013‑01‑07:
Videogames: let girls be girls.
- 2013‑01‑07:
High-performance garbage collection in Rust.
- 2013‑01‑07:
Brute forcing a GPS PIN with a robot built from spare parts.
- 2013‑01‑06:
Padding oracle attacks in depth.
- 2013‑01‑06:
A five-year-old Wikipedia hoax has finally been identified and deleted.
- 2013‑01‑06:
Objects at a negative temperature behave as if they are hotter than objects at a positive temperature.
- 2013‑01‑06:
Disney freaks out about sale of 3D movie conversion patents.
- 2013‑01‑05:
Cally Soukup's list of Nicoll Events.
- 2013‑01‑05:
British vs. American politics in minimalist vintage infographics.
- 2013‑01‑05:
Black and Whitey: how the Feds deny the accused a fair trial.
- 2013‑01‑04:
News about development of the Tux3 filesystem.
- 2013‑01‑04:
CIA torturers object to their war crimes being displayed in an American propaganda film.
- 2013‑01‑04:
Android blocks on /dev/random a lot.
- 2013‑01‑04:
Microsoft security advisory on the Turktrust certificate authority failure.
- 2013‑01‑04:
Linotype: the film.
- 2013‑01‑04:
Support for benefit cuts depends on prejudice and ignorance.
- 2013‑01‑04:
What should you really be afraid of?
- 2013‑01‑04:
A thorough writeup of the Turktrust certificate authority failure.
- 2013‑01‑04:
More about crit-bit trees.
- 2013‑01‑04:
Crit-bit trees.
- 2013‑01‑04:
The PHP equality operator == is the weirdest and most overused comparison operator in popular programming languages.
- 2013‑01‑04:
Nevin's papers relating crime and exposure to lead in petrol.
- 2013‑01‑04:
Data structure lock-in: why the computer is so slow.
- 2013‑01‑04:
If asked "What is a Giraffe?", Google Now finishes the description with "he now praises the iPad".
- 2013‑01‑04:
Negative temperature.
- 2013‑01‑04:
Crossbear: identifying / locating / tracing TLS MITM attacks.
- 2013‑01‑04:
foauth.org: OAuth for one.
- 2013‑01‑04:
Elderly should do community work or lose pension, says ex-chief of benefits agency.
- 2013‑01‑04:
The Labour Party's enthusiasm for incommunicado house arrest and internal exile.
- 2013‑01‑04:
Helmet Oddity: a supercut of space helmets in movies.
- 2013‑01‑04:
FuckItJS: JavaScript error steamroller.
- 2013‑01‑04:
The correlation between lead in petrol and violent crime.
- 2013‑01‑04:
When William Shatner tweeted at an astronaut.
- 2013‑01‑04:
Details of the TURKTRUST fraudulent digital certificates.
- 2013‑01‑03:
Unofficial colour recovery wiki.
- 2013‑01‑03:
The surprising subtleties of zeroing a register.
- 2013‑01‑03:
Mozilla suspends process for adding new TURKTRUST CA cert to trusted list.
- 2013‑01‑03:
Rats laugh when you tickle them. (YouTube)
- 2013‑01‑03:
Google detected a bogus X.509 certificate for *.google.com chaining back to a Turkish certificatation authority.
- 2013‑01‑03:
LLVM.js
- 2013‑01‑03:
Differences between marriages and civil partnerships.
- 2013‑01‑03:
Vigil: a very safe programming language with supreme moral vigilance.
- 2013‑01‑03:
Irish DNS registry was compromised via its website.
- 2013‑01‑03:
Norovirus deserves respect.
- 2013‑01‑03:
Algorithmic voting districts as a cure for gerrymandering.
- 2013‑01‑03:
Maths gear.
- 2013‑01‑03:
The known unknowns of Skype interception.
- 2013‑01‑03:
Non-transitive dice.
- 2013‑01‑03:
Non-deterministic JavaScript ParallelArray operations.
- 2013‑01‑02:
Trolls with patents on network scanner/copier/printers are shaking down small and mid-sized businesses for $1000 per employee.
- 2013‑01‑02:
Sleep better. Eat less sugar. Lift heavy things.
- 2013‑01‑02:
ITU leased line interconnection restrictions and the birth of the commercial Internet.
- 2013‑01‑02:
Vaccination matters, and hippies and conspiracy theorists who say otherwise are dangerous.
- 2013‑01‑02:
Measles: a dangerous illness, by Roald Dahl.
- 2013‑01‑02:
The process myth.
- 2013‑01‑02:
Ending sexism in hacker culture: a work in progress.
- 2013‑01‑02:
How complex systems fail.
- 2013‑01‑02:
Kyoto Protocol aimed for 5% cut in carbon emissions; instead, we got a 58% increase.
- 2013‑01‑01:
Which country is the best in which to be born?
- 2013‑01‑01:
Z: A tiny, strict, impure, curried, dynamically typed language with rather peculiar syntax.
- 2013‑01‑01:
Chomsky and the two cultures of statistical learning.
- 2013‑01‑01:
30 Years of TCP, and IP on everything!
- 2013‑01‑01:
The 30th birthday of the Internet.
- 2013‑01‑01:
Correlation without causation.
- 2013‑01‑01:
Antivirus software is often not very good at stopping viruses.
- 2013‑01‑01:
x86 IDIV DoS.
- 2013‑01‑01:
The spectacular thefts of Apollo Robbins, pickpocket.
- 2013‑01‑01:
Hello, JIT world! The joy of simple JITs and LuaJIT DynASM.
- 2013‑01‑01:
Australian ISP iiNet walks out of piracy talks: "We're not the internet police".
- 2012‑12‑31:
Nobel winner slates Britain's 'stupid' immigration reforms.
- 2012‑12‑31:
How multi-disk failures happen.
- 2012‑12‑31:
Road safety statistics for Cambridge, 2009-2011.
- 2012‑12‑31:
Testing Golang on the Raspberry Pi running FreeBSD.
- 2012‑12‑31:
Extraordinary rendition verdict in the European court of human rights.
- 2012‑12‑31:
RJSON: compress JSON to JSON.
- 2012‑12‑31:
Food science secrets of chocolate.
- 2012‑12‑31:
Please god, save the British economy.
- 2012‑12‑31:
Santa Claus on science fiction and superhero magazine covers.
- 2012‑12‑31:
Rethinking the value of Scrabble tiles.
- 2012‑12‑31:
Fleeing Google.
- 2012‑12‑31:
Progressive JPEGs are better in many ways.
- 2012‑12‑30:
Snopes on exploding non-borosilicate US Pyrex.
- 2012‑12‑30:
2012: the year in sexism.
- 2012‑12‑30:
FluxBuster: detecting fast-flux botnets via large-scale passive DNS traffic analysis.
- 2012‑12‑30:
Hacking the brains of other people with API design. (Fault injection to enforce error handling.)
- 2012‑12‑30:
Dangerous shattering occurs because Pyrex no longer implies borosilicate glass.
- 2012‑12‑30:
Mo Farah was held by US customs on suspicion of being a terrorist.
- 2012‑12‑30:
FBI and Wall St joined in totally integrated corporate-state repression of dissent.
- 2012‑12‑30:
Cartoons: Triumph of the nerds.
- 2012‑12‑30:
French McDonald's employees assault man for using an augmented reality device.
- 2012‑12‑30:
Alan O'Donohoe's successful year promoting computer science in schools.
- 2012‑12‑30:
If you get a GEIL / Golden Eye / Ben Dover / BDP file-sharing letter, you need to read this.
- 2012‑12‑30:
Sereal: a binary data serialization format with support for Perl data types.
- 2012‑12‑30:
Hash-flooding DoS attacks and defences.
- 2012‑12‑30:
Accurate time with a Raspberry Pi and Venus638FLPx.
- 2012‑12‑29:
'Pure, White and Deadly' copyright problems delayed republication in USA.
- 2012‑12‑29:
Is sugar the next tobacco?
- 2012‑12‑29:
English Heritage objects to environmental efficiency refit of Trinity College's New Court.
- 2012‑12‑29:
£1.8bn 'snooper's charter' fails to get Treasury backing.
- 2012‑12‑29:
U.K. Crown Prosecution Service guidelines for prosecuting people for making jokes on Twitter.
- 2012‑12‑29:
The Raspberry Pi gang remember Chris Lightfoot.
- 2012‑12‑29:
IPCC's 1990 climate projections are on target so far.
- 2012‑12‑29:
NZ government will be exposed to secret international tribunals by the TPP treaty.
- 2012‑12‑29:
Linux now on 42% of consumer computing devices. Happy birthday Linus!
- 2012‑12‑29:
Down with toy apartheid!
- 2012‑12‑29:
Increasingly partisan US politics means shifts in congress are becoming less likely.
- 2012‑12‑29:
W3C JavaScript browser crypto API: the anatomy of a bad idea.
- 2012‑12‑29:
Intellectual monopoly and censorship.
- 2012‑12‑29:
What really happened to Sony and Universal's 2 billion missing YouTube views.
- 2012‑12‑29:
How to publish PGP keys in the DNS.
- 2012‑12‑28:
Google catches music industry gaming their YouTube viewing numbers.
- 2012‑12‑28:
TCP incast: overloading switches by synchronised requests to many servers.
- 2012‑12‑28:
sshttp: hide ssh behind same port as web or mail server.
- 2012‑12‑28:
Inky: cloud-enabled desktop mail app.
- 2012‑12‑28:
Network maintenance led to cascade failure and extended downtime at GitHub.
- 2012‑12‑27:
Advice for US entrepreneurs who move to Europe.
- 2012‑12‑27:
Calling stumps at the ITU WCIT: win, lose, or draw?
- 2012‑12‑27:
The Tip of the Spear: investigating Scientology 25 years ago.
- 2012‑12‑27:
Britain from above: help describe historic aerial photographs.
- 2012‑12‑26:
Robots will take all our jobs / the seven stages of robot replacement.
- 2012‑12‑26:
Minnesota Vikings briefly considered demolishing Minneapolis's primary Internet hub to extend their stadium.
- 2012‑12‑26:
Style guide for comparisons in conditional expressions.
- 2012‑12‑26:
BLAKE2: a smaller faster cryptographic hash function based on the SHA-3 finalist BLAKE.
- 2012‑12‑26:
sslh: run ssh and https servers on the same port.
- 2012‑12‑26:
Generating a non-repeating random sequence of integers.
- 2012‑12‑26:
The Queen first sent an email in 1976.
- 2012‑12‑26:
Are mass shootings really random events? A look at the US numbers.
- 2012‑12‑26:
Fun facts about Terminator 2: Judgment Day. (Less CGI than I thought!)
- 2012‑12‑26:
Antarctic thaw is twice as bad as previously thought.
- 2012‑12‑25:
Hollywood studios Pirate movies using BitTorrent.
- 2012‑12‑25:
Duelling jingle bells banjos animated xmas light show. (YouTube)
- 2012‑12‑25:
In celebration of the birth of Newton we fire rockets in the air. (YouTube x 2)
- 2012‑12‑25:
30+ cool ideas for your Raspberry Pi.
- 2012‑12‑25:
Bullshit Ipsum.
- 2012‑12‑25:
A little antidote to the Archbishop of Westminster.
- 2012‑12‑25:
Tasselled wobbegong carpet shark.
- 2012‑12‑24:
Who needs god? Against the cosmological argument.
- 2012‑12‑24:
Austerity? Let's call it failure.
- 2012‑12‑23:
Frost Fair: lovely radio programme featuring history, food, drink, science, music, poetry.
- 2012‑12‑23:
Save the London Transport Museum.
- 2012‑12‑23:
European Commission in Holiday season bumper Euromyths special: more lies from the British press.
- 2012‑12‑23:
Inherently violent: why conservatives love war.
- 2012‑12‑22:
Ada 2012 language standard approved by ISO.
- 2012‑12‑22:
Nate Silver confuses cause and effect, and ends up defending financial corruption.
- 2012‑12‑22:
What does randomness look like?
- 2012‑12‑21:
Behind closed doors at the ITU WCIT.
- 2012‑12‑21:
RJ point five double-density ethernet connector.
- 2012‑12‑21:
Completely different: a review of BIND 10.
- 2012‑12‑21:
Conclusions drawn from the RIPE reverse DNS outage in June.
- 2012‑12‑21:
Why the US media ignored Murdoch's brazen bid to hijack the presidency.
- 2012‑12‑21:
Their new graphic novel is a ... terrorist organization?
- 2012‑12‑21:
Ireland realises the recovery of Iceland proves the joke was on them. (Reminds me of an FT article last year.)
- 2012‑12‑21:
America plans Guantanamo Bay prisons for US citizens.
- 2012‑12‑20:
European Commission abandons effort to ratify ACTA.
- 2012‑12‑20:
2LD registrations directly under .uk: not such a great idea.
- 2012‑12‑20:
The Worshipful Company of Clockmakers museum and library.
- 2012‑12‑20:
Health and Safety Executive applies maximum penalty to the UK Border Agency for nearly blowing up Robin Hood Airport.
- 2012‑12‑20:
Mainstream economists still don't get it.
- 2012‑12‑20:
Snow fall: the avalanche at Tunnel Creek. (Fantastic combination of words and moving pictures.)
- 2012‑12‑20:
H+: high-budget apocalyptic sf on YouTube.
- 2012‑12‑20:
From NAND to ТЕТЯІЅ: building a modern computer from first principles.
- 2012‑12‑20:
Academic history journals revolt against open access.
- 2012‑12‑20:
What law allows Downing St to be closed to traffic?
- 2012‑12‑20:
Interactive guide to blog typography.
- 2012‑12‑19:
After saying no at the WCIT: what next for the ITU?
- 2012‑12‑19:
The Internet only just works.
- 2012‑12‑19:
ezwebframe: treat the browser as an Erlang process.
- 2012‑12‑19:
Root nameserver D at the University of Maryland is changing IP address on 3 January 2013.
- 2012‑12‑19:
Fun manipulating News Corp online polls.
- 2012‑12‑19:
Whose bug is this anyway?!?
- 2012‑12‑19:
Irish archbishops speak out against saving the lives of dying pregnant women.
- 2012‑12‑19:
New restrictions on freedom of information requests could make government more secret.
- 2012‑12‑19:
Gun ownership is a powerful predictor of someone's political party in the USA.
- 2012‑12‑18:
Opera TLS Prober survey tool released under Apache 2.0 license.
- 2012‑12‑18:
The Chronos date / time library for Smalltalk.
- 2012‑12‑18:
Corrupt police lied about plebgate and deliberately ruined the government chief whip.
- 2012‑12‑18:
European Union's open source licence to become compatible with GPLv3.
- 2012‑12‑18:
Agatha Christie's The Mousetrap visiting Cambridge in September.
- 2012‑12‑18:
A visit to Cambridge University Press Museum.
- 2012‑12‑18:
ITU Phobia: Why WCIT was derailed.
- 2012‑12‑18:
The NRA's war against gun science.
- 2012‑12‑18:
NSD 4.0 beta: authoritative name server daemon.
- 2012‑12‑18:
What really happened at the ITU WCIT?
- 2012‑12‑18:
The Bill of Rights Commission report: a modest proposal.
- 2012‑12‑18:
Perl: the first twenty-five years.
- 2012‑12‑18:
A Roman Christmas.
- 2012‑12‑18:
The great Bill of Rights commission shambles.
- 2012‑12‑18:
W3C declares HTML5 complete.
- 2012‑12‑18:
The good stuff about cycling in Cambridge.
- 2012‑12‑18:
The UKIP threat is not about Europe.
- 2012‑12‑18:
Two-for-one: Amazon targeted in replacement order scam.
- 2012‑12‑18:
Still passing the hash 15 years later: a review of Microsoft's password hash security white paper.
- 2012‑12‑18:
The false promise of the online education revolution.
- 2012‑12‑18:
How the Indiana Jones package got to the University of Chicago.
- 2012‑12‑18:
New developments in deanonymization.
- 2012‑12‑18:
"Why don't you just...?" Upgrading HTTP to support unordered pipelined responses.
- 2012‑12‑18:
Problems fixed by Scala.
- 2012‑12‑17:
China blocks VPNs with Great Firewall.
- 2012‑12‑17:
Fastbook: a pure HTML5 clone of the Facebook app.
- 2012‑12‑17:
Thoughtcrime unit to be set up by City of London police.
- 2012‑12‑17:
Gun control that works: no guns.
- 2012‑12‑17:
The highlights and low points of the ITU's WCIT.
- 2012‑12‑17:
Hacker News blog recommendations.
- 2012‑12‑16:
Tcl the misunderstood.
- 2012‑12‑16:
Bunnie Huang is building his own laptop.
- 2012‑12‑16:
12 letters that didn't make it into the alphabet.
- 2012‑12‑16:
The quiet Wikideath of BBS history.
- 2012‑12‑16:
MPs write to Public Accounts Committee to request action on hidden trials and Tamiflu.
- 2012‑12‑16:
Dear open source project leader: quit being a jerk.
- 2012‑12‑16:
Bruce Schneier reviews "Against Security: how we go wrong at [...] sites of ambiguous danger" by Harvey Molotch.
- 2012‑12‑16:
Inside an Amazon warehouse.
- 2012‑12‑16:
University of Chicago receives a package for Indiana Jones.
- 2012‑12‑16:
Ole Roemer measured the speed of light in 1676.
- 2012‑12‑16:
The Aggregate bit twiddling hacks and magic algorithms.
- 2012‑12‑15:
Gun control in Japan.
- 2012‑12‑15:
Belle de Jour's history of Anon.
- 2012‑12‑15:
Per-address spanning tree for scalable Ethernet.
- 2012‑12‑15:
Switch your databases to flash storage. Now. Or you're doing it wrong.
- 2012‑12‑15:
A photo history of male affection.
- 2012‑12‑15:
Unwittingly, the special advisor of the secretary for culture, media, and sport has done the press a favour.
- 2012‑12‑14:
Mains hum helps to authenticate recordings.
- 2012‑12‑14:
You're not anonymous. I know your name, email, and company.
- 2012‑12‑14:
Marriage law in Britain.
- 2012‑12‑14:
Milton Friedman's thermostat.
- 2012‑12‑14:
It will never work in theory: software development research that is relevant in practice.
- 2012‑12‑14:
History of security economics.
- 2012‑12‑14:
Authentication is machine learning.
- 2012‑12‑14:
Map of voting systems around the world.
- 2012‑12‑14:
Hash collision attacks against btrfs.
- 2012‑12‑13:
Raspberry Pi and timekeeping with RADclock.
- 2012‑12‑13:
Connecting Cambridgeshire broadband bulletin December 2012.
- 2012‑12‑13:
Microsoft white paper: defending against theft of hashed passwords.
- 2012‑12‑12:
The economic miracle of good television.
- 2012‑12‑12:
USAF wasted $1bn on failed Oracle ERP logistics project.
- 2012‑12‑12:
High-frequency traders profit at the expense of ordinary investors.
- 2012‑12‑12:
How to hack and not get caught.
- 2012‑12‑12:
It's a Death Metal X-Mas.
- 2012‑12‑10:
Why the home affairs select committee is calling for an end to the war on drugs.
- 2012‑12‑09:
Darling: run Darwin binaries on Linux.
- 2012‑12‑09:
The UK should decriminalise prostitution; it has worked in New Zealand.
- 2012‑12‑09:
Early papers on computer security.
- 2012‑12‑09:
Amazing juggling / sleight of hand by Yann Frisch. (YouTube)
- 2012‑12‑09:
The most dangerous equation.
- 2012‑12‑09:
Raspberry Pi web server speed test.
- 2012‑12‑09:
George Boole was killed by homoeopathy.
- 2012‑12‑09:
All you need is love: how to stop terrorists.
- 2012‑12‑09:
The in-game economics of Ultima Online.
- 2012‑12‑09:
Bike, camera, inaction! A barrister tries to prosecute a driver who threatened to kill him.
- 2012‑12‑09:
GravityLight: lighting for developing countries.
- 2012‑12‑08:
Red state, blue city: the urban-rural divide is where America splits.
- 2012‑12‑08:
It's official: austerity economics doesn't work.
- 2012‑12‑08:
Anak Krakatau volcano eruption, September 2012.
- 2012‑12‑08:
What a wonder is emulating a terrible monitor.
- 2012‑12‑07:
The meteoric ascent of the patent troll and the devastating consequences for innovation.
- 2012‑12‑07:
YouTube death toll: over 300 lives wasted watching Gangnan Style.
- 2012‑12‑07:
'Sex for student fees' man unmasked as IT consultant 'with top-level MoD security clearance'.
- 2012‑12‑07:
Why should Strasbourg decide on British human rights?
- 2012‑12‑07:
Three lessons learned while teaching a flipped class.
- 2012‑12‑07:
Falsehoods programmers believe about build systems.
- 2012‑12‑07:
Accessibility for people with anomalous colour vision.
- 2012‑12‑07:
A new era for ghc.
- 2012‑12‑06:
£2 coin and stamps to commemorate the 150th anniversary of the London Underground.
- 2012‑12‑06:
25 GPU monster can crack 14 character Windows XP LM passwords in 6 minutes.
- 2012‑12‑06:
WCIT-12: an opinionated primer and hysteria-debunker.
- 2012‑12‑06:
America's 50 worst state legislatures.
- 2012‑12‑06:
What happens when responsible disclosure fails.
- 2012‑12‑06:
Everyone in the US is under surveillance.
- 2012‑12‑06:
Comparative language fuzz testing: programming languages vs. fat fingers.
- 2012‑12‑05:
Bomb sight: where bombs fell in London during WWII.
- 2012‑12‑05:
NoSQL, CouchDB, and Lotus Notes.
- 2012‑12‑05:
Is English really a Scandinavian language?
- 2012‑12‑05:
The USA's history of saying no to the ITRs.
- 2012‑12‑05:
Top ten budget Cambridge restaurants.
- 2012‑12‑05:
British civil liberties and the human rights act.
- 2012‑12‑05:
Bristol University Christian Union keeps existing ban on women speakers.
- 2012‑12‑05:
"Sender-pays" rule doesn't necessarily increase telecom investment.
- 2012‑12‑05:
Dog vs sweet potato.
- 2012‑12‑05:
Counting heads: 1000+ attend Irish anti-abortion rally.
- 2012‑12‑05:
ITU adopts standard for deep packet inspection traffic snooping.
- 2012‑12‑05:
The ITU's Dubai debacle: does it matter?
- 2012‑12‑04:
Flu vaccines don't work very well.
- 2012‑12‑04:
USA is the only major country not to support treaty covering books for the visually impaired.
- 2012‑12‑04:
Merck staff mocked patients suffering side effect of osteonecrosis.
- 2012‑12‑04:
Uniform function call syntax in the D programming language.
- 2012‑12‑04:
Bristol University's Christian Union bans women from speaking at meetings.
- 2012‑12‑04:
The TeX family tree: LaTeX, pdfTeX, XeTeX, LuaTeX and ConTeXt.
- 2012‑12‑04:
How tall can a Lego tower get?
- 2012‑12‑04:
The ambition myth: debunking a common excuse for the gender wage gap.
- 2012‑12‑04:
Why News Corp's "The Daily" iPad newspaper failed.
- 2012‑12‑04:
Lumi: a new and easy way to find websites that interest you.
- 2012‑12‑04:
Has HTML5 made us more secure?
- 2012‑12‑04:
A Nagios DNS plugin written in Golang.
- 2012‑12‑04:
Barbie construction kit: sexist reasons for less sexist toys.
- 2012‑12‑04:
What was the strangest coding standard rule that you were forced to follow?
- 2012‑12‑04:
Dr Peter Wothers, of Cambridge University's Department of Chemistry, will give the Royal Institution's 2012 Christmas lectures.
- 2012‑12‑04:
The global war on drugs has failed. It is time for a new approach. (JPEG of a letter.)
- 2012‑12‑04:
WCIT off to a flying start. (ITU has given up on sender pays.)
- 2012‑12‑03:
Three little ICANN atrocities that make the ITU look good by comparison.
- 2012‑12‑03:
Why you should be afraid of the UN's plan to regulate the Internet.
- 2012‑12‑03:
A map of non-existent European countries (and how to create your own).
- 2012‑12‑03:
Movie studios ask Google to censor legit movie pages on Amazon, Facebook, Wikipedia, etc.
- 2012‑12‑03:
BBC cycling documentary condemned as "dangerous juvenile nonsense".
- 2012‑12‑03:
Bad pharma, failure to disclose research results, and the revoked Viagra patent.
- 2012‑12‑03:
Two examples of why we don't need the draft Communications Data Bill.
- 2012‑12‑03:
Facebook's next-generation servers: video interview inside a data centre.
- 2012‑12‑03:
There's more to porcupine sex than just being careful.
- 2012‑12‑03:
csync2: a cluster filesystem synchronisation tool.
- 2012‑12‑03:
Police cited a botched, corrupt investigation as a reason to spy on the nation.
- 2012‑12‑03:
Immigration: end this foolish block on overseas students.
- 2012‑12‑03:
Science jokes.
- 2012‑12‑03:
Securing Nagios remote plugin execution with certificate based authentication.
- 2012‑12‑03:
Leveson on the 'clear evidence of misreporting on European issues'.
- 2012‑12‑03:
The real scandal behind Benghazi.
- 2012‑12‑02:
Don't occupy Wall St, just defund it: move your money to a mutual.
- 2012‑12‑02:
Royal Institution advent calendar 2012.
- 2012‑12‑02:
US high speed rail aspirational map.
- 2012‑12‑02:
Dear journalists: grow up.
- 2012‑12‑02:
How a business was wrongfully liquidated by the taxman.
- 2012‑12‑02:
Android performance case study.
- 2012‑12‑02:
Private Eye's views on the Leveson report.
- 2012‑12‑02:
Is the UN trying to take over the Internet? (What about settlement fees?)
- 2012‑12‑02:
Internet connectivity returns to Syria.
- 2012‑12‑02:
Superstorm Sandy's effect on the global Intenet.
- 2012‑12‑02:
The Azul pauseless garbage collector.
- 2012‑12‑02:
iPhone pink highlight from hell.
- 2012‑12‑02:
The deficit myth.
- 2012‑12‑01:
Lots of military drones have crashed at civilian airports.
- 2012‑12‑01:
Joke planning notices in Brighton.
- 2012‑12‑01:
We've been betrayed by David Cameron over press regulation.
- 2012‑12‑01:
European blank media copyright levy under attack.
- 2012‑12‑01:
Tor operator charged for transmitting child porn.
- 2012‑12‑01:
Scribe: deterministic transparent execution record/replay for Linux.
- 2012‑12‑01:
Patoline: a modern digital typesetter.
- 2012‑11‑30:
Getting Plan 9 running on the Raspberry Pi.
- 2012‑11‑30:
Chompsky.
- 2012‑11‑30:
Renesys's observations of Syria's Internet disconnection.
- 2012‑11‑30:
Cloudflare's observations of Syria's Internet disconnection.
- 2012‑11‑30:
FreeBSD on Pi news.
- 2012‑11‑30:
Break up the US telecom cartels.
- 2012‑11‑29:
An insider's cynical view of the development of OS/2.
- 2012‑11‑29:
Interactive map of England's green belts.
- 2012‑11‑29:
B&N Nook ebook downloads break when your credit card expires.
- 2012‑11‑29:
A Norwegian linguist argues that English is a Scandinavian language.
- 2012‑11‑29:
25th anniversary of SWITCH.ch.
- 2012‑11‑29:
Basic phone service in rural USA is disgracefully flakey.
- 2012‑11‑28:
Broken path MTU discovery on Amazon EC2.
- 2012‑11‑28:
State of the Species.
- 2012‑11‑28:
Why Vint Cerf is wrong about Internet regulation.
- 2012‑11‑28:
When it comes to security, we're back to feudalism.
- 2012‑11‑28:
The ITU's leaked playbook: panic and chaos over the WCIT. (The comments are worth reading!)
- 2012‑11‑28:
You are committing a crime right now (if you are in the USA).
- 2012‑11‑28:
The American right-wing turn against science.
- 2012‑11‑28:
How the BBC News website came to be.
- 2012‑11‑28:
Fens, rivers, and the Ouse washes.
- 2012‑11‑28:
40 years after That Was The Week That Was, where is satire on British TV?
- 2012‑11‑28:
How to tell if a toy is for boys or for girls.
- 2012‑11‑28:
Rupert Murdoch's journalists at The Sun tried to frame a celebrity for a sex crime that never happened.
- 2012‑11‑28:
Revenge of the reality-based community: right-wing American intellectual crisis.
- 2012‑11‑27:
White male geeks hack sexism and racism.
- 2012‑11‑27:
Bollards of London.
- 2012‑11‑27:
Mill Road Winter Fair 2012 this Saturday.
- 2012‑11‑27:
If every state of the USA declared war against each other, which would win?
- 2012‑11‑27:
AT&T iPad hacker's real crime was embarrassing the wrong people.
- 2012‑11‑27:
It really is that bad: A powerful speech on North Korea.
- 2012‑11‑27:
Adverse effects of homeopathy: a systematic review of published case reports and case series.
- 2012‑11‑27:
Scientists do not deny anthropogenic climate change.
- 2012‑11‑27:
Guerrilla raids on supply lines, not winter, scuppered Napoleon's invasion of Russia.
- 2012‑11‑27:
Private evidence from the Home Office on the communications data bill.
- 2012‑11‑27:
DRM by XORing with "RANDOM_STRING".
- 2012‑11‑27:
Finite State Machine Designer.
- 2012‑11‑27:
European unitary patent: latest news.
- 2012‑11‑27:
Simple sabotage field manual. (1944)
- 2012‑11‑27:
D3, conceptually: a JavaScript graphing library tutorial.
- 2012‑11‑27:
The First World War's influence on the English language.
- 2012‑11‑27:
Inside Google Spanner, the largest database on Earth.
- 2012‑11‑27:
Supplementary characters for ECMAScript.
- 2012‑11‑26:
Why we can't process Emoji anymore. (V8 has broken Unicode support.)
- 2012‑11‑26:
Former OED editor covertly deleted thousand of words of non-British English.
- 2012‑11‑26:
Julian Assange's book "Cypherpunks" fails to understand something fundamental about the Internet.
- 2012‑11‑26:
Unispeed mass surveillance equipment.
- 2012‑11‑26:
Inside the Welsh Raspberry Pi factory.
- 2012‑11‑26:
Modules for C, to replace trad header files.
- 2012‑11‑26:
IBM granted patent for removing leading and trailing space characters.
- 2012‑11‑26:
An ABC proof too tough even for mathematicians.
- 2012‑11‑26:
Talus, a 16th century robot.
- 2012‑11‑25:
How to avoid problem people.
- 2012‑11‑25:
35mm film is dead. Will classic movies ever look the same again?
- 2012‑11‑25:
The Recode project: an active archive of computer art.
- 2012‑11‑24:
Time-scale subway map of Boston.
- 2012‑11‑24:
Bounded storage model for crypto adversaries.
- 2012‑11‑23:
Modern roads were originally made for bikes.
- 2012‑11‑23:
Hash pile-ups: using collisions to identify unknown hash functions.
- 2012‑11‑23:
Turkey patents.
- 2012‑11‑23:
Denial-of-service via MurmurHash collisions.
- 2012‑11‑23:
Why your distributed social network idea will not work.
- 2012‑11‑23:
Authenticated denial of existence in the DNS.
- 2012‑11‑23:
A new global depression.
- 2012‑11‑23:
Plaintext password offenders.
- 2012‑11‑23:
Energy from a single orange... (and some galvanised nails and an LED)
- 2012‑11‑22:
Why cellphones went dead after Hurricane Sandy: regulatory failure.
- 2012‑11‑22:
Why Anonymous's claims about election-rigging can't be ignored.
- 2012‑11‑22:
Array size overflows and operator new[] in g++.
- 2012‑11‑22:
Haskell hacker Simon Marlow is moving from Microsoft Research to Facebook.
- 2012‑11‑22:
Vestas Sailrocket.
- 2012‑11‑22:
New speed record of nearly 60 kts in a sailing boat.
- 2012‑11‑22:
No safety in numbers for London's cyclists, owing to poor traffic policing and bad cycle infrastructure.
- 2012‑11‑22:
On managerialist ideology.
- 2012‑11‑22:
Do not send bare arrays as JSON responses to GET requests.
- 2012‑11‑22:
John Carmack on treating time as a part of your input event model.
- 2012‑11‑22:
Switched reluctance motors do not need expensive rare-earth magnets.
- 2012‑11‑22:
Trotify.
- 2012‑11‑22:
Slate: a hacker's window manager for Macs.
- 2012‑11‑21:
Sad news about Mark Crispin.
- 2012‑11‑21:
Anonymous, Karl Rove, and a failed 2012 election fix?
- 2012‑11‑21:
HP's claims of accounting fraud could be cover for bad acquisitions.
- 2012‑11‑21:
David Howarth explains that indirect taxation is the best way to promote growth.
- 2012‑11‑21:
Prince William Photos revealed Ministry of Defence passwords.
- 2012‑11‑21:
Weird goings on at Autonomy.
- 2012‑11‑21:
How the Autonomy accounting scandal worked.
- 2012‑11‑21:
Tim O'Reilly on social media marketing.
- 2012‑11‑21:
Non-event feedback loops.
- 2012‑11‑20:
Why is the FCC planning a massive giveaway to Rupert Murdoch?
- 2012‑11‑20:
The cryptographic doom principle, and ssh plaintext recovery.
- 2012‑11‑20:
Airport security is killing us.
- 2012‑11‑20:
When REST isn't good enough.
- 2012‑11‑20:
Europarliament scolds Visa, MasterCard, and PayPal for killing WikiLeaks donations; initiates regulation of payment processors.
- 2012‑11‑20:
"Value", an irksome euphemism.
- 2012‑11‑20:
Malware uses Google Docs as a C&C proxy.
- 2012‑11‑20:
How goatse.cx went from shock site to webmail service.
- 2012‑11‑20:
Princeton IT security: What to do if ...
- 2012‑11‑20:
Inventors, patents, and inventive activities in the English brewing industry, 1634-1850.
- 2012‑11‑20:
The Web engineer's online toolbox.
- 2012‑11‑20:
How to destroy the Earth.
- 2012‑11‑20:
Israel / Gaza ceasefires almost all end when Israel kills a Palestinian.
- 2012‑11‑20:
World's oldest original working digital computer goes on display at Bletchley.
- 2012‑11‑20:
US sides with Iran and N. Korea in record UN vote over the death penalty.
- 2012‑11‑20:
All pharmaceutical research should be made open access.
- 2012‑11‑20:
Join Rackspace in the fight against patent trolls.
- 2012‑11‑20:
Inside Tumblr.
- 2012‑11‑20:
Elixir: a functional meta-programming aware language built on top of the Erlang VM.
- 2012‑11‑20:
Golang is PHP for the backend. (But not as shitty.)
- 2012‑11‑20:
Everyday sexual assault.
- 2012‑11‑19:
Chocolate truffle art photography.
- 2012‑11‑19:
How to peer review scientfic work.
- 2012‑11‑19:
Rails client IP address spoofing vulnerabilities and protection.
- 2012‑11‑19:
How to criticize Israel without being antisemitic.
- 2012‑11‑19:
Forthcoming book on conservative and libertarian skepticism about copyright.
- 2012‑11‑19:
In America, A Barrage Of Thunderingly Dull Headlines.
- 2012‑11‑19:
Don Jimmy Gambino OBE: Savile the mob boss?
- 2012‑11‑19:
Press coverage of the launch of the National Health Action party.
- 2012‑11‑18:
Internet censorship in Russia sounds just like the UK government's plans.
- 2012‑11‑18:
1740 tons of sludge: the New River Tunnel inspection.
- 2012‑11‑18:
In praise of the cliché.
- 2012‑11‑18:
The state of the art in computing is terrible.
- 2012‑11‑18:
An omniscient debugger.
- 2012‑11‑18:
Debug mode is the only mode: on reactive programming and time-travelling debuggers.
- 2012‑11‑18:
Midwife of the year turns down award sponsored by formula producers.
- 2012‑11‑18:
Instant coffee Britain.
- 2012‑11‑18:
FBI investigation of Petraeus and Broadwell reveals bureau's comprehensive access to electronic communications.
- 2012‑11‑18:
Gardai lobbying against war on drugs in Ireland.
- 2012‑11‑18:
What do we do about untrustworthy certificate authorities?
- 2012‑11‑18:
Republicans withdraw report on copyright reform.
- 2012‑11‑18:
Attacking hardened Linux systems with kernel JIT spraying.
- 2012‑11‑18:
High performance web servers in Haskell.
- 2012‑11‑18:
The debate over whether to set a minimum price on alcohol in the UK.
- 2012‑11‑18:
The gay vote was crucial in Obama's victory.
- 2012‑11‑18:
December missing in date picker on Android 4.2.
- 2012‑11‑18:
Into the vault: the operation to rescue Manhattan's drowned telecoms.
- 2012‑11‑18:
50 years of James Bond: the movie. (YouTube)
- 2012‑11‑17:
1972 Cambridge: celebrating the admission of female undergraduates.
- 2012‑11‑17:
Savita Halappanavar's death has transformed Irish abortion debate.
- 2012‑11‑17:
House Republicans propose reforms to copyright law.
- 2012‑11‑17:
Seeing sexism in academia: moving up the ranks opens the eyes.
- 2012‑11‑17:
Spoilt Ballots in Cambridgeshire's PCC vote.
- 2012‑11‑17:
Cloud outage reports.
- 2012‑11‑17:
Microsoft has failed.
- 2012‑11‑17:
Russia wants ITU to take over IANA.
- 2012‑11‑16:
Inside Obama's tech team.
- 2012‑11‑16:
Simpler and faster Lempel-Ziv factorization.
- 2012‑11‑16:
How Democrats and Republicans wage war.
- 2012‑11‑16:
Turnout was zero at some polling stations in yesterday's PCC election.
- 2012‑11‑16:
GitLaw in Germany: German federal laws and regulations in Markdown on GitHub.
- 2012‑11‑16:
Cloud storage pricing history.
- 2012‑11‑16:
It is easy to do wide-area jamming of LTE networks.
- 2012‑11‑16:
Cambridgeshire PCC election turnout.
- 2012‑11‑16:
The Bond villain's lair: Skyfall's abandoned island really exists.
- 2012‑11‑15:
A single severed cable cut contact between Russian mission control and Its satellites.
- 2012‑11‑15:
Privacy-aware message exchanges for geographically routed human movement networks.
- 2012‑11‑15:
"Twisted light" idea for terabit networking sparks heated debate.
- 2012‑11‑15:
Articles about Savita who died in Ireland after being denied an abortion.
- 2012‑11‑15:
If you're human IT middleware, it's time to find a new job.
- 2012‑11‑15:
Steven Levy on the patent problem.
- 2012‑11‑15:
Flex Mex. (YouTube)
- 2012‑11‑14:
How far will U.S. regulators bend to AT&T and Verizon?
- 2012‑11‑14:
Orca failed, but so did Obama's 2008 equivalent.
- 2012‑11‑14:
Slo-mo eggsplosions. (YouTube)
- 2012‑11‑14:
The real Petraeus scandal: unrestrained state surveillance.
- 2012‑11‑14:
A longitudinal study of the effects of being denied an abortion.
- 2012‑11‑14:
Japanese anti-download law reduces music sales.
- 2012‑11‑14:
Weak password encryption on Huawei products.
- 2012‑11‑14:
FLAME malware uses sneakernet to exfiltrate files from isolated computers.
- 2012‑11‑14:
All the crypto code you've ever written is probably broken.
- 2012‑11‑13:
A TLS performance case study.
- 2012‑11‑13:
If a committee of MPs can tear these companies to shreds so easily, why is HMRC is letting them get away with it?
- 2012‑11‑13:
"Is This You?" - a possible future featuring lifelogging, privacy and scandal. (YouTube)
- 2012‑11‑13:
Revolt grows in coalition over Home Office plan to cut immigration.
- 2012‑11‑13:
Lowering tax rates for the rich has no effect on economic growth or job creation.
- 2012‑11‑13:
Investigative journalism must live on despite the Newsnight crisis.
- 2012‑11‑13:
Apple are selling a (3rd party) Android device.
- 2012‑11‑13:
How Lanyrd moved from MySQL on AWS to PostgreSQL on Softlayer. (Brave!)
- 2012‑11‑13:
Is the ITU really threatening the Internet? (Why address imagined threats not real ones?)
- 2012‑11‑13:
Arrested for poppy burning? The new totalitarianism.
- 2012‑11‑13:
IBM patent lawyer argues the patent system is not broken.
- 2012‑11‑13:
PhantomJS: Headless WebKit with JavaScript API.
- 2012‑11‑13:
When poll is better than interrupt for block IO completion.
- 2012‑11‑13:
An open letter on patents, 12 years later.
- 2012‑11‑13:
Infinite Jukebox: like Infinite Gangnam Style but for any song.
- 2012‑11‑13:
Operating system implications of fast, cheap, non-volatile memory.
- 2012‑11‑13:
When men get too emotional to have a rational argument.
- 2012‑11‑13:
Meet the Texas lawyer suing hundreds of companies for using TLS.
- 2012‑11‑13:
Does Facebook hate all women, or just feminists?
- 2012‑11‑12:
How Helen Oxenbury and Michael Rosen made "We're Going on a Bear Hunt".
- 2012‑11‑12:
Surveying Earth's interior with atomic clocks.
- 2012‑11‑12:
Rock Paper Scissors programming competition.
- 2012‑11‑12:
Lord McAlpine scandal shows Leveson 'must find a way of reining in Twitter and Facebook', idiot MPs say.
- 2012‑11‑12:
Napster, Udacity and the academy: what massive open online courses mean for undergraduate teaching.
- 2012‑11‑12:
Fat is back: Rediscover the delights of lard, dripping and suet.
- 2012‑11‑12:
When it comes to DRM, Amazon is a bottom feeding hell beast.
- 2012‑11‑12:
NSA publishes top-secret 1995 report that missed the future of supercomputing.
- 2012‑11‑12:
Wilfred Owen - Dulce et Decorum est - Recited by Christopher Hitchens. (YouTube)
- 2012‑11‑12:
What are the killer applications for dependent types in general purpose programming languages?
- 2012‑11‑11:
The Columbia Journalism Review on what is happening at the BBC.
- 2012‑11‑11:
New "Flood Router26" IPv6 RA attack takes down Mac OS and Windows.
- 2012‑11‑11:
The Leveson Inquiry and the BBC.
- 2012‑11‑11:
Smuggling USB sticks: routing around censorship with sneakernet.
- 2012‑11‑11:
The mainstream media derailed the opportunity to address child abuse.
- 2012‑11‑11:
Unifying programming and mathematics: the dependent type revolution.
- 2012‑11‑11:
President Obama and the breastfed baby.
- 2012‑11‑11:
Visitor tracking with HTTP 301 permanent redirects.
- 2012‑11‑11:
The amount of crap Microsoft users have to put up with is incredible.
- 2012‑11‑11:
TELETEXT: the early years.
- 2012‑11‑10:
A hitchhiker's tour of the BEAM Erlang abstract machine.
- 2012‑11‑10:
Precisely why the Daily Mail is irredeemable shit.
- 2012‑11‑10:
The stock markets will blow up again.
- 2012‑11‑10:
British legal curiosities: fact or fable?
- 2012‑11‑10:
Romney's election day IT screwup.
- 2012‑11‑09:
"Secure password managers" and "military-grade encryption" on smartphones: oh, really?
- 2012‑11‑09:
Seven ways to handle concurrency in distributed systems.
- 2012‑11‑09:
musl libc: a new lightweight standard library for Linux.
- 2012‑11‑09:
Don't trust a password management system you design yourself!
- 2012‑11‑09:
Blocklists of suspected malicious IPs and URLs.
- 2012‑11‑09:
DNS amplification from the point of view of a hosting provider.
- 2012‑11‑08:
An overview of e-postage.
- 2012‑11‑08:
Flip all the pronouns in Legend of Zelda: Wind Walker.
- 2012‑11‑08:
What can data scientists learn from DevOps?
- 2012‑11‑08:
Memory-efficient zone data in BIND 10.
- 2012‑11‑08:
When a journal repeatedly addresses an academic using "Miss".
- 2012‑11‑08:
Judge Leo Sorokin is tired of copyright troll Marvin Cable's lies, so denies ex-parte discovery.
- 2012‑11‑08:
Why there isn't a British Nate Silver.
- 2012‑11‑08:
Run Archimedes Elite on the Raspberry Pi.
- 2012‑11‑08:
Counties in the southern US that voted for Obama lie along the Cretaceous era shore line.
- 2012‑11‑08:
Was the green man, that pagan spirit of nature, in fact England's secret symbol of resistance to Norman oppression?
- 2012‑11‑08:
Stack Overflow's guide to forms based website authentication.
- 2012‑11‑08:
Why is Rick Santorum using a picture of 4Chan founder Moot on his website?
- 2012‑11‑08:
NetBSD kernel compiled to JavaScript and run in a browser.
- 2012‑11‑07:
The economics of making music.
- 2012‑11‑07:
Hurricane Sandy: global impact on Internet routing.
- 2012‑11‑07:
AMD dismisses almost all its Linux kernel developers.
- 2012‑11‑07:
Lessons for the data centre after Hurricane Sandy.
- 2012‑11‑07:
Some things the British press would prefer you did not know.
- 2012‑11‑07:
Why do hospital generators keep failing?
- 2012‑11‑07:
NYU Hospital's backup power undone by key part in flooded basement.
- 2012‑11‑07:
Who pays "road tax"?
- 2012‑11‑07:
Survey reveals ash disease in six further counties.
- 2012‑11‑07:
GNU alternate domain system: a decentralized name service based on Rivest's SDSI.
- 2012‑11‑07:
Banks replace highly-paid traders with software.
- 2012‑11‑07:
What to look for on site when choosing a co-lo facility.
- 2012‑11‑07:
Nate Silver, the audacity of maths and the innumeracy of political commentary.
- 2012‑11‑07:
Puerto Rico votes to become 51st state.
- 2012‑11‑07:
A physical machine that duplicates sounds from the TR-808 drum machine.
- 2012‑11‑07:
Microsoft to turn off Windows Live / MSN Messenger in favour of Skype.
- 2012‑11‑06:
Notes on Certificate Transparency for IETF85.
- 2012‑11‑06:
The global e-voting disaster: Why the US and the world shouldn't try to make elections too high tech.
- 2012‑11‑06:
Slot machines vs voting machines.
- 2012‑11‑06:
Bad disk latency spikes on Linux.
- 2012‑11‑06:
Voting machine altering votes. (YouTube)
- 2012‑11‑06:
Superoptimizers are back in vogue.
- 2012‑11‑06:
More on the suspicious last-minute patch to Ohio vote tabulation machines.
- 2012‑11‑06:
Anti-independence parties in UK and Spain plot to expel independent Scotland from the EU.
- 2012‑11‑06:
Sharp Suits: a creative catharsis.
- 2012‑11‑06:
The Economist talks to Ben Goldacre about the broken pharmaceutical industry.
- 2012‑11‑06:
Content design for mobile devices. (Please don't treat them so specially.)
- 2012‑11‑06:
Criticism of and alternatives to the slider UI widget.
- 2012‑11‑06:
A clock that knits a scarf.
- 2012‑11‑06:
A dynamic language is a restricted static language affording less not more expressiveness.
- 2012‑11‑06:
Ag: a code-searching tool similar to ack, but faster.
- 2012‑11‑06:
FBI campaigns against telcos who uphold restrictions on surveillance.
- 2012‑11‑06:
Labour's return to the right.
- 2012‑11‑06:
Mission impossible: iPad Mini browser detection.
- 2012‑11‑06:
A TLS threat model.
- 2012‑11‑05:
No one should have to wait 7 hours to vote. (7 minutes is a bit too long)
- 2012‑11‑05:
Pentagon unit pushed email voting for troops despite security concerns.
- 2012‑11‑05:
The badgers guide to logical fallacies.
- 2012‑11‑05:
Gillette Venus says domestic violence can be caused by not shaving your legs.
- 2012‑11‑05:
Remote root vulnerability in Sophos anti-virus.
- 2012‑11‑05:
Why Americans can't vote online on Tuesday.
- 2012‑11‑05:
Uncertified "experimental" software installed on vote tabulation systems in 39 OH counties days before election.
- 2012‑11‑05:
Most New York data centres back on mains power.
- 2012‑11‑05:
Arithmetic encoding using 32 bit fixed-point windows.
- 2012‑11‑05:
Cycling in New York after Hurricane Sandy.
- 2012‑11‑05:
"PSD is not my favourite file format."
- 2012‑11‑05:
"Address Sanitizer" compile-time memory checker to be included in gcc-4.8
- 2012‑11‑05:
Comparing audio quality of AAC and mp3 at various rates.
- 2012‑11‑05:
Defending against SQL injection by detecting query errors in the database.
- 2012‑11‑05:
Ash dieback: UK government might be sued over failure to act.
- 2012‑11‑05:
Interstellar hydrogen becomes intense radiation to a highly relativistic spacecraft.
- 2012‑11‑05:
End of life care through the eyes of a doctor and a patient.
- 2012‑11‑05:
Internet Voting in the U.S.
- 2012‑11‑04:
NLNOG RING: remote shell exchange for network operators.
- 2012‑11‑04:
"Denial of service" high frequency trading algorithm spams massive volumes of quotes.
- 2012‑11‑04:
Over-aggressive deduplication led to ATM fraud detection loophole at CitiBank.
- 2012‑11‑04:
Independent on Sunday Pink List 2012.
- 2012‑11‑04:
Book publishers have long been playing into Amazon's hands.
- 2012‑11‑04:
British have invaded all but 22 countries.
- 2012‑11‑04:
A nice profile of the Raspberry Pi.
- 2012‑11‑04:
No Microsoft products on Kaspersky's top 10 vulnerabilities list.
- 2012‑11‑04:
US Democrats have a massive intellectual advantage in targeting and persuading voters.
- 2012‑11‑04:
Some preliminary thoughts on NJ's emergency email voting scheme.
- 2012‑11‑04:
Why do sign language interpreters look so animated?
- 2012‑11‑04:
American right-wing politics is full of lies; its fund-raising aims to deceive the feeble-minded.
- 2012‑11‑03:
Russian cat circus. (YouTube)
- 2012‑11‑03:
A slower speed of light: relativistic gaming.
- 2012‑11‑03:
Animated factorization diagrams.
- 2012‑11‑03:
How trees work. (YouTube)
- 2012‑11‑03:
Noam Chomsky criticises the Google approach to Artificial Intelligence.
- 2012‑11‑02:
Foxy Nate Silver and why old-media hedgehogs could soon be old news.
- 2012‑11‑02:
Tim Gowers on the sixth form mathematics curriculum.
- 2012‑11‑02:
Gay people are a greater fire risk than straight people, according to Hackney council.
- 2012‑11‑02:
Cambridge is not a centre of excellence in cyber security research, according to GCHQ.
- 2012‑11‑02:
Lorry blind spots and invisible cyclists. (YouTube)
- 2012‑11‑02:
What an RAF pilot can teach us about being safe on the road.
- 2012‑11‑01:
The busting of LulzSec: lessons in OpSec.
- 2012‑11‑01:
Tracking casual homophobia on Twitter.
- 2012‑11‑01:
Infinite Gangnam Style. (actually quite clever)
- 2012‑11‑01:
Ur: a functional programming language supporting a powerful kind of metaprogramming based on row types.
- 2012‑11‑01:
MLPolyR: a small programming language based on row polymorphism.
- 2012‑11‑01:
Having an anti-harassment policy helps tech conference organisers deal with unprofessional sexualized swag.
- 2012‑11‑01:
On the feasibility of completely wireless data centres.
- 2012‑11‑01:
Parliamentary IP group publishes report favouring rights holders and against measured approach of IPO.
- 2012‑10‑31:
Why we can't solve big problems.
- 2012‑10‑31:
OpenDNSSEC key rollover failure for .nl on 28 October.
- 2012‑10‑31:
Computer-controlled dedical equipment is riddled with malware.
- 2012‑10‑31:
Precision NTP on a Raspberry Pi.
- 2012‑10‑31:
How a pro-life activist lost faith in the movement.
- 2012‑10‑31:
Summary of the Amazon Web Services outage on 22 October 2012.
- 2012‑10‑31:
Counting IPv6 support in DNS resolvers.
- 2012‑10‑31:
99.5% of Internet peering is agreed with a handshake.
- 2012‑10‑31:
New York subway may take weeks to recover from flooding.
- 2012‑10‑31:
Disabled rights activist complains to South Wales police following midnight questioning about comments on Facebook.
- 2012‑10‑31:
Paul Vixie on the length of time taken to develop and deploy DNSSEC.
- 2012‑10‑31:
Unilateral antidotes to DNS poisoning.
- 2012‑10‑31:
Speaking out against Nominet's proposed release of second level .UK domains.
- 2012‑10‑31:
Impact of Hurricane Sandy on the Internet.
- 2012‑10‑31:
Domain sharding is bad for mobile performance.
- 2012‑10‑31:
Failing over Stack Overflow and Stack Exchange for Sandy.
- 2012‑10‑30:
Client-side API mashups with cross-origin resource sharing.
- 2012‑10‑30:
Director of FEMA during Katrina criticizes Obama for responding to Sandy too quickly.
- 2012‑10‑30:
Zappos' user agreement failed in court and leaving them legally naked.
- 2012‑10‑30:
Report on the DigiNotar X.509 CA failure with technical details of hack.
- 2012‑10‑30:
US Supreme Court worries about 'parade of horribles' if the first sale doctrine does not apply to imports.
- 2012‑10‑30:
Hurricane Sandy pictures.
- 2012‑10‑30:
Semantic patching with Coccinelle.
- 2012‑10‑30:
Spineless hedgehogs!
- 2012‑10‑30:
How global warming helped transform Sandy from a hurricane into a Frankenstorm.
- 2012‑10‑30:
What networking needs to learn from Steve Jobs.
- 2012‑10‑30:
How to batten a hatch.
- 2012‑10‑30:
Deep inside a DNS amplification DDoS attack.
- 2012‑10‑30:
six: compile new ECMAscript v6 features to current JavaScript.
- 2012‑10‑30:
Don't kill math: comments on Bret Victor and "inventing on principle".
- 2012‑10‑30:
FreeBSD Raspberry Pi support merged into main repository.
- 2012‑10‑29:
Bugged phone deepens controversy over L'Aquila verdict.
- 2012‑10‑29:
James Bond 007 deathmatch. (YouTube)
- 2012‑10‑29:
A profile of PGN.
- 2012‑10‑29:
Goatse Mail. (!!!!!)
- 2012‑10‑29:
When capitalists cared.
- 2012‑10‑29:
The price of inequality.
- 2012‑10‑29:
What happens when a town makes its public transit free.
- 2012‑10‑29:
OCSP stapling: how to make TLS 30% faster.
- 2012‑10‑29:
Zero knowledge type checker.
- 2012‑10‑29:
Notes from the wrong future: the end of crypto.
- 2012‑10‑29:
London Heathrow approach time-lapse.
- 2012‑10‑29:
The poetry of function names.
- 2012‑10‑29:
A police officer's opinion of airport security.
- 2012‑10‑29:
More MTU and packet corruption stories.
- 2012‑10‑29:
The little ssh that (sometimes) couldn't: packet corruption debugging.
- 2012‑10‑29:
Singularity Chess.
- 2012‑10‑28:
Police move against campaigners for "criminal acts against DWP".
- 2012‑10‑27:
Attack of the week: cross-VM timing attacks.
- 2012‑10‑27:
Verified by Visa and MasterCard SecureCode: how not to design authentication.
- 2012‑10‑27:
OpenFlow at Google.
- 2012‑10‑26:
Avoid Hinchingbrooke: the first privatised NHS hospital is failing.
- 2012‑10‑26:
American eggs would be illegal in a British supermarket, and vice versa.
- 2012‑10‑26:
Sorting a million 8 digit numbers in 1MiB explained.
- 2012‑10‑26:
Online security, pseudonymity, and personal vs private information.
- 2012‑10‑26:
The great railway caper: big data in 1955.
- 2012‑10‑26:
A taxonomy of arse.
- 2012‑10‑26:
Paleontologists uncover the first feathered dinosaur fossils in the Americas.
- 2012‑10‑25:
QR life.
- 2012‑10‑25:
GPS software attacks: breaking in through the radio interface.
- 2012‑10‑25:
Facebook does not want you to know that you can buy information about a million of their users for $5.
- 2012‑10‑25:
Magit: an Emacs mode for git.
- 2012‑10‑25:
How to make a security geek feel very old: factorising 512 bit RSA keys.
- 2012‑10‑25:
The Swinnerton-Dyer report on academic computing in Cambridge University. (1993)
- 2012‑10‑25:
UK government belatedly takes action to limit spread of disease killing ash trees.
- 2012‑10‑25:
Review of IT infrastructure and support at Cambridge University.
- 2012‑10‑24:
Electronic Arts Commodore 64 Fat Track copy protection loader.
- 2012‑10‑24:
Closed research means people die.
- 2012‑10‑24:
The slow death of public higher education in the USA.
- 2012‑10‑24:
DNSSEC and X.509 certificates.
- 2012‑10‑24:
Abuse IX: intensive collaboration between Dutch ISPs and SIDN to tackle botnets.
- 2012‑10‑24:
A critical analysis of Dropbox software security.
- 2012‑10‑24:
The island where people forget to die.
- 2012‑10‑24:
Application security of core banking systems: a reality check.
- 2012‑10‑24:
The unexpected effects of switching the pronouns assigned to fictional genders in an sf novel.
- 2012‑10‑24:
Many sites have short crackable DKIM keys.
- 2012‑10‑24:
Raspberry Pi VideoCore driver source code released under BSD licence.
- 2012‑10‑24:
Microsoft Exchange private appointments are not private.
- 2012‑10‑24:
Observer Food Monthly awards 2012: lots of Cambridge places in the runners up.
- 2012‑10‑24:
Facebook social graph data on sale: $5 for a million names, email addresses, and profile URLs.
- 2012‑10‑24:
Getting DNSSEC deployed: costs and benefits.
- 2012‑10‑23:
All about ebook formats, and how to convert between them and strip DRM.
- 2012‑10‑23:
GITLAB: self hosted git management based on gitolite and Ruby on Rails.
- 2012‑10‑23:
Re-counting DNSSEC.
- 2012‑10‑23:
Senior officers resign from Italy's serious risks commission following L'Aquila verdict.
- 2012‑10‑23:
Why the L'Aquila case is NOT about risk communication.
- 2012‑10‑23:
Why Plan28 wants to build Charles Babbage's Victorian computer.
- 2012‑10‑23:
Open Access: What is it and what does "Open" mean?
- 2012‑10‑23:
NTFS privilege elevation case study.
- 2012‑10‑23:
jQuery is missing the point of promises.
- 2012‑10‑22:
SILT: a memory-efficient, high-performance key-value store.
- 2012‑10‑22:
The Italian government should have prepared for and recovered from the L'Aquila quake better.
- 2012‑10‑22:
More details of the Amazon Kindle lockout story.
- 2012‑10‑22:
MySQL vs PostgreSQL.
- 2012‑10‑22:
Everything you wanted to know about certificate validation with OpenSSL.
- 2012‑10‑22:
Whitehall investigation over 'FoI avoidance' in Nominet emails.
- 2012‑10‑22:
Scientists at fault in L'Aquila. (Nature, 2011)
- 2012‑10‑22:
Duality for Haskellers.
- 2012‑10‑22:
80% of UK homes have Internet access.
- 2012‑10‑22:
Back from another globetrotting adventure, Indiana Jones discovers his bid for tenure was denied.
- 2012‑10‑22:
The proposed libel reform does not provide a good enough public interest defence.
- 2012‑10‑22:
Fifteen painted pianos for you to play on the streets of Cambridge.
- 2012‑10‑22:
The big question mark over making petrol from air.
- 2012‑10‑22:
ICANN changes rules so Verisign will be able to sell .com domains.
- 2012‑10‑22:
Amazon may close your account and wipe your Kindle for no reason.
- 2012‑10‑22:
Dr Ben Goldacre vs the Association of the British Pharmaceutical Industry.
- 2012‑10‑22:
The most dangerous code: failure to validate X.509 certificates in non-browser software.
- 2012‑10‑21:
Local state is poison.
- 2012‑10‑21:
NIST crypto algorithm selectors may not have you in mind.
- 2012‑10‑21:
Sorting 1 million 8 digit numbers in just 1MB of RAM.
- 2012‑10‑21:
Rowan Atkinson's speech in support of free speech and the Reform Section 5 campaign.
- 2012‑10‑21:
The WCIT ETNO proposal: unintended consequences of making the sending party pay.
- 2012‑10‑21:
On meritocracy.
- 2012‑10‑21:
Tests / specs: a fundamental duality of software engineering.
- 2012‑10‑21:
Using cross-VM side channels to extract private keys.
- 2012‑10‑21:
Google Voice lost my number and made me pay to get it back.
- 2012‑10‑21:
Insanely long proofs, incompleteness, and speedup theorems.
- 2012‑10‑21:
There are 250,000 patents affecting smartphones: one in six active patents.
- 2012‑10‑21:
99 hacks to make your life easier.
- 2012‑10‑21:
Diocesan coats of arms.
- 2012‑10‑20:
Chosen-plaintext attacks and web app crypto blob confusion.
- 2012‑10‑20:
Hyperinflation is the result of a total failure of the political system.
- 2012‑10‑20:
The CSRG's early BSD SCCS history converted to SVN.
- 2012‑10‑20:
A collection of papers about fuzz testing.
- 2012‑10‑20:
How to fix various bash annoyances.
- 2012‑10‑20:
Weak memory ordering in practice on a multicore ARM.
- 2012‑10‑19:
Minnesota bans free online education.
- 2012‑10‑19:
Ex-government official says CIA is prosecuting whistleblower John Kiriakou to protect one of its torturers.
- 2012‑10‑19:
PayPal bug bounty: a lesson in not being a fuckup.
- 2012‑10‑19:
The Perceus provisioning system.
- 2012‑10‑19:
How CloudFlare launched 10 data centers in 30 days.
- 2012‑10‑19:
PSY vs Ghostbusters: Gangnam Busters.
- 2012‑10‑19:
44TB of SSD in 1U.
- 2012‑10‑19:
Why to use the query parameter "utf8=✓".
- 2012‑10‑19:
Air Fuel Synthesis turns carbon dioxide and water vapour into petrol.
- 2012‑10‑19:
Numbers don't lie: patent trolls are a plague.
- 2012‑10‑19:
DNSSEC migration of a high-value domain while maintaining inner peace.
- 2012‑10‑19:
DNSSEC and UDP fragmentation: a prickly combination.
- 2012‑10‑19:
Steam browser URL protocol insecurity: when local bugs go remote.
- 2012‑10‑19:
"We must be allowed to insult each other."
- 2012‑10‑19:
decyber: take the fear out of cybersecurity.
- 2012‑10‑19:
How cork is made.
- 2012‑10‑19:
A systematic look at Amazon EC2 I/O performance.
- 2012‑10‑18:
local-openid: geeky single user ephemeral OpenID provider.
- 2012‑10‑18:
The git revolution is here.
- 2012‑10‑18:
IPv6 stats world map.
- 2012‑10‑18:
Comparing TCP and UDP response times of DNS root name servers.
- 2012‑10‑18:
Wired on Google's datacentres.
- 2012‑10‑17:
21st IOCCC winners.
- 2012‑10‑17:
The gayness of Batman.
- 2012‑10‑17:
RedHat DNSSEC integration.
- 2012‑10‑17:
Next steps in accelerating DNSSEC deployment.
- 2012‑10‑17:
Google DNS, OpenDNS and CDN performance.
- 2012‑10‑17:
How Google's hot aisles work.
- 2012‑10‑17:
Registry failover and DNSSEC. (Author has not read my article on the subject!)
- 2012‑10‑17:
DANE TLSA test sites.
- 2012‑10‑17:
Roy Arends' DNSSEC operator change with minimal co-operation from the loser.
- 2012‑10‑17:
The battlefronts in the war for control of the Internet.
- 2012‑10‑17:
How did software get so reliable without provable correctness?
- 2012‑10‑17:
wrk: an HTTP benchmarking tool.
- 2012‑10‑17:
Pictures inside Google's data centres.
- 2012‑10‑17:
Fastresolve: bulk DNS lookups for web logs.
- 2012‑10‑17:
Fast functional lists, hash-lists, deques and variable length arrays.
- 2012‑10‑17:
Time-lapse video of space shuttle Endeavour's trek across L.A.
- 2012‑10‑16:
Leveraged buyouts and the Bain Drain.
- 2012‑10‑16:
SpaceX planning new rocket bigger than Saturn V.
- 2012‑10‑16:
Functional Programming in C++
- 2012‑10‑16:
How I learned to stop worrying and love identity assurance. (UK government ID scheme.)
- 2012‑10‑16:
SSD failure / return rates per manufacturer.
- 2012‑10‑16:
Peeking inside LuaJIT.
- 2012‑10‑16:
The crypto dream.
- 2012‑10‑16:
Was Reddit troll Violentacrez thinking?
- 2012‑10‑16:
Effect of GitHub on Python contributions.
- 2012‑10‑16:
"Nature" on badger culling.
- 2012‑10‑16:
A 15 year perspective on why telcos keep getting hacked.
- 2012‑10‑16:
Digital River loses law suit for doing what was in the patent years before it was filed.
- 2012‑10‑16:
Masterpieces from the PHP manual.
- 2012‑10‑16:
Fine Structure: a story about science.
- 2012‑10‑16:
Happy Ada Lovelace Day: a celebration of women science writers.
- 2012‑10‑16:
Cambridgeshire county council leader is a climate change denier who thinks tories are not bourgeois.
- 2012‑10‑16:
Sainsbury Laboratory Noir.
- 2012‑10‑16:
Google Earth Fractals.
- 2012‑10‑16:
Google Drive duplicates files if you try to do multi-way sync.
- 2012‑10‑16:
Shut up and play nice: How the Western world is limiting free speech.
- 2012‑10‑16:
South Carolina Supreme Court says it is OK to read other people's email without consent.
- 2012‑10‑15:
Van Jacobson remembers the creation of the TCP slow start algorithm. (YouTube)
- 2012‑10‑15:
Interesting auditory pitch / rhythm illusion.
- 2012‑10‑15:
Cuban missile crisis: the other, secret one.
- 2012‑10‑15:
The scrap value of a hacked PC.
- 2012‑10‑15:
Why science and engineering toys aren't for girls (and arts and crafts aren't for boys?).
- 2012‑10‑15:
Why Cambridge's Sainsbury Laboratory deserved to win the Stirling architecture prize.
- 2012‑10‑15:
UK to opt out of EU police co-operation.
- 2012‑10‑15:
Patents on software: an economics Nobel laureate's view.
- 2012‑10‑15:
Cabinet Office paper on randomised trials of government policies.
- 2012‑10‑15:
Drug laws and evidence-based policy: it's time to start doing experiments on the British people.
- 2012‑10‑15:
UK drugs policy commission.
- 2012‑10‑15:
Amazon in talks to buy Texas Instruments' mobile chip business.
- 2012‑10‑15:
Decriminalise drug use, says independent expert report.
- 2012‑10‑15:
Journalistic faux objectivity. (Another piece about he said / she said)
- 2012‑10‑15:
Passive online rogue rccess point detection using sequential hypothesis testing with TCP ACK pairs.
- 2012‑10‑15:
Spectroscopy of DNS update traffic.
- 2012‑10‑14:
Everyonazis! A survey of Internet Nazi portmanteaus.
- 2012‑10‑13:
What's really so bad about bubble sort.
- 2012‑10‑13:
GET /browser.exe
- 2012‑10‑13:
Lots of fantastic eyes.
- 2012‑10‑13:
Swordfish have heated eyes.
- 2012‑10‑13:
Google homepage size over time.
- 2012‑10‑12:
Dark social: sharing on the net but off the web.
- 2012‑10‑12:
How to easily beat blog comment spam.
- 2012‑10‑12:
Chocolate consumption, cognitive function, and Nobel laureates.
- 2012‑10‑12:
A Turing Machine in Conway's Game of Life.
- 2012‑10‑12:
Can we build a more efficient airplane? Not really, says physics.
- 2012‑10‑12:
A case study of AAAA filtering.
- 2012‑10‑12:
Total cost of ownership of carrier-grade NAT.
- 2012‑10‑12:
GSK have promised to share all trial data. Should we trust them?
- 2012‑10‑11:
Interesting discussion of user-extensible IPv6 networks and the prospect of NATv6.
- 2012‑10‑11:
De DNS "ANY" plaag.
- 2012‑10‑11:
Time zones in Google maps.
- 2012‑10‑11:
DNS response rate limiting for NSD.
- 2012‑10‑11:
Court rules book scanning is fair use, suggesting Google Books victory.
- 2012‑10‑11:
Rivertrail: data parallel JavaScript.
- 2012‑10‑11:
Posner on patents.
- 2012‑10‑11:
How to tell if the universe is simulated on a discrete lattice.
- 2012‑10‑11:
Apple and Google really spent more on patents than R&D? Yes, but...
- 2012‑10‑11:
Cycling rates in Cambridge.
- 2012‑10‑11:
Google.ie and Yahoo.ie diverted after breach at Irish DNS registrar.
- 2012‑10‑11:
Aligot: cryptographic function identification in obfuscated programs.
- 2012‑10‑10:
Cognitive dissonance and the Monty Hall problem.
- 2012‑10‑10:
The surprising behaviour of networks of networks.
- 2012‑10‑10:
SmoothLife: cellular automata generalized to a continuous domain
- 2012‑10‑10:
NSQ: bitly's realtime message queue system.
- 2012‑10‑10:
Attacking telephone interactive voice response systems via their DTMF detectors.
- 2012‑10‑10:
US telcos sell your call and location records to spammers.
- 2012‑10‑09:
Verisign applied for patent describing broken DNSSEC operator change process.
- 2012‑10‑09:
Gay marriage Nazis and the disgraceful bigot Lord Carey.
- 2012‑10‑09:
More prosecutions for telling bad jokes online.
- 2012‑10‑09:
Copyright trolls' evidence to be tested in a bellwether trial.
- 2012‑10‑09:
Faster than C? Parsing binary data in JavaScript.
- 2012‑10‑09:
The mouse faces extinction.
- 2012‑10‑09:
Twitter vs patent trolls.
- 2012‑10‑08:
Luv: Lua + libuv + ØMQ.
- 2012‑10‑08:
LittleBlackBox: private SSL + SSH keys extracted from embedded devices.
- 2012‑10‑08:
On binding UDP sockets to ANY addresses.
- 2012‑10‑08:
The dawn of the stupid network.
- 2012‑10‑08:
An earlier description of how to securely change DNSSEC hosting providers.
- 2012‑10‑08:
Verisign tries to patent the obvious way to securely change DNSSEC hosting providers.
- 2012‑10‑08:
Apple and Google spend more on patents than on R&D.
- 2012‑10‑08:
Pictures of the flight deck of the space shuttle Endeavour.
- 2012‑10‑07:
Ben Goldacre Q&A on Bad Pharma.
- 2012‑10‑07:
No, you are not entitled to your opinion.
- 2012‑10‑07:
DEFRA has a superinjunction covering the identities of those planning the stupid badger cull.
- 2012‑10‑07:
The kissing sailor: the selective blindness of rape culture.
- 2012‑10‑07:
The complete "How To Write A Thriller", by Ian Fleming.
- 2012‑10‑07:
UHF TACSAT/SATCOM satellite downlinks receivable in the US.
- 2012‑10‑07:
Brazilians like using US military comms satellites: open relays for ham radio.
- 2012‑10‑07:
You can't have it all: Princetonian letters on work-life balance.
- 2012‑10‑07:
The best interface is no interface.
- 2012‑10‑06:
A beautiful version of Euclid's Elements published in 1847.
- 2012‑10‑06:
LINK ATM locator.
- 2012‑10‑06:
The surprising demographics of UK opinion on abortion.
- 2012‑10‑06:
More evidence that Voyager has exited the solar system.
- 2012‑10‑06:
There really is an advert containing a smartphone inside 'EW Magazine'.
- 2012‑10‑05:
The mystery of the blue honey.
- 2012‑10‑05:
OED wants help finding early uses of certain phrases. (Usenet features prominently!)
- 2012‑10‑05:
Validns: zone file checker with DNSSEC support.
- 2012‑10‑05:
DANE patrol: RFC 6698 TLSA verification for Firefox.
- 2012‑10‑04:
TLS X.509 certificate verification is still often disabled.
- 2012‑10‑04:
The fastest man-made object ever: a nuclear-powered manhole cover.
- 2012‑10‑04:
"Strong" and "weak" concurrent hardware memory models.
- 2012‑10‑04:
Some AMD Opteron chips have buggy implementations of CMPXCHG.
- 2012‑10‑04:
Patent troll TQP claims a monopoly over TLS + RC4.
- 2012‑10‑04:
This is rape culture.
- 2012‑10‑04:
What would happen to the oceans if the Earth stopped rotating.
- 2012‑10‑04:
TCP Fast Open: expediting web services with Linux 3.6.
- 2012‑10‑04:
Why is SHA-3 fast in hardware?
- 2012‑10‑04:
Gangnam style, 1975 :-)
- 2012‑10‑04:
The concept of quality of service in the Internet.
- 2012‑10‑03:
America is not the most entrepreneurial country.
- 2012‑10‑03:
Simon Singh threatened with legal action for criticising dangerous quack magazine.
- 2012‑10‑03:
Judge Posner asks, do patent and copyright law restrict competition and creativity excessively?
- 2012‑10‑02:
Summary of the Keccak sponge function family.
- 2012‑10‑02:
Practical padding oracle attacks on RSA.
- 2012‑10‑02:
Benchmarks of SHA-3 finalists.
- 2012‑10‑02:
A fast new SipHash implementation in Haskell.
- 2012‑10‑02:
Keccak is the winner of the SHA-3 cryptographic hash competition.
- 2012‑10‑02:
Make your own Marmite: "dangerous and hard to control"
- 2012‑10‑02:
HTTP Strict Transport Security (HSTS) approved as Proposed Standard RFC.
- 2012‑10‑02:
Hackers sneak bugs into open source code, so they can later sell a zero-day exploit.
- 2012‑10‑02:
On the obligation of companies to maximise profits.
- 2012‑10‑02:
Symlink and hard link restrictions in Linux 3.6.
- 2012‑10‑02:
Elsevier responds to Gowers boycott by allowing free access to old maths papers.
- 2012‑10‑02:
Don Knuth and Doug McIlroy on literate programming.
- 2012‑10‑02:
Labour will make cuts to welfare budget if it wins 2015 election.
- 2012‑10‑01:
London could overtake Paris as the gastronomic capital of Europe.
- 2012‑10‑01:
3D printer manufacturer refuses to support WikiWeapon project.
- 2012‑10‑01:
USB flash storage responsible for over 70% of US army computer security breaches.
- 2012‑10‑01:
The great disconnect: an American conservative view of their liberal compatriots.
- 2012‑10‑01:
TCP Small Queues to fight bufferbloat in Linux 3.6.
- 2012‑10‑01:
The tale of 1,001 DSL modems: millions of hacked routers in Brazil.
- 2012‑10‑01:
To encourage cycling, helmets should not be mandatory.
- 2012‑10‑01:
Server Porn.
- 2012‑10‑01:
Venues with a capacity under 200 no longer need a licence for live music.
- 2012‑10‑01:
Is Leo Traynor's troll story a lie?
- 2012‑10‑01:
How many cod are really left in the North Sea?
- 2012‑10‑01:
How a rogue appeals court wrecked the patent system.
- 2012‑10‑01:
Nominet consults on the first step to abolishing hierarchical names under the .uk TLD.
- 2012‑10‑01:
Videos from the Dennis Ritchie memorial symposium.
- 2012‑10‑01:
Only IE users have been exposed to active attacks against unpatched vulnerabilities in the last 20 months.
- 2012‑09‑30:
How to make clear ice cubes.
- 2012‑09‑30:
FORTH to C compiler, with debugging and IDE support, in a blog article.
- 2012‑09‑30:
2012 Makey awards.
- 2012‑09‑30:
American Airlines should no longer be flying across the Atlantic.
- 2012‑09‑30:
PSY London Style.
- 2012‑09‑30:
Behold the unclefts.
- 2012‑09‑30:
Uncleftish beholding: atomic theory explained using only Germanic words.
- 2012‑09‑30:
NHS + IT = FUBAR.
- 2012‑09‑30:
LLJS: the bastard child of JavaScript and C.
- 2012‑09‑30:
British Antarctic Survey to receive the Royal Greenwich Observatory treatment.
- 2012‑09‑29:
Markets are efficient if and only if P = NP.
- 2012‑09‑29:
The case for abolishing patents (yes, all of them).
- 2012‑09‑29:
HTML5 security, cross-domain Math.random() prediction and Facebook JavaScript API.
- 2012‑09‑29:
Automated fraud checking calls do not improve credit card security.
- 2012‑09‑29:
GIFCTRL
- 2012‑09‑28:
RAR files can contain bytecode for a simple x86-like virtual machine.
- 2012‑09‑28:
On the (provable) security of TLS, part 2.
- 2012‑09‑28:
What if every electron in the universe was all the same exact particle?
- 2012‑09‑28:
Learnable programming.
- 2012‑09‑28:
Flex Projector: create custom world map projections.
- 2012‑09‑28:
Tracking stealth planes using passive radar.
- 2012‑09‑28:
Windows 8 does not work very well on high-pixel-density displays.
- 2012‑09‑28:
Tuning Linux TCP/IP for scalability.
- 2012‑09‑28:
Adobe code signing infrastructure was compromised and used to authenticate malware.
- 2012‑09‑28:
Man jailed for accidentally sexting everyone in his contacts list.
- 2012‑09‑28:
Visualizing language knowledge in Europe.
- 2012‑09‑27:
First beta release of Mozilla Persona: web login without passwords.
- 2012‑09‑27:
Enumerating regular languages, countably infinite sets, and Cantor diagonalization.
- 2012‑09‑27:
Alice and Bob can go on holiday! Describing crypto with Sita and Rama.
- 2012‑09‑27:
Flexible and robust key rollover in DNSSEC.
- 2012‑09‑27:
How to build a windmill.
- 2012‑09‑27:
Inside the CleanIT conflict.
- 2012‑09‑27:
Rust is the language of the future for systems programming.
- 2012‑09‑27:
OStatus: like Twitter, but open.
- 2012‑09‑27:
Plebgate and the new snobbery.
- 2012‑09‑27:
Enhanced WWVB long-wave time broadcast format.
- 2012‑09‑27:
NoPassword: log into a website with just an email address.
- 2012‑09‑27:
Ejecta: fast JavaScript canvas and audio for iOS, without the rest of the browser.
- 2012‑09‑27:
In defence of skeuomorphism.
- 2012‑09‑27:
Apple Safari .mobi viewport insanity.
- 2012‑09‑26:
London's surnames mapped.
- 2012‑09‑26:
How long does it take to earn the price of a beer?
- 2012‑09‑26:
Honu: macros for algebraic notation through enforestation.
- 2012‑09‑26:
Cautionary tales about copyright licence fee collection societies.
- 2012‑09‑26:
Coming next November: comet ISON, 15 times brighter than the moon.
- 2012‑09‑26:
Wind turbines do in fact reduce carbon emissions, despite needing backup when the weather is calm.
- 2012‑09‑26:
US State Department uses illegal impossible-to-complete application forms to prevent people getting passports.
- 2012‑09‑26:
The CRIME attack: TLS compression leaks enough information to recover cookies.
- 2012‑09‑26:
Scottish Labour plans to end free universal benefits.
- 2012‑09‑26:
IPv4 address transfer markets are forming where we least expected.
- 2012‑09‑26:
Breakthrough silicon scanning discovers backdoor in military chip.
- 2012‑09‑26:
EU Clean IT project plans for large-scale surveillance of all communications.
- 2012‑09‑25:
How wood rots inside secret bunkers.
- 2012‑09‑25:
The entire field of particle physics is set to switch to open-access publishing.
- 2012‑09‑25:
IEEE web log data breach.
- 2012‑09‑25:
Complementary validation: proofs, programs, prose.
- 2012‑09‑25:
Everything you need to know about hash length extension attacks.
- 2012‑09‑25:
DENIC uses RIPE Atlas to analyse DNS mangling by the Great Firewall of China.
- 2012‑09‑25:
The smallest minimum ice extent ever, not just in the satellite record, but probably the last million years.
- 2012‑09‑25:
Meeting a troll.
- 2012‑09‑25:
The joys and hazards of multi-process browser security.
- 2012‑09‑25:
mypy is an experimental Python variant with static duck typing and compiled to native code.
- 2012‑09‑25:
MakerBot does not think carbon-copy cloning is acceptable.
- 2012‑09‑25:
Google Spanner: NoSQL is out and NewSQL is in.
- 2012‑09‑25:
The uk.ac.cam.cl problem.
- 2012‑09‑24:
Crowdsourced patent-busting with Stack Exchange.
- 2012‑09‑24:
To cite "shouting 'Fire!' in a crowded theatre" adds nothing to a debate about free speech.
- 2012‑09‑24:
DNS dampening.
- 2012‑09‑24:
Counting DNSSEC.
- 2012‑09‑24:
How to stop hospitals from killing us.
- 2012‑09‑23:
sweet.js: hygienic macros for JavaScript.
- 2012‑09‑23:
DNSSEC for tinydns.
- 2012‑09‑23:
Dear Apple, it's not me, it's you.
- 2012‑09‑23:
The drugs don't work.
- 2012‑09‑22:
What business is Wall Street in.
- 2012‑09‑22:
Patent trolls and video streaming.
- 2012‑09‑21:
Elsevier's impending "catastrophe" and the cost of scholarly publishing.
- 2012‑09‑21:
iPhone 5 teardown.
- 2012‑09‑21:
DNSSEC resolver test.
- 2012‑09‑21:
Measuring occurence of DNSSEC validation.
- 2012‑09‑21:
The case for a truly liberal party.
- 2012‑09‑20:
Amazing Week 2012: blog about something great that we take for granted, between 15 and 21 October.
- 2012‑09‑20:
Evolution of E. coli in the lab.
- 2012‑09‑20:
OpenStreetMap apps for iOS.
- 2012‑09‑20:
GitHub humans.txt
- 2012‑09‑20:
The myth of the European Court of Human Rights' “War on Britain”.
- 2012‑09‑20:
scrypt-jane: a flexible implementation of a memory-hard password hasher.
- 2012‑09‑19:
Our Arup building, from which we are soon to be evicted.
- 2012‑09‑19:
Study reveals overweight teens have fewer arms than healthy-weight ones.
- 2012‑09‑19:
Rackspace's response to patent troll.
- 2012‑09‑19:
Patents on content-addressed storage and hash deduplication.
- 2012‑09‑19:
Patent troll sues Rackspace for hosting Github, and other users of content-addressible storage.
- 2012‑09‑18:
Complexity theory petting zoo: an overview of the different complexity classes.
- 2012‑09‑18:
Google gets patent on pseudonyms.
- 2012‑09‑18:
Hitler: Downfall, Gangnam Style. (YouTube)
- 2012‑09‑18:
Better eating, thanks to fermentation.
- 2012‑09‑18:
PCRE performance project: speeding it up with a JIT compiler.
- 2012‑09‑18:
How to launch a 65Gbps DDoS, and how to stop one.
- 2012‑09‑18:
The software patent solution has been right here all along?
- 2012‑09‑18:
CoffeeScript: less typing, less readability?
- 2012‑09‑18:
$45 tablets are coming.
- 2012‑09‑17:
US Copyright Act 1976 explicitly says disruptive innovation should be blocked.
- 2012‑09‑17:
How they got 25% women speakers for JSConf EU 2012.
- 2012‑09‑17:
Fenwick trees: rapidly find cumulative frequency sums.
- 2012‑09‑17:
IPv6 wireless mesh network for controlling multi-colour LED lightbulbs.
- 2012‑09‑17:
0x5f3759df and the fast reciprocal square root.
- 2012‑09‑17:
Everything is broken and nobody is upset.
- 2012‑09‑17:
Casting negative floating point numbers to unsigned integers is undefined behaviour in C.
- 2012‑09‑16:
An iPhone is worth $8700 of assistive technology.
- 2012‑09‑16:
Privacy International prospectus.
- 2012‑09‑16:
Programmable Martian watch.
- 2012‑09‑16:
The iPhone 5's A6 SoC uses a custom Apple-designed ARM core.
- 2012‑09‑16:
Enigma Crack: cryptanalysis with GPUs.
- 2012‑09‑16:
Just 100 fully-grown cod left in the North Sea.
- 2012‑09‑16:
Hillsborough cover-up warning was ignored by judicial inquiry.
- 2012‑09‑16:
Act now to stop the Communications Data Bill.
- 2012‑09‑16:
X11 turned 25 years old on the 15th September.
- 2012‑09‑15:
Spanner: Google's globally distributed database.
- 2012‑09‑15:
Haskell vs. F# vs. Scala: A comparison of high-level language features and parallelism support.
- 2012‑09‑15:
Find your nearest postbox.
- 2012‑09‑15:
Thatcher's "boot boys": When the unholy trinity of police, press and government took root.
- 2012‑09‑15:
On the (provable) security of TLS.
- 2012‑09‑14:
GitHub downtime: MySQL / heartbeat / pacemaker automatic failover failure.
- 2012‑09‑14:
iPhone announcement adjective supercut.
- 2012‑09‑14:
Plan 9 for Raspberry Pi.
- 2012‑09‑14:
Huge drop in students starting university in UK.
- 2012‑09‑14:
Efficient compilation of tail calls and continuations to JavaScript.
- 2012‑09‑14:
Baserock Slab ARM cluster in a box.
- 2012‑09‑14:
afraid.org used for DNS reflection/amplification attacks.
- 2012‑09‑14:
"Your adventure ends here." (On interactive fiction.)
- 2012‑09‑14:
Never use afraid.org as a DNS hosting provider.
- 2012‑09‑14:
Compare distortion of different map projections. (interactive)
- 2012‑09‑14:
Space-filling polyhedra.
- 2012‑09‑14:
RIPE NCC is down to its last IPv4 /8.
- 2012‑09‑14:
Astonishingly, it is slow to build and execute a template engine from scratch in the browser for every page.
- 2012‑09‑14:
GIF sockets.
- 2012‑09‑14:
The caves of Nottingham.
- 2012‑09‑14:
EMFcamp: getting network connectivity to a field in Milton Keynes.
- 2012‑09‑13:
TLS, CRIME, BEAST and you the programmer.
- 2012‑09‑13:
Cosmo, the hacker 'god' who fell to earth.
- 2012‑09‑13:
Responsive web design resources.
- 2012‑09‑13:
Newspaper circulation is inversely proportional to perceived trustworthiness.
- 2012‑09‑13:
What is my IT strategy?
- 2012‑09‑13:
Xiki: executable wiki / shell / terminal / editor.
- 2012‑09‑13:
Comcast's operational experiences with DNSSEC.
- 2012‑09‑12:
Java concurrent HashMap benchmark.
- 2012‑09‑12:
Outlaw possession of written accounts of child abuse says dangerous loon Conservative MP.
- 2012‑09‑12:
Could your domain survive a DNS attack?
- 2012‑09‑12:
How Troy, MI saved its library. (Vimeo)
- 2012‑09‑12:
Child porn laws aren't as bad as you think: they're much, much worse.
- 2012‑09‑12:
Mozilla Opus flexible audio codec published as RFC 6716, which includes a reference implementation!
- 2012‑09‑12:
Olympic games vs. Highland games.
- 2012‑09‑12:
The proper way to lock your bicycle.
- 2012‑09‑12:
Legalizing child pornography is linked to lower rates of child sex abuse.
- 2012‑09‑12:
A touch of the Galois: on the possible proof of the abc conjecture.
- 2012‑09‑12:
Wikitravel and Wikimedia are in a legal battle... but not over Creative Commons.
- 2012‑09‑12:
Magic: The Gathering is Turing complete.
- 2012‑09‑12:
Botnet detection techniques.
- 2012‑09‑12:
The "spark file": a way to defrag your brain.
- 2012‑09‑11:
Big society in action: Squatters reopen Friern Barnet library after council closed it.
- 2012‑09‑11:
Confession of Faith Ratification Act 1690: Chapter xxiv: Of Marriage and Divorce.
- 2012‑09‑11:
KindleBerry Pi.
- 2012‑09‑11:
The cookie law is dead. (Until November?)
- 2012‑09‑11:
Sparse Merkle trees for revocation transparency and sovreign keys.
- 2012‑09‑11:
Google's Pluto top-of-rack switch has interesting 10Gbit PHYs.
- 2012‑09‑10:
Skeu It! A celebration of arbitrary and gratuitous user interface design.
- 2012‑09‑10:
Alzheimer's could be the most catastrophic effect of junk food.
- 2012‑09‑10:
The world's shiniest living thing is an African fruit that looks like a pointillist bauble.
- 2012‑09‑10:
PostgreSQL: when it's not your job.
- 2012‑09‑10:
Amazing magic: Shell game, with transparent cups. (YouTube)
- 2012‑09‑10:
Chip and Skim: massive vulnerability in bank card system due to ATMs' insecure random numbers.
- 2012‑09‑10:
OpenStreetMap: four years of edits. (Vimeo)
- 2012‑09‑10:
Why posession of child porn should not be illegal.
- 2012‑09‑10:
Overweight adolescents and teenagers consume fewer calories than their healthy weight peers.
- 2012‑09‑10:
Lessons for uncultured web developers.
- 2012‑09‑10:
Soft water exacerbates alcoholic liver disease.
- 2012‑09‑10:
Structurelessness: what open activities can learn from second wave feminists.
- 2012‑09‑10:
DNS Flood Detector: detect abuse of open recursive name servers.
- 2012‑09‑10:
Dissent: accountable anonymous group communication.
- 2012‑09‑09:
Should we MAC-then-encrypt or encrypt-then-MAC?
- 2012‑09‑09:
The tragedy of the European Union and how to resolve it.
- 2012‑09‑09:
Insecure programming by example.
- 2012‑09‑08:
In looming federalism fight, three states say feds can't 'unmarry' gay couples.
- 2012‑09‑08:
How we happened to sell off our electricity.
- 2012‑09‑08:
The previous history of Mendax / Julian Assange.
- 2012‑09‑08:
Disks from the perspective of a file system.
- 2012‑09‑08:
Notes on Rust's garbage collector.
- 2012‑09‑08:
PHPSESSID is predictable.
- 2012‑09‑08:
How to win at Connect 4.
- 2012‑09‑08:
Bitcoin and the Byzantine Generals problem.
- 2012‑09‑07:
Google acquires VirusTotal.
- 2012‑09‑07:
The demise of a social media platform: Tracking LiveJournal's decline.
- 2012‑09‑07:
d20 randomness test: 20,000 rolls of Chessex and GameScience dice.
- 2012‑09‑07:
Large scale DNSSEC with PowerDNS: best current practice and problems.
- 2012‑09‑07:
StatDNS: TLD zone file statistics.
- 2012‑09‑07:
A virus that kills cancer: the cure that's waiting in the cold.
- 2012‑09‑07:
Simon Burns, the new transport minister, crashed into a cyclist with his 4x4.
- 2012‑09‑07:
Raspberry Pi made in the UK!
- 2012‑09‑07:
The Linux graphics stack.
- 2012‑09‑06:
Pro tip: if you rely on unpaid volunteers to run your website, don't sue them.
- 2012‑09‑06:
CCNx: content-centric networking.
- 2012‑09‑06:
Networking named content. (Introducing CCNx.)
- 2012‑09‑06:
New attack uses SSL/TLS information leak to hijack https session cookies.
- 2012‑09‑06:
Increasing equality reduces gender differences in mate preferences, contradicting evolutionary psychology.
- 2012‑09‑06:
Guided busway could cost local taxpayers up to £102 million.
- 2012‑09‑06:
Oracle sued for $6 billion, but Google won $1.1 million.
- 2012‑09‑06:
History and anatomy of a silly drug ban.
- 2012‑09‑06:
Copyright killbots take official Democratic National Convention video off YouTube after loads of bogus complaints.
- 2012‑09‑06:
Avoiding hash lookups in a Ruby implementation on the JVM.
- 2012‑09‑06:
Google search is only 18% search.
- 2012‑09‑05:
Discovering path MTU black holes on the Internet using RIPE Atlas.
- 2012‑09‑05:
Paul Wouters on DNSSEC at the Linux Security Summit 2012.
- 2012‑09‑05:
Why Sony did not invent the iPod: established business models vs disruptive innovation.
- 2012‑09‑05:
Stuxnet: leaks or lies?
- 2012‑09‑05:
Namespaces are obsolete.
- 2012‑09‑05:
The new King's Cross concourse was shaped 12,000 years ago.
- 2012‑09‑05:
The thin blue lie: the police usually get away with it.
- 2012‑09‑05:
Thoughts on Amazon Glacier pricing.
- 2012‑09‑05:
Cable lacing on the Mars Curiosity rover.
- 2012‑09‑05:
OpenSSH-LPK: LDAP public key storage.
- 2012‑09‑04:
Re-assessing Samsung's copycat strategy in South Korea.
- 2012‑09‑04:
Nutrition and Alzheimer's disease: the detrimental role of a high carbohydrate diet.
- 2012‑09‑04:
Fabrice Bellard's LTE 4G base station software.
- 2012‑09‑04:
Reddit's database has two tables.
- 2012‑09‑03:
Bottle cutting: a first 'crack' at recycled glass craft.
- 2012‑09‑03:
How to cut glass with string and acetone.
- 2012‑09‑03:
High-speed high-security deterministic elliptic curve signatures.
- 2012‑09‑03:
Deterministic usage of DSA and ECDSA digital signature algorithms.
- 2012‑09‑03:
Ron was wrong, Whit is right: observations of non-random key generation.
- 2012‑09‑03:
Stupid copyright enforcement robots killed the Hugo Awards live broadcast.
- 2012‑09‑03:
Apple never invented anything.
- 2012‑09‑03:
GeoDNS in Golang for the NTP pool.
- 2012‑09‑03:
Wikipedia's description of cjdns.
- 2012‑09‑03:
cjdns: a routing engine designed for security, scalability, speed and ease of use.
- 2012‑09‑03:
The Babel routing protocol.
- 2012‑09‑03:
An experimental comparison of routing protocols in multi-hop ad hoc networks.
- 2012‑09‑03:
Airmesh: a collection of open source mesh network technologies, packaged to be self-configuring.
- 2012‑09‑03:
Torvalds pours scorn on De Icaza's desktop claims.
- 2012‑09‑03:
Interview: Amelia Andersdotter, Swedish Piratpartiet MEP.
- 2012‑09‑02:
Baking Pi: operating systems development on the Raspberry Pi.
- 2012‑09‑02:
What hardware powers Etsy.com.
- 2012‑09‑02:
How two amateur sleuths looked for FinSpy software.
- 2012‑09‑02:
Tacocopter basics. (Lots of videos of RC flight.)
- 2012‑09‑02:
Flynn's IQ.
- 2012‑09‑02:
The $23,800 bug bite.
- 2012‑08‑31:
Information commissioner orders release of guide to how Queen and Prince Charles must be consulted before laws are passed.
- 2012‑08‑31:
Reinventing teaching at Harvard.
- 2012‑08‑31:
Thinking about proper implementation of tail calls in the JVM.
- 2012‑08‑31:
More examples of alarmingly slow floating point exponentiation.
- 2012‑08‑31:
Alarmingly slow floating point exponentiation in some odd cases.
- 2012‑08‑31:
Johnny can't stream: how video copyright went insane.
- 2012‑08‑31:
The history of subliminal channels.
- 2012‑08‑31:
The Newton channel: covert channels in digital signatures.
- 2012‑08‑31:
Long exposure photos of fireworks.
- 2012‑08‑31:
How the turtle got its shell.
- 2012‑08‑30:
Kubrick: one-point perspective. (Vimeo)
- 2012‑08‑30:
The federal bailout that saved Mitt Romney.
- 2012‑08‑30:
Patents considered evil.
- 2012‑08‑30:
How did the proof get in the pudding?
- 2012‑08‑30:
Tabasco sort: a super-optimal merge sort.
- 2012‑08‑30:
Lessons from deploying IPv6 at Brno University of Technology.
- 2012‑08‑30:
Hopefully more controversial opinions on programming.
- 2012‑08‑30:
Most online journalism is rotten to the core.
- 2012‑08‑30:
The dictator's practical Internet guide to power retention.
- 2012‑08‑30:
The cost of advertising a route into the Internet DFZ using BGP.
- 2012‑08‑30:
Damn cool algorithms: homomorphic hashing.
- 2012‑08‑30:
What killed the Linux desktop.
- 2012‑08‑30:
How to crack a WiFi password without breaking a sweat.
- 2012‑08‑29:
A history of the floppy disk.
- 2012‑08‑29:
OpenSolaris / OpenIndiana / Illumos is dying!
- 2012‑08‑29:
The NSA's domestic spying program. (video)
- 2012‑08‑29:
dnsxss: stuffing JavaScript into DNS names.
- 2012‑08‑29:
Another 40 years of copyright bullshit, but the Pirate Party will have won long before then.
- 2012‑08‑29:
Apple Thunderbolt to FireWire adapter teardown - there *is* an Intel Thunderbolt chip after all.
- 2012‑08‑29:
Apple: I love to hate, and hate to love thee.
- 2012‑08‑29:
30% of IPv4 address space is unused.
- 2012‑08‑29:
"A calorie is a calorie" violates the second law of thermodynamics.
- 2012‑08‑29:
Hidden truths about calories.
- 2012‑08‑29:
What happens to stolen bicycles?
- 2012‑08‑29:
Decentralized software is 10x harder.
- 2012‑08‑28:
Is there a limit to how tall buildings can get?
- 2012‑08‑28:
With over 760,000 signed domains, .NL has the most DNSSEC deployment of all TLDs.
- 2012‑08‑28:
Different polling companies have differently biased results owing to their methodologies.
- 2012‑08‑28:
How OfflineIMAP works.
- 2012‑08‑28:
An evil undead credit card.
- 2012‑08‑28:
High Weirdness By Mail.
- 2012‑08‑27:
How #TwitterGulag works: deliberately triggering account suspension.
- 2012‑08‑27:
DNS related RFCs.
- 2012‑08‑27:
Comparison and analysis of managed DNS providers.
- 2012‑08‑26:
Spammers make $200 million a year in total and cost everyone $20 billion.
- 2012‑08‑26:
Dynamic programming versus memoization.
- 2012‑08‑26:
Ball on a blivet.
- 2012‑08‑26:
Flat lens produces a perfect image.
- 2012‑08‑26:
The lack of pictures of Neil Armstrong on the moon.
- 2012‑08‑25:
The Bayesian temptation of Christ.
- 2012‑08‑25:
Animation of a broken space elevator.
- 2012‑08‑25:
The GCSE grading scandal: where to look for the smoking gun.
- 2012‑08‑25:
Sedentary western bodies use as much energy as active hunter-gatherers.
- 2012‑08‑25:
Water wigs.
- 2012‑08‑25:
Fleksy: better touch screen typing?
- 2012‑08‑25:
BIOS protection guidelines for servers.
- 2012‑08‑25:
Hardware backdooring is practical.
- 2012‑08‑24:
The atrocious state of maternity leave in the US.
- 2012‑08‑23:
Random-sample elections.
- 2012‑08‑23:
The case of the FUCK-A-DUCK RSA private key.
- 2012‑08‑23:
The innovations of Microsoft Internet Explorer.
- 2012‑08‑22:
Parallel programming for C and C++ done right (a work in progress).
- 2012‑08‑22:
Leap touch-free motion sensing input device.
- 2012‑08‑22:
ICANN's new GTLD boondoggle.
- 2012‑08‑22:
The London Cycling Campaign visited Cambridge.
- 2012‑08‑22:
7 reasons why numbered lists are bad for blogging.
- 2012‑08‑22:
The most valuable company of all time? Not Apple. Not Microsoft.
- 2012‑08‑22:
Measuring Worth: five calculations of the relative value of amounts in UK pounds, 1270 to the present.
- 2012‑08‑22:
Paperbacks transformed the way Americans read (years later than Europeans).
- 2012‑08‑22:
Google's top advertisers.
- 2012‑08‑21:
Hollywood encourages online piracy.
- 2012‑08‑21:
Campaign for Science & Engineering.
- 2012‑08‑21:
The problem with mansplaining: women are told they are not reliable witnesses to their own lives, that the truth is not their property.
- 2012‑08‑21:
PC obsolescence is obsolete.
- 2012‑08‑21:
Bad news for new TLDs: porn sites get the go-ahead to sue ICANN and ICM over the .xxx trademark shake-down.
- 2012‑08‑21:
Patent troll Intellectual Ventures has 1200+ shell companies holding tens of thousands of patents.
- 2012‑08‑21:
Fifty shades of lorem ipsum.
- 2012‑08‑21:
Why do we let the Prudocracy police our sexual fantasies?
- 2012‑08‑21:
Corporate bickering hobbled better audio compression.
- 2012‑08‑20:
Victorian sexual slang.
- 2012‑08‑20:
So many similarities between copyright law and Prohibition.
- 2012‑08‑20:
The Internet Society on the technical implausibility of proposed ITU Internet regulations.
- 2012‑08‑20:
FreeBSD setup on the Raspberry Pi.
- 2012‑08‑20:
USPTO says serious problems are found in the vast majority of re-examined US patents.
- 2012‑08‑20:
FACT's victory over Surfthechannel is a decisive blow in the copyright wars.
- 2012‑08‑20:
The Information Commissioner's Office has no investigative team to enforce the cookie directive.
- 2012‑08‑20:
"The entire dot-com era was a disaster for computing in general and for software quality and Unix in particular." - phk
- 2012‑08‑20:
Mars landing videos and other casualties of the copyright robot wars.
- 2012‑08‑20:
Your words are wasted on social silos.
- 2012‑08‑20:
Shadows in the woods: a children's board game based on beams of light from a candle.
- 2012‑08‑20:
DNS traffic amplification attacks emanating from China Unicom.
- 2012‑08‑20:
Programming languages have social mores not idioms.
- 2012‑08‑20:
1024cores: lockfree, waitfree, obstructionfree synchronization algorithms and data structures.
- 2012‑08‑19:
British government wants even more secret court hearings. Justice must not be seen to be done!
- 2012‑08‑19:
FeML: a skeleton of a femto-ML with nothing but polymorphic variants and functions.
- 2012‑08‑19:
Dear Apple: please set iMessage free.
- 2012‑08‑19:
Even more important than shipping containers.
- 2012‑08‑19:
Punks and chess players: when Putin's thugs arrested Kasparov.
- 2012‑08‑18:
€1 million swiped from ATMs using bent forks.
- 2012‑08‑18:
Idiot police don't understand the difference between anarchists and terrorists.
- 2012‑08‑18:
The IETF argues about making malware-in-the-middle attacks a standard feature of https.
- 2012‑08‑18:
America needs to learn from other better countries.
- 2012‑08‑18:
Historical music sales: the false sales spike of CDs and the rise of the download single.
- 2012‑08‑18:
Redefining the introduction to computer science at Khan Academy.
- 2012‑08‑17:
O'Caml vs SML.
- 2012‑08‑17:
Private justice: Hollywood money put a Brit behind bars.
- 2012‑08‑17:
This is how Visa works.
- 2012‑08‑17:
SURFnet's DNSSEC signer migration.
- 2012‑08‑17:
How Mat Honan got his digital life back again after an epic hacking.
- 2012‑08‑17:
Expansion-passing style: a general macro mechanism.
- 2012‑08‑17:
The emerging revolution in game theory: Press-Dyson strategies for the iterated prisoner's dillema.
- 2012‑08‑16:
Why the sexy A-levels blog must die.
- 2012‑08‑16:
Mutilating girls is not "harm": the extreme relativist strand in anthropology.
- 2012‑08‑16:
Health and safety law is not bureaucratic nonsense.
- 2012‑08‑15:
The real story behind the conviction of SurfTheChannel´s owner Anton Vickerman.
- 2012‑08‑15:
RIPE has reallocated two of the DNSchanger IP address blocks to legit users.
- 2012‑08‑15:
Richard Branson rails against the government's insane treatment of unrealistically large franchise bids.
- 2012‑08‑15:
Tupper's self-referential formula.
- 2012‑08‑15:
People of Ely! You live in paraidse!
- 2012‑08‑15:
The Ladycoders project, interviewing and career advice.
- 2012‑08‑15:
Stop publishing web pages: users want information streams.
- 2012‑08‑15:
ANI dataflow programming language.
- 2012‑08‑15:
Technology is making surveillance dystopia not just possible, but cheap.
- 2012‑08‑15:
Hachette doubles down on DRM.
- 2012‑08‑15:
Why trousers? Horses.
- 2012‑08‑14:
Feminist real ale.
- 2012‑08‑14:
"Make us do the math. Some day, we'll thank you."
- 2012‑08‑14:
Which are more legible: serif or sans serif typefaces?
- 2012‑08‑14:
How we know the galaxy is a spiral.
- 2012‑08‑14:
Running a pirate video search engine is conspiracy to defraud.
- 2012‑08‑14:
The witch hunt that ruined Simon Walsh's life.
- 2012‑08‑14:
Erased Landscape: the making of flat land in sandy San Francisco.
- 2012‑08‑14:
United Airlines lost a ten year old unaccompanied child and didn't care.
- 2012‑08‑14:
Yo-yo tricks IN SPACE! (YouTube)
- 2012‑08‑14:
Progressive Insurance prefers to defend killers rather than pay out on a policy.
- 2012‑08‑14:
Differences between white American terrorists and others.
- 2012‑08‑13:
Heroin's exaggerated reputation.
- 2012‑08‑13:
What "Worse is Better vs The Right Thing" is really about.
- 2012‑08‑12:
An argument against call/cc.
- 2012‑08‑12:
A review of Neal Stephenson's book Anathem.
- 2012‑08‑11:
One in four deaths are 'not properly recorded'.
- 2012‑08‑11:
"Stay the hell out of other people's code."
- 2012‑08‑11:
Browserver: an HTTP server in your web browser.
- 2012‑08‑11:
Choice of font measurably affects how readers treat your writing.
- 2012‑08‑11:
The Martini FAQ.
- 2012‑08‑10:
The porn trial verdict is no reason to celebrate.
- 2012‑08‑10:
Why it is a bad idea to share DNSSEC keys between zones.
- 2012‑08‑10:
The Director of Public Prosecutions was personally responsible for pursuing the Twitter Joke Trial.
- 2012‑08‑10:
The High Court ruling which could break the Internet: could linking to a website be copyright infringement?
- 2012‑08‑09:
The Trailing Edge: computing's last stand.
- 2012‑08‑09:
LuaJIT now supports VFP and hardware floating point on ARM v6+.
- 2012‑08‑09:
Les Earnest's analog to digital conversion. (A memoir)
- 2012‑08‑09:
Male contraception methods.
- 2012‑08‑09:
Man arrested for not enjoying himself at the Olympics.
- 2012‑08‑09:
UK academic salaries competitive with those in the US.
- 2012‑08‑09:
Cambridge University granted planning permission for £1 billion North West Cambridge development.
- 2012‑08‑09:
SipHash: a fast short-input PRF.
- 2012‑08‑08:
Clever packaging helps new users get started with their phone. (Vimeo).
- 2012‑08‑08:
Billionaire backers pick American politicians, and all that matters is who gets the ad money.
- 2012‑08‑07:
Raging bulls: Wall Street's addiction to high frequency trading.
- 2012‑08‑07:
Loco2: Europe by train made easy.
- 2012‑08‑07:
.nl now has more DNSSEC domain names than any other TLD.
- 2012‑08‑07:
High-frequency trading volumes, 2007 - 2012.
- 2012‑08‑07:
Obituary of Sir Bernard Lovell, founder of the Jodrell Bank radio observatory.
- 2012‑08‑07:
Federated domain name service using DNS metazones
- 2012‑08‑07:
RFC 6698: The DANE TLS protocol: DNS-based authentication of TLS servers using TLSA records.
- 2012‑08‑07:
Apple and Amazon security flaws that led to an epic hacking.
- 2012‑08‑06:
Open source reader and security analysis of Apple FileVault 2 full disk encryption.
- 2012‑08‑06:
Notes on logstash and graylog2.
- 2012‑08‑05:
An explanation for the Knight Capital fuckup: test code deployed in production.
- 2012‑08‑05:
That dangerously loveable rogue Boris Johnson.
- 2012‑08‑05:
Cliodynamics uses scientific methods to illuminate the past. Historians are not so sure.
- 2012‑08‑04:
Explanations of free software package names.
- 2012‑08‑04:
"Yes, I was hacked. Hard." Remote wipe disaster.
- 2012‑08‑03:
SpaceX gets $440 million contract from NASA for manned space vehicle.
- 2012‑08‑03:
Lesser known DNS tools and BIND tricks.
- 2012‑08‑03:
Written conversation between two people falls under the obscene publications act.
- 2012‑08‑03:
Why men can't have it all.
- 2012‑08‑03:
Auditor-driven IPv6 deployment.
- 2012‑08‑03:
Jane Austen's Fight Club
- 2012‑08‑02:
Scientology's concentration camp for its executives: the prisoners, past and present.
- 2012‑08‑02:
Backlash: defending freedom of expression and sexual autonomy in the UK.
- 2012‑08‑02:
Mandatory helmets for car users could save 17 times the people from death by head injury as a helmet law for cyclists.
- 2012‑08‑02:
Save A Cheese: rescue Parmesan from earthquakes.
- 2012‑08‑02:
What if other sports were photographed like beach volleyball?
- 2012‑08‑02:
Body armour reality check.
- 2012‑08‑02:
Linux and OpenGL faster than Windows and Direct3D.
- 2012‑08‑02:
Don't develop for proprietary platforms (Facebook, Twitter) with advertising-driven conflicts of interest.
- 2012‑08‑02:
A non-historical approach to teaching quantum physics.
- 2012‑08‑01:
The business of Bond: interactive visualisation of 007 film budgets and box office returns.
- 2012‑08‑01:
The Aurora shooter's defensive SWAT gear killed the NRA's answer to gun violence.
- 2012‑08‑01:
Incitement to riot and freedom of speech online in the USA.
- 2012‑07‑31:
A few PowerPoint tips.
- 2012‑07‑31:
Routers from China's Huawei are vulnerable to trivial attacks.
- 2012‑07‑31:
Boris Johnson still schmoozing with Rupert Murdoch.
- 2012‑07‑31:
There's free (as in beer) and free (as in speech) but the lesser-known third option is ...
- 2012‑07‑31:
London tourist attractions lack visitors because of Olympics.
- 2012‑07‑31:
Connecting Cambridgeshire: measuring demand for better broadband.
- 2012‑07‑31:
Cracking MS-CHAPv2 with a 100% success rate.
- 2012‑07‑31:
Thomas Heatherwick: London's greatest modern designer?
- 2012‑07‑31:
Prosecuted for receiving pictures of fisting via email.
- 2012‑07‑31:
Practical machine learning tricks from Google.
- 2012‑07‑31:
Netflix Chaos Monkey released into the wild.
- 2012‑07‑31:
Lessons in website security anti-patterns by Tesco.
- 2012‑07‑31:
When the Internet interprets censorship as damage and routes around it, you don't necessarily get your account back.
- 2012‑07‑31:
ASCII street view.
- 2012‑07‑30:
Book review: "The Nurture Assumption"
- 2012‑07‑30:
80% of Facebook ad clicks are by bots.
- 2012‑07‑30:
Ubisoft "Uplay" DRM allows any website to take over your computer if you have one of their games installed.
- 2012‑07‑29:
Good evidence from Korea that real name policies do not improve online behaviour.
- 2012‑07‑29:
Employment Minister Chris Grayling moves to push the "sicker than expected" into work.
- 2012‑07‑29:
The London Olympics are the most Right-wing major event in Britain's modern history.
- 2012‑07‑29:
Music labels won't share Pirate Bay loot with artists.
- 2012‑07‑29:
Climate change skeptics funded detailed study that confirms anthropogenic temperature increase.
- 2012‑07‑29:
Apple Thunderbolt Ethernet adapter: a mini marvel.
- 2012‑07‑27:
Birth of ARPANET 1967-1969.
- 2012‑07‑27:
Structure and Interpretation of Computer Programs: high-res open-source PDF.
- 2012‑07‑27:
The history of the NRA Is really interesting.
- 2012‑07‑27:
The Aleppo Codex: a high holy whodunnit.
- 2012‑07‑26:
Academic publishing in the humanities is stupid and it's time for a new manifesto.
- 2012‑07‑26:
Mayor's "sustainable" Olympic taxis take a 130-mile trip each day to fill up in Swindon.
- 2012‑07‑26:
Brussels rules against seed diversity.
- 2012‑07‑26:
OAuth 2.0 and the road to hell.
- 2012‑07‑26:
De-gendering academic dress at Oxford.
- 2012‑07‑25:
Pair o' Boxes: 162 paperclips, no two of which are linked.
- 2012‑07‑25:
PUP: an internetwork architecture.
- 2012‑07‑25:
Police protest tactics give officers excessive and disproportionate control.
- 2012‑07‑25:
Pepsi-drinking, Nike-wearing, MasterCard-using customers to receive 30% off as part of anti-Olympics Oddbins campaign.
- 2012‑07‑25:
The academic publishing industry is on the verge of disruption.
- 2012‑07‑24:
Police use cultural relativism as an excuse for not prosecuting female genital mutilation.
- 2012‑07‑24:
Why don't we drink milk from other animals?
- 2012‑07‑24:
Satellites see unprecedented Greenland ice sheet surface melt.
- 2012‑07‑24:
Pavlov's strategy outperforms tit-for-tat in the iterated prisoners' dilemma.
- 2012‑07‑24:
The Prisoner's Dilemma.
- 2012‑07‑24:
Sorry ladies, the IOC is above the law.
- 2012‑07‑24:
Members of Congress now want to prosecute New York Times journalists as well as WikiLeaks.
- 2012‑07‑24:
Coffee's uncanny valley.
- 2012‑07‑24:
Boris Johnson's Olympic welcome.
- 2012‑07‑24:
Collateral damage from Internet censorship by DNS mangling middleboxes.
- 2012‑07‑24:
Colours in movie posters since 1914.
- 2012‑07‑24:
Forty data communications research questions.
- 2012‑07‑23:
Skeuomorphs: where Microsoft has better taste than Apple.
- 2012‑07‑23:
A profile of Eugene Kaspersky.
- 2012‑07‑23:
2012 disasters: collected Olympic news.
- 2012‑07‑23:
Local parish magazine banned because village is on Olympic cycle route.
- 2012‑07‑23:
Why does the IT industry continue to listen to Gartner?
- 2012‑07‑23:
allRGB: a collection of images with one pixel in each possible colour.
- 2012‑07‑23:
Resources for learning practical category theory.
- 2012‑07‑23:
How should we talk to men about sexism?
- 2012‑07‑23:
Expensive lessons in Python performance tuning.
- 2012‑07‑23:
Raspberry Pi persistence of vision magic wand.
- 2012‑07‑23:
From Bedrooms to Billions: a planned documentary about the history of the British games industry.
- 2012‑07‑23:
Notch on patents.
- 2012‑07‑23:
Julia programming language presented at Lang.NEXT.
- 2012‑07‑23:
Mathematicians' preferences for analysis or algebra predict how they eat corn on the cob.
- 2012‑07‑22:
The price of gun control.
- 2012‑07‑22:
Why you won't see "hard" augmented reality any time soon.
- 2012‑07‑22:
Police and BBC deny people access to their own homes near the Olympics.
- 2012‑07‑22:
iFixit won't hire people who use poor grammar.
- 2012‑07‑22:
Wildebeest think about crossing a river. (video)
- 2012‑07‑22:
A Tall Tail by Charles Stross.
- 2012‑07‑21:
Private hospital told doctors to delay NHS work to boost profits.
- 2012‑07‑21:
Insert iPad Mini here.
- 2012‑07‑21:
Stunning timelapse views from the international space station at night. (Vimeo)
- 2012‑07‑21:
Tim O'Reilly on the clothesline paradox and the sharing economy. (YouTube)
- 2012‑07‑21:
Google is publishing a huge database of links to pirated media, in the form of the copyright takedown demands they receive.
- 2012‑07‑21:
The lost decade of digital music sales.
- 2012‑07‑21:
Why women still can't have it all.
- 2012‑07‑21:
The RIRs in a post-IPv4 world: is the end of IP address policy making nigh?
- 2012‑07‑21:
Legacy IP addresses on JANET.
- 2012‑07‑21:
Prime number patterns.
- 2012‑07‑21:
Microsoft changes Skype supernodes architecture to support wiretapping.
- 2012‑07‑20:
Fortress programming language project to cease.
- 2012‑07‑20:
Alternating current: the pulsating horror lying in wait to cull the stupid and unlucky.
- 2012‑07‑20:
Genetic Programming: evolving a Mona Lisa made from 50 semi-transparent polygons.
- 2012‑07‑20:
Nokia Q2 Results: Bad bad and will be even more bad.
- 2012‑07‑20:
The inductive / deductive schism.
- 2012‑07‑20:
What .co's first two years can tell new TLD applicants.
- 2012‑07‑20:
Move the market for illegal drugs online: reduce violent criminality and improve safety.
- 2012‑07‑20:
Lives on the Line: life expectancy and child poverty as a tube map.
- 2012‑07‑20:
Pibow: layered case for Raspberry Pi.
- 2012‑07‑20:
tiqr: open source authentication for web applications using smart phones and QR codes.
- 2012‑07‑20:
Domain domination: .com is larger than all ccTLDs combined.
- 2012‑07‑20:
Battleground America: one nation under the gun.
- 2012‑07‑20:
"How I lost my fear of universal health care."
- 2012‑07‑20:
Tim Harford on preventing financial meltdowns. (YouTube)
- 2012‑07‑20:
Dubstep Droid Dispute. (Vimeo)
- 2012‑07‑20:
Public engagement and science communication: a waste of money?
- 2012‑07‑20:
Database microbenchmarks.
- 2012‑07‑20:
Freak pavement explosions have injured at least seven people in London.
- 2012‑07‑20:
Photos showing the formation of an oxbow lake in Texas
- 2012‑07‑20:
Archaeologists discover surprisingly old bras in Austria.
- 2012‑07‑20:
California whooping cough epidemic: anti-vaccination movement to blame for nine deaths.
- 2012‑07‑20:
Enterprise IT adoption cycle.
- 2012‑07‑20:
Wildcard domain DNSSEC validator test.
- 2012‑07‑20:
DNSSEC and SSHFP support: VerifyHostKeyDNS = maybe.
- 2012‑07‑20:
Kinder eggs are illegal in the USA and carry a $2500 fine per egg.
- 2012‑07‑20:
Living with HTTPS.
- 2012‑07‑19:
Why marijuana is illegal everywhere.
- 2012‑07‑19:
iPhone pricing and US market share.
- 2012‑07‑19:
cqueues: an event loop interface based on stackable continuation queues for Lua.
- 2012‑07‑19:
Unofficial git repository for Olson TZ database and code with complete SCCS history back to 1984.
- 2012‑07‑19:
PE101: the structure and execution of a simple Windows program.
- 2012‑07‑18:
BrowserAuth.net: towards stronger authentication for the web.
- 2012‑07‑18:
Nigori: storing secrets in the cloud.
- 2012‑07‑18:
Scots should shoot muntjac deer on sight.
- 2012‑07‑18:
The exploration explosion: why did Europeans start sailing far from shore in the 1480s?
- 2012‑07‑17:
Emma Sky's remarkable work rebuilding Iraq.
- 2012‑07‑17:
Alexander the not so Great: history through Persian eyes.
- 2012‑07‑17:
Open access to all British publicly-funded research papers within two years.
- 2012‑07‑17:
What Central Europe thinks of Britain.
- 2012‑07‑17:
Visiting a newspaper website in the UK can be a breach of copyright.
- 2012‑07‑16:
Shell tries to crowdsource an ad campaign in support of arctic oil exploitation. Hilarity ensues.
- 2012‑07‑15:
MPs who repaid expenses got money back in secret deal.
- 2012‑07‑15:
Metapizza.
- 2012‑07‑15:
Can fellatio cure morning sickness? asks evolutionary psychologist .
- 2012‑07‑14:
Dry weather hampers Western Isles crofters. (With amazing June rainfall map of UK.)
- 2012‑07‑14:
Heber X10i USB-connected IO board.
- 2012‑07‑14:
Manchester University computer science projects using Raspberry Pi.
- 2012‑07‑13:
New US federal ban on some synthetic recreational drugs is unsurprisingly already obsolete.
- 2012‑07‑13:
Erlang on Xen: a bare virtual machine with no OS layer.
- 2012‑07‑13:
Lansley goes for full-scale NHS privatisation.
- 2012‑07‑13:
When Care UK tried to poach a media relations officer from Keep Our NHS Public.
- 2012‑07‑13:
On hating the Olympics: "All modern Britain's bullshit, turned up to eleven."
- 2012‑07‑13:
Facebook might damage your reputation with sneaky political posts.
- 2012‑07‑12:
Contest to find the craziest compiler output due to undefined behavior.
- 2012‑07‑12:
Digital security and journalism: the filmmaker who accidentally revealed his sources to Syrian secret police.
- 2012‑07‑12:
Congress considers prosecuting journalists who report leaked information.
- 2012‑07‑12:
Forget teenagers, toddlers are the most terrifying creatures on Earth.
- 2012‑07‑12:
"Prople staring at computers": when art, Apple and the US Secret Service collide.
- 2012‑07‑12:
A list of static website generators.
- 2012‑07‑12:
Creative freedom vs celebrity publicity rights.
- 2012‑07‑12:
The LIBOR manipulation business model has been profitably replicated in many other quotation-based reference prices.
- 2012‑07‑11:
Amazon agrees to pay sales tax across the US so it can set up local distribution centres for same-day delivery.
- 2012‑07‑11:
Many top bankers say wrongdoing is necessary to get ahead.
- 2012‑07‑11:
Commercial academic publishers delay publication by years, using artificial scarcity to hike valuation.
- 2012‑07‑11:
The woe that is in teaching English.
- 2012‑07‑11:
An overview of Instagram's internals.
- 2012‑07‑11:
Chips may not be served by themselves at the Olympics.
- 2012‑07‑10:
Presidential pogonomania.
- 2012‑07‑10:
US urges China to set up laws that help local companies block American competitors from their market.
- 2012‑07‑10:
Origin of the @reply on Twitter.
- 2012‑07‑10:
Bees are more dangerous than terrorists; laws should be relaxed.
- 2012‑07‑10:
Icehouse pyramid toy safety testing problems.
- 2012‑07‑09:
What really makes us fat.
- 2012‑07‑09:
2012 submarine cable map.
- 2012‑07‑09:
EU Commission using Canadian trade agreement to revive ACTA.
- 2012‑07‑09:
Cyberoam CA private key decrypted.
- 2012‑07‑09:
Nyan Fax.
- 2012‑07‑09:
Fox News and CNN fucked up reporting the SCOTUS health insurance decision.
- 2012‑07‑09:
The anti-SOPA campaign genuinely changed the way in which IP treaties get negotiated.
- 2012‑07‑09:
The LIBOR scandal: "With traders, if you don’t actually nail it down, they’ll steal it."
- 2012‑07‑08:
Observationally co-operative multithreading.
- 2012‑07‑08:
Let's just solve the file format problem.
- 2012‑07‑08:
Modern large-scale technological car theft.
- 2012‑07‑08:
Shake before building: replacing Make with Haskell.
- 2012‑07‑08:
Everybody hates Firefox updates.
- 2012‑07‑08:
Illegal engineering: Tim Hunkin on safe breaking.
- 2012‑07‑08:
For two decades, popular style has been stuck on repeat, consuming the past instead of creating the new.
- 2012‑07‑08:
Keyless BMW cars are easy to steal.
- 2012‑07‑07:
How tiny wasps cope with being smaller than amoebas.
- 2012‑07‑07:
fontBomb: Stylishly destroy the web
- 2012‑07‑07:
Improving rsync performance on Linux by preserving buffer cache state.
- 2012‑07‑06:
TV Tropes insecurity: cleartext passwords in cookies.
- 2012‑07‑06:
Achieving rapid response times in large online services.
- 2012‑07‑06:
Google Public DNS goes insane when it receives malformed DNS responses.
- 2012‑07‑06:
Evolution of the F1 car. (Vimeo)
- 2012‑07‑06:
Samuel L. Ipsum: motherfucking placeholder text motherfucker!
- 2012‑07‑06:
The damage we do to young women: looking grown-up is flirting.
- 2012‑07‑06:
With all due disrespect: students must learn to argue with their tutors.
- 2012‑07‑05:
Graphic design for Nazis (literally).
- 2012‑07‑05:
Snarl: a sculpture by George W. Hart.
- 2012‑07‑05:
The National Secular Society on the National Trust's creationist visitor centre at the Giant's Causeway.
- 2012‑07‑05:
Creationists get their lies respected by the National Trust visitor centre at the Giant's Causeway.
- 2012‑07‑05:
The Carreon carry-on is over: he has given up his bogus lawsuits against The Oatmeal.
- 2012‑07‑05:
On equal marriage, secularism, and the established church.
- 2012‑07‑04:
How ACTA nearly won.
- 2012‑07‑04:
Building and dismantling the Windows advantage.
- 2012‑07‑04:
100 riffs, 1 take: a brief history of rock 'n roll. (Vimeo)
- 2012‑07‑04:
Vibe: anonymous anarchist location-sensitive twitter-alike.
- 2012‑07‑04:
The tyrannical world of Thomas the Tank Engine.
- 2012‑07‑04:
Beyond Higgs: on supersymmetry, or the lack thereof.
- 2012‑07‑04:
The LHC nightmare scenario: the Higgs and nothing else.
- 2012‑07‑04:
Millions go hungry in India while mountains of wheat rot.
- 2012‑07‑04:
MVC is dead: it's time to MOVE on.
- 2012‑07‑04:
Binary search eliminates branch mispredictions.
- 2012‑07‑04:
Allocation sinking in LuaJIT.
- 2012‑07‑04:
Anonymous publishing is dead.
- 2012‑07‑04:
Fastmail's leapsecond story.
- 2012‑07‑04:
.nl went from less than 20,000 to more than 70,000 DNSSEC signed zones in two days.
- 2012‑07‑04:
DNS-OARC reply size test server for checking EDNS / DNSSEC compatibility.
- 2012‑07‑04:
Curl's internal API shim for nine SSL libraries.
- 2012‑07‑04:
Cisco's Linksys cloud vision: mandatory, monetized, and killed at their discretion.
- 2012‑07‑04:
Sketch: vector graphics toolbox for designers.
- 2012‑07‑04:
Louis C.K. reduced scalping by 96% by selling tickets himself.
- 2012‑07‑03:
Schillings send defamation writs to people who try to defend themselves against legal threats from Retail Loss Prevention Ltd.
- 2012‑07‑03:
Summary of the storm-related Amazon Web Services outage on 29 June.
- 2012‑07‑03:
Linux leapsecond bug increased Hetzner Online power usage by one megawatt.
- 2012‑07‑03:
Send evidence against the draft communications interception bill to Julian Huppert's committee.
- 2012‑07‑03:
Security vulnerability in Cyberoam SSL malware-in-the-middle devices.
- 2012‑07‑03:
XQuartz: X.org for Mac OS X.
- 2012‑07‑03:
Semicolons: a love story.
- 2012‑07‑03:
Virtual Matthew Garrett.
- 2012‑07‑03:
Linux leap second deadlock bugs.
- 2012‑07‑03:
How to stop online piracy, NOW!!!!
- 2012‑07‑03:
Facebook's e-mail debacle.
- 2012‑07‑03:
A walk-through of inline signing with NSEC3 in BIND 9.9.
- 2012‑07‑03:
A rail prospectus for East Anglia.
- 2012‑07‑03:
Charles Carreon digs his Oatmeal / FunnyJunk hole even deeper, and Register.com betrays a customer.
- 2012‑07‑02:
Cycle facility of the month.
- 2012‑07‑02:
Bin Laden realised the truth: terrorism does not work.
- 2012‑07‑02:
The Forum of Mathematics: a new open-access venture from Cambridge University Press.
- 2012‑07‑02:
The ARPANET telnet protocol: its purpose, principles, implementation, and impact on host operating system design.
- 2012‑07‑02:
Developing telnet's negotiated options.
- 2012‑07‑02:
A review of "Trees, Maps, and Theorems: effective communication for rational minds".
- 2012‑07‑02:
DNSSEC validation in Microsoft DNS Server 2012.
- 2012‑07‑02:
Turkey City Lexicon: a primer for sf workshops.
- 2012‑07‑02:
What if roads were as bad as bike lanes...
- 2012‑07‑02:
Intravenous microparticles can re-oxygenate blood directly, when patient is unable to breathe.
- 2012‑07‑02:
Today's graduates will be poorer than their parents.
- 2012‑07‑02:
The ten-year-old "PHP doesn't work in Turkey" bug.
- 2012‑07‑02:
News Corporation bins its newspapers.
- 2012‑07‑02:
Free Software Foundation recommendations for free operating systems and Secure Boot.
- 2012‑07‑02:
Michael Rosen on schools in the 1950s.
- 2012‑07‑01:
French breathalyser law enacted after manufacturer created pressure group to lobby for it.
- 2012‑07‑01:
The Home Office really is planning to make ISPs implement malware-in-the-middle attacks on their customers.
- 2012‑07‑01:
RBS's LIBOR fraud fine to be paid by the taxpayer.
- 2012‑07‑01:
David Malone's June 2012 leap second recordings.
- 2012‑07‑01:
PHK's 2012-06-30 leap second lossage collection.
- 2012‑07‑01:
The PhD grind: a student's memoir.
- 2012‑07‑01:
ccv: a modern computer vision library: 0.1 milestone.
- 2012‑07‑01:
The Geopolitics of the United States, Part 1: The Inevitable Empire.
- 2012‑07‑01:
Open source passive DNS replication.
- 2012‑07‑01:
Sexist men on the Internet drive women away from computer science at university.
- 2012‑07‑01:
The video on benefits appeals that conservative ministers want to censor.
- 2012‑07‑01:
Patent on interoperable GPS + Galileo signals will make receivers more expensive.
- 2012‑06‑30:
Patents on medicines promote over-use, and the development of antibiotic-resistant bacteria.
- 2012‑06‑29:
HP and everyone else dropping their Windows RT devices because of Surface.
- 2012‑06‑29:
"I, pet goat II" by Heliofant. (Vimeo)
- 2012‑06‑29:
For extradition from the UK to the US, copyright violation is worse than paedophilia.
- 2012‑06‑29:
The British Banking Association's failure to regulate effectively and deal with LIBOR fraud.
- 2012‑06‑29:
The man with the iron fists: "They put the F U in kung fu."
- 2012‑06‑29:
3D maps of London Underground stations.
- 2012‑06‑29:
Python 3 Q & A.
- 2012‑06‑29:
How to break XML encryption.
- 2012‑06‑29:
Home Office confirms that US courts have jurisdiction over websites hosted in the UK with British owners and users.
- 2012‑06‑29:
The rise of nuclear fear.
- 2012‑06‑29:
The evolution of the web.
- 2012‑06‑29:
netmap: a framework for line rate 10Gbit/s packet I/O in software.
- 2012‑06‑29:
Online data breach exposes 2/3 of Korean national ID numbers.
- 2012‑06‑28:
Tookan automatically reverse-engineers a PKCS#11 token, describes its API to a model checker, which finds attack traces for execution on the token.
- 2012‑06‑28:
RSA's rebuttal is misleading about the SecurID 800 token key exposure vulnerability.
- 2012‑06‑28:
Patent trolls directly wasted $29 billion last year.
- 2012‑06‑28:
Patents are not necessary to protect inventors when they disclose information.
- 2012‑06‑28:
Microsoft's analysis of failure data from a million consumer PCs.
- 2012‑06‑28:
A message to LOCOG and the IOC.
- 2012‑06‑28:
NVidia loses huge GPU order owing to lack of open source Linux driver.
- 2012‑06‑28:
The design of SQLite4.
- 2012‑06‑28:
Owner of video links site found guilty of conspiracy to defraud.
- 2012‑06‑28:
Building Elizabeth Way in Cambridge, 1969-1971.
- 2012‑06‑28:
Texas Republicans literally want to ban critical thinking in school.
- 2012‑06‑28:
Minitel to close after 30 years: The rise and fall of the France-wide web.
- 2012‑06‑27:
Physics homework assignments from The Avengers.
- 2012‑06‑27:
DNSSEC and TLSA records for IMAP, POP3, and message submission.
- 2012‑06‑27:
SYMTRIK time receiver data sheets.
- 2012‑06‑27:
New gTLDs: root zone scaling report.
- 2012‑06‑27:
The Shard is a fragment of Qatar shoved into the heart of London.
- 2012‑06‑27:
skrollr: HTML5 + CSS3 parallax scrolling for the masses.
- 2012‑06‑27:
A rather scornful discussion of the Autonomous Internet draft.
- 2012‑06‑27:
Verisign, in charge of the root, .com, and .net, screwed up DNSSEC for their corporate zone.
- 2012‑06‑27:
Autonomous Internet loonies have patented their idea.
- 2012‑06‑27:
Modelling workload arrivals in closed and open systems: a cautionary tale.
- 2012‑06‑27:
SPDY and secure proxy support in Google Chrome.
- 2012‑06‑27:
Facts and insights into the discussion of ethical acquisition and music business models.
- 2012‑06‑27:
Google forces TV Tropes to delete pages containing critical discussion of rape and abuse.
- 2012‑06‑26:
Evil Disney.
- 2012‑06‑26:
Sandia cooler nearly ready for production.
- 2012‑06‑26:
We know what you are doing.
- 2012‑06‑26:
Insufficiently boring: an insider's view of the RBS IT screwup.
- 2012‑06‑26:
Delta compressed and deduplicated storage using stream-informed locality.
- 2012‑06‑26:
Fast key extraction attack on crypto hardware tokens. (padding oracle / side-channel)
- 2012‑06‑26:
The confusingly anti-phonetic alphabet.
- 2012‑06‑25:
Olympic park builders sacked for their political views.
- 2012‑06‑25:
Less is exponentially more: Rob Pike explains the thinking behind Golang.
- 2012‑06‑25:
Red sex / blue sex: teen pregnancy amongst teenage US evangelical protestants.
- 2012‑06‑25:
Monsanto covers the USA in superweeds, and suggests Agent Orange as the answer.
- 2012‑06‑25:
Securely transferring a DNSSEC signed zone between hosting providers.
- 2012‑06‑25:
Sonic.net deletes their logs after two weeks and you should too.
- 2012‑06‑25:
QoS across the Internet: the emperor's new clothes.
- 2012‑06‑25:
Labour plots an early sabotage of Lords reform.
- 2012‑06‑25:
The existence of the Loch Ness monster taught in US schools as evidence against evolution.
- 2012‑06‑25:
Links should never say "click here".
- 2012‑06‑25:
Why are Europeans white?
- 2012‑06‑24:
Pkgng is the next generation package management tool for FreeBSD.
- 2012‑06‑24:
Mobster banks colluded to lower municipal bond interest rates.
- 2012‑06‑24:
An economic analysis of why bank robbery is a bad idea.
- 2012‑06‑24:
Peity: mini HTML charts.
- 2012‑06‑24:
On the uses of a liberal education: As a weapon in the hands of the restless poor.
- 2012‑06‑24:
Pay attention to what Gawker is doing with comments.
- 2012‑06‑23:
Email client market share.
- 2012‑06‑23:
"How I accidentally kickstarted the domestic drone boom."
- 2012‑06‑23:
In bid for patent sanity, judge throws out entire Apple/Motorola case.
- 2012‑06‑23:
OpenStreetMap's popularity forces Google to drastically cut their maps price.
- 2012‑06‑22:
Clive James says reports of his death have been greatly exaggerated.
- 2012‑06‑22:
Top ten causes of death, 1900 vs 2010.
- 2012‑06‑22:
"With this knowledge I have been able to write the world's least clever limerick, statistically speaking."
- 2012‑06‑21:
Nanog discusses how to fix user authentication.
- 2012‑06‑21:
Batman vs. Iron Man.
- 2012‑06‑21:
A vim clutch.
- 2012‑06‑21:
Median anti-virus detection rate for email-borne malware is only 19%
- 2012‑06‑21:
The problem with Jersey.
- 2012‑06‑21:
Victorian sex factoids.
- 2012‑06‑21:
Falsehoods programmers believe about networks.
- 2012‑06‑20:
Windows Phone 7 users will not be able to upgrade to version 8.
- 2012‑06‑20:
The venereal gadfly: more notes towards a history of orgasm.
- 2012‑06‑20:
Use cases for SDN: networking is too hard because all the small problems create complexity.
- 2012‑06‑20:
How to blow $6 billion on a tech project: US military software-defined radio.
- 2012‑06‑20:
Fat in salad dressing (especially olive oil) helps you absorb nutrients from vegetables.
- 2012‑06‑20:
Unit testing isn't enough: you need static typing too.
- 2012‑06‑20:
Sorry, young man, you're not the most important demographic in tech.
- 2012‑06‑20:
"I stole the fuck out of music before there ever was an Internet."
- 2012‑06‑20:
Microsoft Surface's biggest innovation is its keyboard.
- 2012‑06‑20:
Pulp sci-fi.
- 2012‑06‑20:
Movies R fun!
- 2012‑06‑19:
Security vulnerabilities, co-ordinated disclosure, and mincing your words about where the bug is.
- 2012‑06‑19:
Copyright and transformative fair use lawsuit between origami enthusiasts unfolds.
- 2012‑06‑19:
If you were involved in the OpenGL specification in the last 9 years, you are an idiot.
- 2012‑06‑19:
Some tips for giving a presentation.
- 2012‑06‑19:
Chinese firm BSB plans to build the world's tallest building in 90 days.
- 2012‑06‑19:
The central limit theorem makes fuzz testing hard.
- 2012‑06‑19:
Holy levitating Slinky!
- 2012‑06‑19:
A profile of the sex toy industry.
- 2012‑06‑19:
A creepy photostory about mirrors.
- 2012‑06‑19:
Seven things never to say to a criminal suspect - or child.
- 2012‑06‑19:
Leaked documents show the UN's Internet power grab.
- 2012‑06‑19:
Can you recognize the million pound chair? The problem of ignorance in IT purchasing.
- 2012‑06‑19:
Timeline of the RIPE reverse DNS outage last week.
- 2012‑06‑19:
Totality vs Turing completeness.
- 2012‑06‑19:
draft-ietf-dane-protocol on the RFC Editor queue.
- 2012‑06‑19:
The concentration of tech manufacturing in a single region is a disaster waiting to happen.
- 2012‑06‑19:
Seven deadly sins of cloud computing research.
- 2012‑06‑19:
The history and technical development of Internet email.
- 2012‑06‑19:
Cross-browser ruby annotations (superscribed rubric) using HTML5 + CSS.
- 2012‑06‑19:
"Nobody ever got fired for using Hadoop on a cluster."
- 2012‑06‑19:
The decision process for specifying implementation-defined behaviour.
- 2012‑06‑19:
Home-made Fruit Cup: a low-cost Pimms alternative. (Good link for May Week!)
- 2012‑06‑19:
Traffic light FROM HELL.
- 2012‑06‑18:
Java's hashCode is not safe for distributed systems.
- 2012‑06‑18:
More falsehoods programmers believe about time.
- 2012‑06‑18:
Falsehoods programmers believe about time.
- 2012‑06‑18:
Forget Edison: the myth of the sole inventor.
- 2012‑06‑18:
Hankering for a world without "identity" or "federation".
- 2012‑06‑18:
Inventing a problem: the unfixability of the new MacBook Pro is a good thing.
- 2012‑06‑18:
FunnyJunk's lawyer sues the charities to which The Oatmeal tauntingly donated its legal defence fund.
- 2012‑06‑18:
DNAME redirection in the DNS.
- 2012‑06‑18:
Not as SPDY as you thought: for most websites, HTTP is not the bottleneck.
- 2012‑06‑18:
Even art people don't "get" contemporary art.
- 2012‑06‑18:
To sum up the Windows 8 experience with a single word: "awful".
- 2012‑06‑18:
Debunking cybercrime myths.
- 2012‑06‑18:
Myths about the UK economy which it suits everyone to perpetuate.
- 2012‑06‑18:
Popular Hacker News contributor gets hellbanned for trying to discuss its moderation policy.
- 2012‑06‑18:
Comcast protests that copyright holders are abusing the court's subpoena powers and have no interest in litigating their claims.
- 2012‑06‑18:
Systematic study finds cybercriminals cost us at least ten times as much as they steal.
- 2012‑06‑18:
The crayola-fication of the world: How we gave colors names, and it messed with our brains.
- 2012‑06‑18:
Packet Forensics sells SSL man-in-the-middle attack appliances to law enforcement agencies.
- 2012‑06‑17:
The shame of London's slum clearance programmes.
- 2012‑06‑17:
SSL server report for www.update.microsoft.com.
- 2012‑06‑17:
A profile of Sydney Padua and her comic 2D Goggles about Lovelace and Babbage.
- 2012‑06‑16:
This jersey is not for sale.
- 2012‑06‑16:
New Jersey does as well as the best French wine in a blind taste test.
- 2012‑06‑16:
A real Transformer: radio controlled car that can turn itself into a humanoid robot.
- 2012‑06‑16:
Ecstacy is safe when unadulterated and used responsibly.
- 2012‑06‑16:
Tech press misses Google and Amazon gTLD name grab.
- 2012‑06‑15:
Map of most popular websites in each country.
- 2012‑06‑15:
What the hell does ≡ do, anyway?
- 2012‑06‑15:
Tourist's car breaks down in Westminster, gets a parking ticket and is blown up by the police.
- 2012‑06‑15:
Argyll and Bute council leader teaches the council officers how to handle bad PR.
- 2012‑06‑15:
Suddenly, Big Mac prices rise 26% in Argentina.
- 2012‑06‑15:
The Big Mac is cheap in Argentina to fox the Economist's purchasing-power index.
- 2012‑06‑15:
IETF protocol action: DANE TLSA to proposed standard.
- 2012‑06‑15:
NeverSeconds blogger Martha Payne banned from photographing her school dinners.
- 2012‑06‑15:
Argyll and Bute, school dinners, and spygate.
- 2012‑06‑15:
The best and worst places to be a child in Europe and North America.
- 2012‑06‑15:
Certificate pinning is a bad idea.
- 2012‑06‑15:
Defeating reCAPTCHA with 99% accuracy.
- 2012‑06‑15:
Successful sourdough.
- 2012‑06‑14:
On romance: "My coffee does not ever make me immediately think of people of color."
- 2012‑06‑14:
Some notes on the internationalized TLD applications.
- 2012‑06‑14:
The phone company's susceptibility to social engineering is a weak link in two-factor authentication.
- 2012‑06‑14:
Privacy matters even if you have nothing to hide.
- 2012‑06‑14:
Internet mail headers are not unlike giblets.
- 2012‑06‑14:
Cambridge's COSMOS supercomputer upgraded with SGI UV2.
- 2012‑06‑14:
Statistics of the ".brand" and other new GTLD applications.
- 2012‑06‑14:
What happens when digital cinema DRM fails.
- 2012‑06‑14:
Performance analysis and receiver architectures of DCF77 radio-controlled clocks.
- 2012‑06‑14:
UK government snooping bill: we have to get this right.
- 2012‑06‑14:
High-resolution political map of the world.
- 2012‑06‑13:
Professionals who can program.
- 2012‑06‑13:
Petition to protect historic street lighting in Cambridge.
- 2012‑06‑13:
Husbands of stay-at-home wives are more sexist.
- 2012‑06‑13:
Smart people are stupid.
- 2012‑06‑13:
List of new TLDs that have been applied for.
- 2012‑06‑13:
Men are probably too hormonal and moody to be trusted with important financial decisions.
- 2012‑06‑13:
Intel SYSRET privilege escalation vulnerability affecting multiple operating systems.
- 2012‑06‑13:
Exploiting 14ish bugs to break out of the Google Chrome sandbox.
- 2012‑06‑12:
The misappropriation of "troll".
- 2012‑06‑12:
Stop the beer duty escalator!
- 2012‑06‑12:
US Navy deliberately poisoned sailors who drank Torpedo Juice.
- 2012‑06‑12:
US government deliberately poisoned thousands of people during prohibition.
- 2012‑06‑12:
If someone shoots at you with a guided missile running Linux, presumably you get to demand the source code...
- 2012‑06‑12:
Misguided councillor Shona Johnstone, who wants to be a police commissioner, has been charged with criminal damage.
- 2012‑06‑12:
On implementing SMTP message priorities.
- 2012‑06‑12:
Flame and Stuxnet are linked.
- 2012‑06‑11:
Analyzing the MD5 collision in Flame.
- 2012‑06‑11:
The Oatmeal vs FunnyJunk is funnier than Arkell vs Pressdram.
- 2012‑06‑11:
The MIT ANA Spoofer project measures the Internet's susceptibility to packets with spoofed source IP addresses.
- 2012‑06‑11:
The interrupted Unix FAQ.
- 2012‑06‑11:
European telcos want the ITU to impose a tax on Internet content providers.
- 2012‑06‑11:
Response rate limiting for BIND by Vernon Schryver and Paul Vixie.
- 2012‑06‑11:
Brian Krebs talks to Thomas Ptacek about safe password storage.
- 2012‑06‑09:
Zeolite thermal storage absorbs 4x more heat than water and retains it indefinitely.
- 2012‑06‑08:
The real death by PowerPoint.
- 2012‑06‑08:
Judge Richard Posner spikes Apple-Google case, and calls patent system "dysfunctional".
- 2012‑06‑08:
LuaJIT roadmap 2012/2013.
- 2012‑06‑08:
New directions in traffic measurement and accounting.
- 2012‑06‑08:
Storing passwords securely.
- 2012‑06‑08:
When a security researcher says they will jackpot your ATM at the Black Hat conference.
- 2012‑06‑08:
Thunderbird 13 helps users to register a domain name for personalised email addresses.
- 2012‑06‑08:
Google takes the FUD baton from Microsoft.
- 2012‑06‑07:
A review of the Ansible configuration management tool.
- 2012‑06‑07:
MD5 crypt() password scrambler is no longer considered safe by its author.
- 2012‑06‑07:
Safe password storage with salt and iteration counts.
- 2012‑06‑07:
fish: a unix shell for the 1990s.
- 2012‑06‑07:
The Tesla gun.
- 2012‑06‑07:
Street fighting computer science.
- 2012‑06‑07:
Street-fighting mathematics: the art of educated guessing and opportunistic problem solving.
- 2012‑06‑06:
Google IPv6 resolver blacklist.
- 2012‑06‑06:
DNSSEC statistics.
- 2012‑06‑06:
Comcast's first inbound email over IPv6 was spam.
- 2012‑06‑06:
Distributed computer systems: backwards towards the future.
- 2012‑06‑06:
John Napier invented binary arithmetic in 1617.
- 2012‑06‑06:
"Women are 'naturals' at computer programming" - Grace Hopper.
- 2012‑06‑06:
Vatican condemns nun's book on sexuality to popularity.
- 2012‑06‑06:
The Internet killed porn.
- 2012‑06‑06:
The hidden autistics: Asperger's in adults.
- 2012‑06‑06:
Insanely long copyright terms are how the media avoid competing with their own back catalogs.
- 2012‑06‑06:
Feminist porn.
- 2012‑06‑05:
Pre to Postmortem: the inside story of the death of Palm and WebOS.
- 2012‑06‑05:
Slovakian copyright collection agency tries to charge villages for singing folk songs at festivals.
- 2012‑06‑05:
Explaining JavaScript virtual machines in JavaScript.
- 2012‑06‑05:
Real princesses wear blue.
- 2012‑06‑05:
Google doesn't want real names, they want WASPonyms.
- 2012‑06‑05:
How the Chinese screwed up their 3G mobile phone networks.
- 2012‑06‑05:
The TTY demystified.
- 2012‑06‑05:
Ansible: ssh-based configuration management and deployment.
- 2012‑06‑05:
SSDs and distributed data systems.
- 2012‑06‑05:
Are you scientifically literate? (quiz)
- 2012‑06‑05:
Immune cells gobble up healthy but idle brain cells.
- 2012‑06‑05:
US National Reconnaissance Office gives two spare better-than-Hubble spy telescopes to NASA, who have no money to launch them.
- 2012‑06‑05:
Logical circuits built from unix pipes and mosfet.c.
- 2012‑06‑05:
Hanging up on the phone system.
- 2012‑06‑04:
Multi-armed bandit algorithms are superior to A/B testing.
- 2012‑06‑04:
Well-kept gardens die by pacifism: online discussions need moderators.
- 2012‑06‑04:
Why do power supplies have three prongs?
- 2012‑06‑03:
Cycles of life.
- 2012‑06‑02:
Five universities sharing one high-performance computing centre.
- 2012‑06‑02:
OS X 2 X: share your Mac keyboard and mouse with Unix and VNC displays.
- 2012‑06‑02:
Summer fruit pudding.
- 2012‑06‑02:
Fear and Loathing and Windows 8. Microsoft is "courageous".
- 2012‑06‑01:
Being blind drunk, killing someone, and fleeing the scene is OK if you do it in a car.
- 2012‑06‑01:
A navel-gazing, self-serving, smug, consensual, spendthrift, remote and barely democratic excuse of an assembly.
- 2012‑06‑01:
Calvin & Hobbes, 26 years later.
- 2012‑06‑01:
Flame on! Government-sponsored malware.
- 2012‑06‑01:
Banned words for Telegraph commenters.
- 2012‑06‑01:
Transits of Venus explained.
- 2012‑06‑01:
The market for vulnerabilities gives programmers an incentive to deliberately create and secretly sell them to the government.
- 2012‑06‑01:
AtomiaDNS: open source DNS management software.
- 2012‑06‑01:
Australia falling behind on DNSSEC progress.
- 2012‑06‑01:
Measuring the distance from the Earth to the Sun by observing a transit of Venus.
- 2012‑06‑01:
Cambridge parkour, including some where I work.
- 2012‑06‑01:
draft-fanf-dane-smtp document history
- 2012‑06‑01:
dnspod-sr: a faster recursive DNS server from China.
- 2012‑06‑01:
Empty character classes [] and [^] in Javascript regexps?
- 2012‑06‑01:
Oracle vs Google - Judge Alsup rules APIs are not protected by copyright.
- 2012‑05‑31:
Oh happy days! Working for Jeremy Hunt.
- 2012‑05‑31:
draft-fanf-dane-smtp-02
- 2012‑05‑31:
The design of LLVM.
- 2012‑05‑31:
F1: the fault-tolerant distributed SQL RDBMS that supports Google's ad business.
- 2012‑05‑31:
Psychology of fraud: why good people do bad things.
- 2012‑05‑31:
North Carolina coastal counties fighting to avoid doing anything about rising sea levels.
- 2012‑05‑31:
In Soviet Union, optimization problem solves you!
- 2012‑05‑31:
Implementing UEFI secure boot in Fedora.
- 2012‑05‑30:
Deconstructing our radiant future of exponential progress.
- 2012‑05‑30:
The unbearable stasis of "accelerating change".
- 2012‑05‑30:
Eurosceptics should back Assange.
- 2012‑05‑30:
The transparent dishonesty of the UK research excellence framework.
- 2012‑05‑30:
The cost of being an unbeatable evil overlord.
- 2012‑05‑30:
Terrifying French children's books.
- 2012‑05‑30:
Internet vs hype and anti-hype
- 2012‑05‑30:
Twitter improves performance by getting rid of #!
- 2012‑05‑30:
Semi-automated gunshot detection and location and policing in the US.
- 2012‑05‑30:
False cognates and syntax.
- 2012‑05‑29:
draft-fanf-dane-smtp-01
- 2012‑05‑29:
Project Drake: moving the University of Cambridge official map to Open Street Map.
- 2012‑05‑29:
America's broadband policy is failing through lack of competition.
- 2012‑05‑29:
Trace debugger for lpeg.
- 2012‑05‑29:
Results of first AFNIC Technology Backdrop survey.
- 2012‑05‑29:
Second AFNIC Technology Backdrop survey.
- 2012‑05‑29:
Optimal tax rate for top one per cent may be as high as 83%
- 2012‑05‑28:
Manhattan Henge.
- 2012‑05‑28:
Timbre: JavaScript library for objective sound programming.
- 2012‑05‑28:
"Sex in space is going to have to be choreographed, otherwise it's just going to be a wild flailing."
- 2012‑05‑28:
Fast crypto key extraction from "secure" hardware.
- 2012‑05‑28:
Threat analysis of the ITU's World Conference of International Telecommunications.
- 2012‑05‑28:
US House committee to examine international proposal to give ITU more control over the Internet.
- 2012‑05‑28:
Mike Mann registered nearly 15,000 domains in 24 hours.
- 2012‑05‑28:
Facebook panicked and botched its IPO.
- 2012‑05‑28:
Yahoo!s Axis browser extension includes a copy of their Chrome private key.
- 2012‑05‑28:
More about highly unusal Court of Appeal re-hearings.
- 2012‑05‑28:
High Court decides to spend more time, money, and heartache on a "menacing" joke that worried no-one.
- 2012‑05‑28:
SSD price war in full swing.
- 2012‑05‑28:
A huge new wave of cheap electronics will disrupt old-school UX assumptions.
- 2012‑05‑28:
Print-on-demand and same-day bike courier delivery helped save the Harvard Book Store.
- 2012‑05‑28:
Most people lie and cheat just a bit, and can be nudged to do so more or less.
- 2012‑05‑27:
The THX sound.
- 2012‑05‑27:
OECD report "health at a glance". (2011)
- 2012‑05‑27:
Olympics brand exclusion zone.
- 2012‑05‑27:
Germany can generate half its electricity from solar power on a sunny Saturday.
- 2012‑05‑27:
Typeface as programme.
- 2012‑05‑27:
Reflections on The Geek Manifesto.
- 2012‑05‑27:
Consumers prefer confusopoly pricing.
- 2012‑05‑27:
Everything you ever wanted to know about building a secure password reset feature.
- 2012‑05‑26:
The Geek Manifesto on GM crops.
- 2012‑05‑26:
The bottom half of the Internet wins when it comes to GM wheat.
- 2012‑05‑26:
Lottery scratchcard withdrawn from sale because players couldn't understand negative numbers.
- 2012‑05‑26:
Errors vs. bugs and the end of stupidity.
- 2012‑05‑26:
Facebook's IPO got hijacked by computers.
- 2012‑05‑26:
Some proposals for making peer review less biased towards positive results.
- 2012‑05‑25:
draft-fanf-dane-smtp
- 2012‑05‑25:
What the Bible says about abortion.
- 2012‑05‑25:
The German Pirate Party's radical openness and liquid democracy.
- 2012‑05‑25:
"Take The Flour Back" and the Green Party are wrong about the Rothamsted GM wheat trial.
- 2012‑05‑25:
Northern Ireland's teenagers are gradually breaking down religious barriers
- 2012‑05‑24:
A not-excessively-gung-ho review of Google's self-driving car.
- 2012‑05‑24:
If your YouTube video gets shown on TV, it may be blocked by ContentID.
- 2012‑05‑24:
ARPANET IMP proposals and design papers.
- 2012‑05‑24:
Clocks in medical devices are on average 24 minutes wrong.
- 2012‑05‑24:
Spam was an "intolerable nuisance" in 1864.
- 2012‑05‑24:
Olympics bring fascist suppression to Cornwall.
- 2012‑05‑24:
Exploiting a chain of six bugs to break out of the Google Chrome sandbox.
- 2012‑05‑23:
Dry your hands with just one paper towel.
- 2012‑05‑23:
Selective dissemination in the Facebook IPO against securities laws?
- 2012‑05‑23:
An Irish political anorak's observations of British politics.
- 2012‑05‑23:
MIT's freaky non-stick coating keeps ketchup flowing.
- 2012‑05‑23:
SIGGRAPH 2012 technical papers preview video.
- 2012‑05‑22:
Putting a brake on nuclear re-armament.
- 2012‑05‑22:
Living in a golden age of beer.
- 2012‑05‑22:
TCP sequence number inference attack: firewall middleboxes reduce security.
- 2012‑05‑22:
Salted password hashing: doing it wrong.
- 2012‑05‑22:
Jeri Ellsworth & her Commodore 64 bass guitar synth.
- 2012‑05‑22:
Petition to introduce STV for local elections in England.
- 2012‑05‑21:
Random() points of contention in multithreaded code.
- 2012‑05‑21:
AMC-14 satellite suffered launch anomaly, and could not be moved into correct orbit because the trajectory is patented.
- 2012‑05‑21:
Olympic torch goes out. Does that mean get our money back?
- 2012‑05‑21:
Google Chrome passes Internet Explorer to become the most popular browser.
- 2012‑05‑21:
UK Government is slow to implement Beecroft Report recommendations to reduce protections for workers.
- 2012‑05‑21:
Pirate university: share inaccessible journal articles.
- 2012‑05‑21:
Microsoft to replace the Aero UI with Google-like styling in Windows 8.
- 2012‑05‑20:
Government backtracks on fracking.
- 2012‑05‑20:
Insurance actuary gets a patent for statistical sampling and admits the idea is obvious.
- 2012‑05‑19:
Plummeting African child mortality: the best story in development.
- 2012‑05‑19:
Zynga's stock fluctuated wildly after Facebook went public.
- 2012‑05‑19:
Higher-dimensional spheres are strangely spikey.
- 2012‑05‑19:
Apple iPhone charger teardown: quality in an tiny expensive package.
- 2012‑05‑19:
IKEA Hackers: inexpensive glass whiteboard.
- 2012‑05‑19:
Muraspec: UK IdeaPaint distributor.
- 2012‑05‑19:
IdeaPaint: turn walls into whiteboards.
- 2012‑05‑19:
Justice Dept. defends the US constitutional right to record cops.
- 2012‑05‑18:
Eldar black holes.
- 2012‑05‑18:
An Introduction to the Objectivist-C programming language.
- 2012‑05‑18:
Solar-powered supercomputer at the Met Office.
- 2012‑05‑18:
London Lua users meeting, 5th July 2012.
- 2012‑05‑18:
How Chief Justice John Roberts orchestrated the Citizens United decision on campaign finance.
- 2012‑05‑18:
Fuzz-testing JavaScript engines for correctness.
- 2012‑05‑18:
Entrapment, fake pants bombers, and ignoring real problems.
- 2012‑05‑17:
PR agencies vs TED.
- 2012‑05‑17:
If they hadn't censored this talk no-one would be talking about it.
- 2012‑05‑17:
Duplo self-assembly in a washing machine.
- 2012‑05‑17:
Cat plays and wins the shell game. (YouTube)
- 2012‑05‑17:
LOLcommits.
- 2012‑05‑17:
Taxing the rich is too controversial an idea for TED to spread online.
- 2012‑05‑17:
People who viewed a 55 gallon drum of lube on Amazon also viewed...
- 2012‑05‑17:
MILNET maps.
- 2012‑05‑17:
ARPANET topological maps.
- 2012‑05‑17:
ARPANET geographic maps.
- 2012‑05‑17:
BitTorrent was never the problem, bufferbloat was. Where will the next operational nightmare arise?
- 2012‑05‑17:
DNSSEC now available for .nl domains.
- 2012‑05‑17:
America had an openly gay president in the 1800s.
- 2012‑05‑16:
The WTO hates dolphins.
- 2012‑05‑16:
Swear should I go to eat?
- 2012‑05‑16:
The Unix way, the Emacs way, and the wrong way.
- 2012‑05‑16:
Linux's userland plumbing layer as the new kernel.
- 2012‑05‑16:
What The Times cycle safety campaign has taught us so far.
- 2012‑05‑16:
The Royal Jubilee Bells for the Thames pageant and St James' Garlickhythe.
- 2012‑05‑16:
Associate editor of "Genomics" resigns, saying Elsevier puts profit before access to research.
- 2012‑05‑16:
The wrong Carlos: Texas sent an innocent man to his death.
- 2012‑05‑16:
An overview of the IBM 801 minicomputer. (1977)
- 2012‑05‑16:
In praise of CSV.
- 2012‑05‑16:
Straight White Male: the lowest difficulty setting in the RPG of life.
- 2012‑05‑16:
The judge in the Oracle/Google Java/Android lawsuit seems to be a programmer.
- 2012‑05‑15:
ARPANET-Internet old archived mailing lists.
- 2012‑05‑15:
Archive of header-people: email message format standardisation in the 1970s.
- 2012‑05‑15:
US judge sides with Georgia State University over educational fair use.
- 2012‑05‑15:
Time-lapse map of Europe since 1000 AD. (YouTube)
- 2012‑05‑15:
LightSquared files for bankruptcy after failing to ruin GPS by using low-power satellite spectrum for high-power cellphones.
- 2012‑05‑15:
Scotland, where political parties work together.
- 2012‑05‑15:
They're not 'orphan works', they're 'hostage works'.
- 2012‑05‑15:
VLC's billion downloads relied on French freedom from software patents.
- 2012‑05‑15:
Operation Elveden may bring down Rupert Murdoch.
- 2012‑05‑14:
Heather Brooke on British press collusion with police lies and misinformation. (video)
- 2012‑05‑14:
Somebody please, for the love of god, fix shipping/couriers.
- 2012‑05‑14:
STV has made big difference to democracy in Scotland.
- 2012‑05‑14:
Nerds need to operate within the realm of traditional power and politics or we will lose.
- 2012‑05‑14:
Base16k: efficient binary data encoding in Unicode text.
- 2012‑05‑14:
Another Bitcoin hack + theft.
- 2012‑05‑14:
Envisioning a non-evil version of "trusted" computing.
- 2012‑05‑14:
C coding style guide (for Tcl implementation).
- 2012‑05‑14:
Telecoms and the London Olympics.
- 2012‑05‑14:
Open Data Structures: an open source textbook.
- 2012‑05‑14:
Caterwaul is a Javascript recompiler and macroexpander that allows you to manipulate code in a first-class way.
- 2012‑05‑14:
*JS is the bastard child of JavaScript and C.
- 2012‑05‑13:
Coco is a CoffeeScript dialect that aims to be more radical and practical.
- 2012‑05‑13:
Mark Henderson talking about his book "the geek manifesto" on evidence-based policy in Cambridge.
- 2012‑05‑13:
The correlation between religiosity and well-being among U.S. states.
- 2012‑05‑13:
FreeBSD 10 to be compiled with LLVM clang, and deprecate gcc.
- 2012‑05‑13:
Dress code: blue tie and male. Dell says women should not work in tech.
- 2012‑05‑12:
This is why teachers leave teaching.
- 2012‑05‑12:
The right won the economic argument and the left won the culture wars.
- 2012‑05‑12:
When half a million Americans died and nobody noticed.
- 2012‑05‑12:
Software defined networking: the future of networking, the past of protocols.
- 2012‑05‑12:
What the battle over the meaning of SDN reveals.
- 2012‑05‑11:
Welcome to Life: the singularity, ruined by lawyers.
- 2012‑05‑11:
Hardware macroarchitecture vs mircoarchitecture.
- 2012‑05‑11:
Google API discovery documents.
- 2012‑05‑11:
JSON home document: the entry point for a RESTful web API.
- 2012‑05‑11:
What does the Queen's Speech mean for civil liberties?
- 2012‑05‑11:
Communications interception: Lib Dem party view.
- 2012‑05‑11:
Communications interception: dazed half-memories of a conference call with Julian Huppert.
- 2012‑05‑11:
If you meet a censor, ask them this question.
- 2012‑05‑11:
FF Chartwell: an OpenType font that turns numbers into charts using ligatures and stylistic alternates.
- 2012‑05‑11:
Driving a receipt printer from OpenWrt on a TP-Link micro router.
- 2012‑05‑11:
Voting for checked exceptions in Java.
- 2012‑05‑10:
BT cheerfully admits snooping on home LANs.
- 2012‑05‑10:
Jumping through hoops: the grueling farcical campaign that won London the 2012 Olympics, at gargantuan expense.
- 2012‑05‑10:
AppleScript's English-likeness monster.
- 2012‑05‑10:
Vexing exceptions.
- 2012‑05‑10:
Real-time collaborative editing is like exception handling, but the arrows in the category are reversed.
- 2012‑05‑10:
WiFi Pineapple Mark IV: $90 hotspot honeypot.
- 2012‑05‑10:
Why ZeroMQ should have been written in C not C++.
- 2012‑05‑10:
Individual Liberty, by Benjamin Tucker.
- 2012‑05‑10:
An Arduino-powered wire bending machine.
- 2012‑05‑10:
C! (C-bang): a system-oriented programming language.
- 2012‑05‑10:
Vert.x: an asynchronous concurrent application framework for the JVM.
- 2012‑05‑10:
Using a Kalman filter to predict ticket prices.
- 2012‑05‑10:
What is and is not a technology company.
- 2012‑05‑10:
Current pypy-stm documentation.
- 2012‑05‑10:
Plans for STM-based parallel execution in PyPy.
- 2012‑05‑10:
Mozilla complains about Microsoft banning Firefox from Windows 8 on ARM.
- 2012‑05‑10:
The floppy disk means save, and 14 other old-people icons that don't make sense anymore.
- 2012‑05‑10:
Configurable trampolines without writable code pages on iOS and Mac OS.
- 2012‑05‑10:
No third-party JIT on Windows 8 for ARM.
- 2012‑05‑10:
Recursive Drawing.
- 2012‑05‑10:
MESS in JavaScript: emulating lots of old computers in your browser.
- 2012‑05‑10:
The end of Moore's Law is nigh, says Broadcom's CEO.
- 2012‑05‑09:
Pervasive snooping and secret courts in the Queen's Speech.
- 2012‑05‑09:
"We are going to create something which will not be effective against terrorism but which will be a general purpose surveillance on the entire nation."
- 2012‑05‑09:
More about the CCDP UK surveillance bill.
- 2012‑05‑09:
"The right to marry whoever one wishes is an elementary human right" - Hannah Arendt.
- 2012‑05‑09:
To discourage piracy, US government is making legit movies even worse.
- 2012‑05‑09:
Haskell vs Scala.
- 2012‑05‑09:
The obstacle to decentralized social networking is lack of profitability backed up by surveillance and control.
- 2012‑05‑09:
Lib Dem policies in the Queen's Speech.
- 2012‑05‑09:
The government's proposal for data communications surveillance will be invasive and costly with minimal effectiveness.
- 2012‑05‑09:
Diageo screw BrewDog.
- 2012‑05‑09:
How a Florida "pill mill" operation fuelled a painkiller abuse epidemic.
- 2012‑05‑09:
Pastafarianism in the US military.
- 2012‑05‑09:
Bioluminescence in the Gippsland Lakes in Victoria, Australia.
- 2012‑05‑09:
Playing with fire: tobacco and chemical manufacturer lobbying led to excessive use of toxic flame retardants.
- 2012‑05‑09:
A set of top Computer Science blogs.
- 2012‑05‑09:
Iron Sky in the UK for one day only?
- 2012‑05‑09:
Good Guy Lucifer.
- 2012‑05‑09:
Some information about the draft communications data snooping bill.
- 2012‑05‑09:
Proliferating ways of bypassing the Pirate Bay blocks.
- 2012‑05‑09:
Clojure Reducers: a library and model for parallel collection processing.
- 2012‑05‑08:
Never Seconds: a daily dose of primary school dinners.
- 2012‑05‑08:
The most confusing git terminology.
- 2012‑05‑08:
Going dark, or a golden age for surveillance?
- 2012‑05‑08:
Many kids have Firefox + TOR on a USB stick for bypassing school and ISP filters.
- 2012‑05‑08:
Gay rights in the USA, state by state.
- 2012‑05‑08:
20 years of SMS.
- 2012‑05‑08:
Japan has switched off all its nuclear power stations.
- 2012‑05‑08:
Fundamental progress solving bufferbloat.
- 2012‑05‑08:
The MSF 60KHz time signal and some memories of the NPL.
- 2012‑05‑08:
Emotive conjugation / Russell conjugation / irregular verbs.
- 2012‑05‑08:
The first atomic clock: a film made in the 1950s at NPL.
- 2012‑05‑08:
Modern active queue management is just one piece of the solution to buffer bloat. (Van Jacobson)
- 2012‑05‑08:
Republican war against women now attacking the right to vote.
- 2012‑05‑08:
Aran Islands megagravel is moved by storm waves.
- 2012‑05‑08:
Audiophools! What your hifi rig needs is an atomic clock.
- 2012‑05‑07:
e4rat: defragment ext4fs to reduce boot time.
- 2012‑05‑07:
Parse URLs in JavaScript using the DOM.
- 2012‑05‑07:
IETF ConEx congestion exposure concepts and use cases.
- 2012‑05‑07:
RFC 6297: a survey of lower-than-best-effort transport protocols.
- 2012‑05‑07:
Exploring delay-based congestion control.
- 2012‑05‑07:
Recipe writers lie and lie and lie about how long it takes to caramelize onions.
- 2012‑05‑07:
Electoral reform a year after the AV referendum: most people support PR; a fifth support FPTP.
- 2012‑05‑07:
TCP sucks: latency-based congestion control (as in uTP) is better.
- 2012‑05‑06:
Peter Zotov: (a bit of) whitespace.
- 2012‑05‑06:
Elsevier's recent update to its letter to the mathematical community.
- 2012‑05‑06:
All the Earth's water in a sphere.
- 2012‑05‑06:
Impressive automatic video stabilization available after upload to YouTube.
- 2012‑05‑06:
Bertrand Russell's ten commandments for teachers.
- 2012‑05‑06:
Minecraft implemented in Minecraft.
- 2012‑05‑06:
Everyone panic about drones carrying biological weapons, warns Colonel in charge of keeping London calm for the Olympics.
- 2012‑05‑06:
ParFunk: How to write hybrid CPU/GPU programs with Haskell.
- 2012‑05‑05:
What is the 21st Century blackboard?
- 2012‑05‑05:
The London Mayor thing. The Ken thing.
- 2012‑05‑05:
The realisation dawns that the axioms of the Black-Scholes equation are wrong.
- 2012‑05‑05:
Teknische Universität München mathematics department cancels all Elsevier subscriptions.
- 2012‑05‑05:
Debugging node.js memory leaks.
- 2012‑05‑05:
Police strategy in New York: violence and sexual assault against peaceful protestors.
- 2012‑05‑05:
Lotte Time Lapse: Birth to 12 years in 2 min. 45.
- 2012‑05‑05:
Hair: the unsightly keratin-based proof that you have gone through puberty.
- 2012‑05‑04:
2.11BSD patch archive.
- 2012‑05‑04:
DARPA shredder challenge.
- 2012‑05‑04:
BT said in 2004 that it would cancel Cleanfeed if it were pressured to extend the scope of its filtering beyond child porn.
- 2012‑05‑04:
Why you should keep your NFC card in a tinfoil wrapper.
- 2012‑05‑04:
Sophie Wilson and Steve Furber, creators of the ARM: the accidental chip.
- 2012‑05‑04:
A neat proposal for a better way to edit text on an iPad.
- 2012‑05‑04:
Cost-effectiveness of healthcare in different countries.
- 2012‑05‑04:
Transparency DCMS style: secret plans for UK net censorship.
- 2012‑05‑04:
UK Pirate Bay block initiates Streisand Cascade, drives record traffic, popularises VPNs.
- 2012‑05‑04:
Cambridge local elections: results and prognosis.
- 2012‑05‑04:
Judge: An IP address doesn't identify a person, and mass BitTorrent cases should be rejected.
- 2012‑05‑04:
How Inktomi lost to Google.
- 2012‑05‑03:
PHP developers remove a crucial CGI security check to make their test suite work. (CVE-2012-1823)
- 2012‑05‑03:
A modern BNF-style regex for matching email addresses.
- 2012‑05‑03:
We don't have to choose between freedom and copyright.
- 2012‑05‑03:
DRCS: a distributed version control system for wide-area networks based on RCS and UUCP.
- 2012‑05‑03:
The great auroral storm of 1859: the week the Sun touched the Earth.
- 2012‑05‑03:
An early article on the Acorn RISC Machine, including ARM1 die photo and floorplan.
- 2012‑05‑03:
Sophie Wilson describes the ARM in comp.arch, 1988.
- 2012‑05‑03:
Tories speak out in support of Rupert Murdoch.
- 2012‑05‑03:
25 years of the Swiss TLD .ch.
- 2012‑05‑03:
Visualizing English word origins.
- 2012‑05‑03:
Probabilistic data structures for web analytics and data mining.
- 2012‑05‑03:
How to avoid making more racist as campaigns.
- 2012‑05‑02:
Common Lisp: the untold story.
- 2012‑05‑02:
The protection of freedoms act 2012.
- 2012‑05‑02:
All research funded by UK government to be open access.
- 2012‑05‑02:
Imperial College open access fund.
- 2012‑05‑02:
The bleak future of the Irish university.
- 2012‑05‑02:
Discussion of the world population distribution maps.
- 2012‑05‑02:
World land and water distribution by latitude and by longitude.
- 2012‑05‑02:
World population distribution by latitude and by longitude.
- 2012‑05‑02:
Supermoon Saturday: full moon and perigee coincide.
- 2012‑05‑02:
MillionShort: search the long tail by cutting out the top sites.
- 2012‑05‑02:
Android ported to C#.
- 2012‑05‑02:
Display latency can be larger than transatlantic packet delivery time.
- 2012‑05‑02:
Designing and implementing a deployable multipath TCP.
- 2012‑05‑01:
FBI "terrorist" infiltration, attempted entrapment, and failure.
- 2012‑05‑01:
Multipath TCP.
- 2012‑05‑01:
Jellyfish: networking data centers randomly.
- 2012‑05‑01:
SPDY performance on mobile networks.
- 2012‑05‑01:
TV Calendar: episode listings guide.
- 2012‑05‑01:
In praise of bokeh: how new technology is changing the visual style of news.
- 2012‑05‑01:
Norman Ramsey's Nobel Prize lecture on his resonant cavity used in atomic clocks.
- 2012‑05‑01:
Agalmics: the marginalization of scarcity.
- 2012‑05‑01:
The Manfred Macx media diet.
- 2012‑05‑01:
Logica report on their electronic vote counting system for Scottish local elections.
- 2012‑05‑01:
STV in the Scottish local elections.
- 2012‑05‑01:
Monthly rainfall deficit over the last three years.
- 2012‑05‑01:
Which party do you agree with the most, based on their voting record in parliament?
- 2012‑05‑01:
Standard Time: a performance art project by Mark Formanek.
- 2012‑05‑01:
Labour-intensive live-action digital clock.
- 2012‑05‑01:
Millau viaduct / Miaow viaduct.
- 2012‑05‑01:
The UK intellectual property regime is one of the world's worst for consumers.
- 2012‑05‑01:
Huntingdon Road reduced speed limit consultation.
- 2012‑04‑30:
LuaJIT module for controlling the Raspberry Pi GPIO pins.
- 2012‑04‑30:
Answers to Rob Pike's obscure Unix trivia quiz.
- 2012‑04‑30:
The stupendous insanity of the London 2012 Olympics.
- 2012‑04‑30:
The DNS in 2000: are we overloading the saddlebags on this old horse?
- 2012‑04‑30:
... just put it in the DNS.
- 2012‑04‑30:
Defending against BGP man-in-the-middle attacks.
- 2012‑04‑30:
Stealing the Internet: a routed wide-area man-in-the-middle attack.
- 2012‑04‑30:
How much chocolate can you put on a gingerbread man before you have to pay VAT?
- 2012‑04‑30:
PolarSSL security advisory: weak key generation.
- 2012‑04‑30:
Microsoft Exchange does not log SMTP transactions by default.
- 2012‑04‑30:
Rob Pike's hard unix trivia quiz from 1984.
- 2012‑04‑30:
GSOC 2012: a LuaJIT back-end for ClojureScript.
- 2012‑04‑29:
Google Street View wardriving was intentional.
- 2012‑04‑29:
UTF-8 everywhere.
- 2012‑04‑29:
Introduction to TRILL / RBridges.
- 2012‑04‑29:
Network layer protocols with Byzantine robustness.
- 2012‑04‑29:
Peak Telecoms.
- 2012‑04‑29:
TRILLapalooza: replacing ethernet's spanning tree protocol.
- 2012‑04‑29:
Of MP3 players and Apple complacency.
- 2012‑04‑28:
Parsing mixfix operators.
- 2012‑04‑28:
Lots more music for programming.
- 2012‑04‑28:
An employee, whose last name is Null, kills our employee lookup app.
- 2012‑04‑28:
SOAP: The S stands for Simple.
- 2012‑04‑28:
Bobby Tables: A guide to preventing SQL injection.
- 2012‑04‑28:
Comcast rolls out native IPv6 support for home networking with DHCPv6.
- 2012‑04‑27:
Security implications of IPv6 on IPv4-only networks.
- 2012‑04‑27:
Jeremy Hunt's handling of the NewsCorp/BSkyB deal was unlawful.
- 2012‑04‑27:
Understanding the /bin, /sbin, /usr/bin, /usr/sbin split.
- 2012‑04‑27:
Apple vs. Samsung: a visual guide to Apple's trademark claims.
- 2012‑04‑27:
Key tests for Skylon British spaceplane project.
- 2012‑04‑27:
Classic maths books typeset with LaTeX on Project Gutenberg.
- 2012‑04‑27:
Have Oracle screwed up the Java copyright registration on which their lawsuit with Google is based?
- 2012‑04‑27:
Demovibes: electronic grooves from the demoscene.
- 2012‑04‑27:
Microsoft patches widely-exploited Hotmail password reset bug.
- 2012‑04‑27:
SPF deployment survey: feedback for the IETF SPF spec revision.
- 2012‑04‑27:
The cynical agile and scrum dictionary.
- 2012‑04‑27:
Portal 2 soundtrack.
- 2012‑04‑27:
Computer-generated journalism.
- 2012‑04‑27:
Examples of evolution in humans.
- 2012‑04‑27:
Gawker's new commenting system aims to elevate the discourse about frogs who sit like humans.
- 2012‑04‑27:
musicForProgramming();
- 2012‑04‑26:
Gawker supports pseudo-anonymous accounts and collaborative moderation.
- 2012‑04‑26:
Labour IT mandarins tried to help Microsoft scuttle open standards policy.
- 2012‑04‑26:
UK government to re-run open standards consultation since the chair was secretly skewing it in favour of Microsoft.
- 2012‑04‑26:
All electronic voting systems are complete garbage.
- 2012‑04‑26:
Glencore: the giant commodities trader operating at the margins of what is legal.
- 2012‑04‑26:
Agatha Heterodyne's "Spark Roast" coffee engine.
- 2012‑04‑26:
A survey of smart phone power efficiency.
- 2012‑04‑26:
Google refused to buy a Java licence to avoid being held back by Sun's standards bureaucrats.
- 2012‑04‑26:
On the limits of the use cases for authenticated encryption.
- 2012‑04‑25:
The invention of jaywalking.
- 2012‑04‑25:
Burrows-Wheeler Aligner: an efficient nucleotide sequence search tool.
- 2012‑04‑25:
Using the Burrows Wheeler Transform as an efficient exact-match substring index, for finding DNA fragments.
- 2012‑04‑25:
Cambridge University Library open catalogue data.
- 2012‑04‑25:
Harvard puts metadata for 12 million library items into the public domain.
- 2012‑04‑24:
The development of the signage typeface Wayfinding Sans Pro.
- 2012‑04‑24:
Harvard encourages open access on cost grounds, and supports boycotts of closed journals.
- 2012‑04‑24:
IPv6 now deployed across entire T-Mobile US network.
- 2012‑04‑24:
"That's why you don't have any friends."
- 2012‑04‑24:
Hacker News discussion on how to avoid bad Mac OS X disk performance.
- 2012‑04‑24:
A cartoon intro to the Korean writing system.
- 2012‑04‑24:
Something is deeply broken in Mac OS X virtual memory management.
- 2012‑04‑23:
Privatisation is a modern enclosure movement.
- 2012‑04‑23:
A survey of stellar motion is inconsistent with the dark matter theory.
- 2012‑04‑23:
How to cope with the Gmail redesign.
- 2012‑04‑23:
First steps with the Raspberry Pi: what works / what doesn't yet.
- 2012‑04‑22:
State of Flux: NASA images of change.
- 2012‑04‑22:
Speech crime and thought crime in the USA.
- 2012‑04‑22:
What does Twitter know about me? Results of a data subject access request.
- 2012‑04‑22:
Belgian political scandal prompts interesting discussion of sexual harassment.
- 2012‑04‑22:
Discussion of Apple Disk ][ and RW18 fast disk driver.
- 2012‑04‑22:
Interview David Rees, the Proust of pencil sharpeners.
- 2012‑04‑22:
Worm propagation strategies in an IPv6 internet.
- 2012‑04‑21:
PHP hammer.
- 2012‑04‑20:
IBM creates breathing, high-density, light-weight lithium-air battery.
- 2012‑04‑20:
Drug companies fight over patents rather than work on Hepatitis treatment.
- 2012‑04‑20:
Cameron and the civil service coup.
- 2012‑04‑20:
People who don't know how to spell "Cologne".
- 2012‑04‑20:
Scale Something: How Draw Something rode its rocket ship of growth.
- 2012‑04‑20:
Scaling: it's not what it used to be.
- 2012‑04‑20:
URL handlers on OS X.
- 2012‑04‑20:
Splitting the electron into spinon and orbiton quasiparticles.
- 2012‑04‑20:
A review of the Lytro camera.
- 2012‑04‑20:
Telephone vs Internet peering and settlements.
- 2012‑04‑19:
Pioneer deceleration anomaly solved!
- 2012‑04‑19:
The ongaonga or tree-nettle of New Zealand.
- 2012‑04‑19:
The Gympie-Gympie stinging tree can cause months of excruciating pain for unsuspecting humans.
- 2012‑04‑19:
OpenSSL heap corruption security advisory.
- 2012‑04‑19:
ShadowStats.com response to Bureau of Labor Statistics article on CPI misconceptions.
- 2012‑04‑19:
Addressing misconceptions about the US consumer price index.
- 2012‑04‑19:
US standard of living has fallen more than 50% since 1970.
- 2012‑04‑19:
The non-libertarian FAQ.
- 2012‑04‑19:
Will OpenFlow really be the Android of networking?
- 2012‑04‑19:
Selecting some MPs by lottery may improve parliament.
- 2012‑04‑18:
The fairytale world of the Faroe Islands.
- 2012‑04‑18:
Rise of "forever day" bugs in industrial systems threatens critical infrastructure.
- 2012‑04‑18:
Google and OpenFlow.
- 2012‑04‑18:
FreeBSD slaughters Linux in this authoritative DNS performance benchmark.
- 2012‑04‑18:
Dense anycast deployment of L-root DNS authority servers.
- 2012‑04‑18:
dnSSexy: a DNSSEC-verifying authoritative proxy, based on NSD.
- 2012‑04‑18:
DNSSEC: dealing with resolvers that can't receive UDP fragments.
- 2012‑04‑18:
Microsoft is holding back the secure web with lack of support for TLS SNI on XP.
- 2012‑04‑18:
Modern maps of 18th century shipping.
- 2012‑04‑18:
An improved level-of-pain chart.
- 2012‑04‑18:
Latest issue of the .at report features DNSSEC and yours truly.
- 2012‑04‑18:
JANET tecnical guide: designing reliable mail systems.
- 2012‑04‑18:
Make everything OK .com
- 2012‑04‑17:
The difference between UI and UX explained through the medium of breakfast cereal.
- 2012‑04‑17:
Tricky arithmetic.
- 2012‑04‑17:
Men-ups! Men in classic pinup poses.
- 2012‑04‑17:
The evolutionary advantages of middle age.
- 2012‑04‑17:
Think like a penis enlargement spammer and you can talk about Londinium MMXII in your ads as much as you want.
- 2012‑04‑17:
Cognitive media, who do whiteboard animated illustrations for talks.
- 2012‑04‑17:
Olympics venues step up the war against photography.
- 2012‑04‑17:
The "profile" link relation tackles media type proliferation in RESTful web APIs.
- 2012‑04‑16:
Nice video visualisation of TCP packet flow.
- 2012‑04‑16:
GMail: anti-abuse at scale.
- 2012‑04‑16:
"What's the difference between hams who know Morse and programmers who know C? The C programmers have a point."
- 2012‑04‑16:
The DoJ's badly-targeted ebook lawsuit.
- 2012‑04‑16:
Economy killers: inequality and GOP ignorance.
- 2012‑04‑16:
Visualizing WiFi signal strength through space with a bar of lights and long exposure photography.
- 2012‑04‑16:
Seizing the wrist and re-understanding the Internet.
- 2012‑04‑16:
Swedish municipalities with DNSSEC.
- 2012‑04‑16:
The problem of handling local timezones consistently across platforms.
- 2012‑04‑16:
unluac: Lua 5.1 bytecode decompiler.
- 2012‑04‑16:
DNSSEC experiences at Cambridge.
- 2012‑04‑16:
Recent advances in IPv6 security.
- 2012‑04‑16:
Ice crystal lattices.
- 2012‑04‑16:
Want to cleanse your city of its poor? Host the Olympics!
- 2012‑04‑15:
A Programming Language by Ken Iverson. (PDF scan of 1962 book)
- 2012‑04‑15:
Americans are moving back from the suburbs to the cities.
- 2012‑04‑15:
For every American soldier killed abroad, 25 veterans commit suicide.
- 2012‑04‑15:
Which party will win the anti-politics vote?
- 2012‑04‑15:
Why airport security is broken, and how to fix it.
- 2012‑04‑15:
C++11 standard (with fixed typos).
- 2012‑04‑15:
NIRA: a new interdomain routing architecture.
- 2012‑04‑15:
Interdomain multipath routing.
- 2012‑04‑14:
Ask-for-forgiveness programming: how we might program 1000 cores.
- 2012‑04‑14:
Demonstrate multi-device responsive website design on the desktop.
- 2012‑04‑14:
Calling someone a cunt on Twitter is a crime that will get you locked up.
- 2012‑04‑14:
Lobbyists wreck the government's moves towards freely licensed open standards.
- 2012‑04‑14:
The benefits of giving up patent protection outweigh the risks of surrendering a share of the market.
- 2012‑04‑14:
Lord Justice Laws vs former Archbishop of Canterbury Lord Carey.
- 2012‑04‑14:
Fifty things to do before you're 11¾.
- 2012‑04‑14:
The Twitter languages of London.
- 2012‑04‑13:
Olympics branding police impose heavy restrictions on most UK businesses.
- 2012‑04‑13:
How computers are creating a second economy without workers.
- 2012‑04‑13:
A children's book about Ada, the first programmer, and Mary, the first sf writer.
- 2012‑04‑13:
Oracle thinks you can copyright a programming language, Google disagrees.
- 2012‑04‑13:
US government report on IP does not say what the MPAA thinks it does.
- 2012‑04‑13:
They almost built a life-size model of the starship Enterprise in Las Vegas.
- 2012‑04‑13:
UK Information Commissioner "highly unlikely" to enforce law requiring consent to store cookies.
- 2012‑04‑13:
IPv6 TLD hall of shame.
- 2012‑04‑13:
Jitsi SIP softphone now has DNSSEC support.
- 2012‑04‑13:
Intel 910 PCIe SSD: eye-watering performance at an eye-watering price.
- 2012‑04‑13:
Rack-mountable data center support staff.
- 2012‑04‑13:
Book price agreements at risk in the German-speaking world.
- 2012‑04‑13:
Corrupt British spies and complicity in torture.
- 2012‑04‑13:
London Underground's unique species of mosquitoes.
- 2012‑04‑13:
The curse of the upside-down apostrophe.
- 2012‑04‑13:
Death to Microsoft Word.
- 2012‑04‑13:
Rendering a map of the world.
- 2012‑04‑13:
Still Scrambling For Safety.
- 2012‑04‑12:
In lab experiments we show that swarms of soldier crabs in a maze can implement logic gates.
- 2012‑04‑12:
Shadow Cyclist vs Bus: excellent Lothian Buses training video.
- 2012‑04‑12:
Canada Post sues GeoCoder.ca for copyright infringement over GeoCoder's crowdsourced postcode database.
- 2012‑04‑12:
Britain's silent scandalous epidemic of people too poor to afford food.
- 2012‑04‑12:
How PCs boot.
- 2012‑04‑12:
Scrambling for Safety: conference against UK government snooping, 24th April at LSE.
- 2012‑04‑11:
A recursive network architecture.
- 2012‑04‑11:
The design of a routing service for campus-wide internet transport. (1981)
- 2012‑04‑11:
Nyan Waits.
- 2012‑04‑11:
The Rust programming language object system.
- 2012‑04‑11:
The crisis in American walking.
- 2012‑04‑11:
Here comes the pun: why playful language matters.
- 2012‑04‑11:
Hyperaddictive stupid games.
- 2012‑04‑11:
Sirpent: a high-performance internetworking approach. (1989)
- 2012‑04‑11:
Seat Assignment: lavatory self-portraits in the Flemish style.
- 2012‑04‑11:
What an app can do with "no permissions" on Android.
- 2012‑04‑10:
Tiny Transactions on Computer Science: scholarship in 140 characters or less.
- 2012‑04‑10:
Comparing price/user and price/employee of Instagram and other tech buyouts.
- 2012‑04‑10:
More than you ever wanted to know about goatse. (SFW!)
- 2012‑04‑10:
LuaProxy: manipulate an isolated Lua state with Lua (rather than C).
- 2012‑04‑10:
Declarative GUIs with Lua and Motif.
- 2012‑04‑10:
More on the insurmountable technical problems of LightSquared.
- 2012‑04‑10:
Wall Street "vulture" loses $14 billion bet against the laws of physics. (LightSquared cell towers would not wreck GPS?)
- 2012‑04‑10:
Addressing in internet protocols.
- 2012‑04‑10:
PHP: fractally bad design.
- 2012‑04‑10:
AnonWhois.org provides a list of domains with cloaked whois data.
- 2012‑04‑10:
Mosh: the mobile shell.
- 2012‑04‑09:
Why does the government always get Internet policy wrong?
- 2012‑04‑09:
The Guardian loves Eastercon.
- 2012‑04‑09:
Text from dog.
- 2012‑04‑09:
Commodore: Computers for the Masses.
- 2012‑04‑09:
Forbes obituary of Jack Tramiel.
- 2012‑04‑09:
Commodore before Commodore.
- 2012‑04‑09:
Smart meters teach electricity companies about computer security the hard way.
- 2012‑04‑09:
FCC report on DNSSEC implementation practices for ISPs.
- 2012‑04‑09:
European Commission's Civil Liberties Committee passes bill that will criminalise computer security tools.
- 2012‑04‑09:
The Swedish CCDP: focussing on the limits of technical privacy protections harms political protections.
- 2012‑04‑09:
Beard letters.
- 2012‑04‑09:
Linux + MySQL swap insanity and NUMA.
- 2012‑04‑09:
An introduction to petname systems.
- 2012‑04‑09:
Killer homoeopath Francine Scrayen doesn't understand the Streisand Effect.
- 2012‑04‑08:
You can't P2P the DNS and have it too.
- 2012‑04‑08:
The hideous name.
- 2012‑04‑08:
Mirrors: design principles for meta-level facilities of object-oriented programming languages.
- 2012‑04‑08:
Everyone who is actually involved in producing software knows that patents are a blight on the industry.
- 2012‑04‑08:
People make poor emergency backups for computerized dynamic systems.
- 2012‑04‑08:
British security services initiated extraordinary rendition.
- 2012‑04‑08:
Julia presented at Lang.NEXT 2012.
- 2012‑04‑08:
A first look at MintChip's hosted API's crypto.
- 2012‑04‑08:
FOI request for Theresa May's Internet history.
- 2012‑04‑08:
It should not be illegal to be a stupid racist bastard on Twitter.
- 2012‑04‑08:
We should not trust the security forces with sweeping new powers of surveillance.
- 2012‑04‑08:
Demoscene: The Art of the Algorithms.
- 2012‑04‑08:
DNS problems and alternatives.
- 2012‑04‑08:
UK surprised to find out after 10 years of close co-operation how bad Uzbekistan is.
- 2012‑04‑08:
Static analysis of an unknown compression format.
- 2012‑04‑08:
Hash Functions.
- 2012‑04‑08:
Unix password security: a case study. (1979)
- 2012‑04‑07:
Scroogled. A creepy story by Cory Doctorow.
- 2012‑04‑07:
Another instance of photographic copyright infringement by the Daily Mail.
- 2012‑04‑07:
Gov.uk web design principles.
- 2012‑04‑07:
Appeals court rejects Viacom's DMCA arguments against YouTube.
- 2012‑04‑07:
Google Maps exodus continues: Wikipedia mobile apps switch to OpenStreetMap.
- 2012‑04‑07:
Shadchen: pattern matching for Emacs Lisp.
- 2012‑04‑07:
A behind-the-scenes look at Facebook release engineering.
- 2012‑04‑07:
Keeping Instagram up with a million new users in 24 hours.
- 2012‑04‑07:
How to count a billion distinct objects using only 1.5KB of memory.
- 2012‑04‑06:
If Oracle wins its Android suit, everyone loses.
- 2012‑04‑06:
How a global temperature projection published in Science in 1981 matches real data since then.
- 2012‑04‑06:
The uncertainty in the realization and dissemination of the SI second from a systems point of view.
- 2012‑04‑06:
The beer game, supply chain efficiency, and why Apple manufactures in China.
- 2012‑04‑05:
A level grade inflation: A national disgrace.
- 2012‑04‑05:
London Olympics trying to get musicians to work for nothing.
- 2012‑04‑05:
UK Borders Agency brings back dental X-rays to identify children, previously stopped as breach of medical ethics.
- 2012‑04‑05:
Petition against government snooping.
- 2012‑04‑05:
The future of US oil production.
- 2012‑04‑05:
There aren't any security reasons to introduce secret courts.
- 2012‑04‑05:
The Daily Mail uses and abuses its female writers.
- 2012‑04‑05:
Amazon.co.uk pays no tax.
- 2012‑04‑05:
Author Chris McGrath faces six figure legal bill for his foolish libel suit.
- 2012‑04‑05:
Automatic porn censorship legislation under consideration in the House of Lords.
- 2012‑04‑05:
Lansley's attack on abortion: expensive, disruptive and unjustified.
- 2012‑04‑05:
Connecticut Senate votes to repeal death penalty.
- 2012‑04‑05:
MintChip: the Royal Canadian Mint's electronic currency.
- 2012‑04‑05:
A turning point for GNU libc.
- 2012‑04‑04:
The byte order fallacy: Rob Pike on endianness.
- 2012‑04‑04:
The end of secure computing on general-purpose hardware.
- 2012‑04‑04:
Lessons in stable corporate structure from John Lewis and the Halifax.
- 2012‑04‑04:
Notes from the Lib Dem conference call on communications interception.
- 2012‑04‑04:
Privacy law vs. government surveillance.
- 2012‑04‑04:
World War 3.0: regulating the Internet.
- 2012‑04‑04:
When computers were women.
- 2012‑04‑04:
Cambridge central post office to be refitted owing to lack of postal facilities.
- 2012‑04‑04:
Amazing chalk+blackboard typography.
- 2012‑04‑04:
Google uses reCAPTCHA to fix OCR errors and identify house numbers from Street View.
- 2012‑04‑04:
A one-line software patent.
- 2012‑04‑04:
Is Firefox slim yet? Graphs of memory usage benchmarks.
- 2012‑04‑04:
What is the meaning of this? (JavaScript)
- 2012‑04‑04:
UK Serious + Organized Crime Agency takes down website for copyright infringement. (Less ranting more details please?)
- 2012‑04‑04:
The way of the peaceful parent.
- 2012‑04‑04:
Clegg shows shocking signs of not actually being a Tory.
- 2012‑04‑04:
Confusion over warrants, surveillance powers and intrusive access to traffic data.
- 2012‑04‑04:
The general authorisation regime for public and private communications networks and services in the UK.
- 2012‑04‑04:
There's a sucker born every minute in Shepherds Bush.
- 2012‑04‑04:
Deconstruction of the government surveillance dissembling.
- 2012‑04‑04:
How not to sort by average rating.
- 2012‑04‑04:
Pratt parsers: expression parsing made easy.
- 2012‑04‑04:
The wheels are coming off the online monitoring bandwaggon.
- 2012‑04‑04:
On the expressive power of programming languages.
- 2012‑04‑04:
Shiny new legislation on communications data.
- 2012‑04‑04:
Liberal Democrat MPs stand up for data privacy.
- 2012‑04‑04:
Australian report against the war on drugs.
- 2012‑04‑03:
Bob the Angry Flower in Atlas Shrugged 2: one hour later.
- 2012‑04‑03:
DRM: a whip for beating authors and publishers.
- 2012‑04‑03:
Atlas Shrugged 2: shrug harder.
- 2012‑04‑03:
Richard Feynman and computation.
- 2012‑04‑03:
In praise of plain text data files and protocols. (Also featuring really bad XML.)
- 2012‑04‑03:
ORG notes on government surveillance plans.
- 2012‑04‑03:
Poles find out more about secret CIA prisons that violated Polish constitution.
- 2012‑04‑03:
Bloke called Merlin abuses bloke called Fish for having an implausible name.
- 2012‑04‑03:
Vienna failed to migrate to GNU/Linux: why?
- 2012‑04‑03:
Munich mayor says switch to Linux is cheaper and reduced complaints.
- 2012‑04‑03:
DNSSEC validator extension for Internet Explorer.
- 2012‑04‑03:
The future of HTTP in Python.
- 2012‑04‑03:
More urgency required to get 32 bit AS numbers working.
- 2012‑04‑03:
Are you sure you want to look at prospective employees' Facebook accounts?
- 2012‑04‑03:
The management problems that led to the bad mirror in the Hubble space telescope.
- 2012‑04‑02:
Computer science for the rest of us. (See also Kernighan "D is for Digital".)
- 2012‑04‑02:
Traditional hospital rotas put lives at risk.
- 2012‑04‑02:
What the Betamax case teaches us about Readability.
- 2012‑04‑02:
The fireplace delusion.
- 2012‑04‑02:
The credit rating agencies do not know what they are talking about, nor even what their ratings mean.
- 2012‑04‑02:
Random hash functions, or, more NaN lunacy.
- 2012‑04‑02:
See the Tory u-turn on civil liberties.
- 2012‑04‑02:
The communications snooping plans: time to get campaigning.
- 2012‑04‑02:
Julian Huppert on safeguards to control state surveillance.
- 2012‑04‑02:
Nick Clegg declares his support for the government's distributed snooping database.
- 2012‑04‑02:
Humans: hot, sweaty, natural-born runners - the evolutionary biology of persistence hunting.
- 2012‑04‑02:
CC Movie vs. infinite copyright.
- 2012‑04‑02:
Privacy International FAQ on the "Communications Capabilities Development Programme" aka routine warrantless surveillance.
- 2012‑04‑02:
Why Lua should not have slices, and some performance observations of Python.
- 2012‑04‑02:
Proposals for real-time monitoring of email and social media show the government has caved in to the security services.
- 2012‑04‑02:
The digital sundial at the Genk sundial park in Belgium.
- 2012‑04‑02:
Digital sundials for sale.
- 2012‑04‑02:
World's most accurate scope, nixie, and flip clocks.
- 2012‑04‑02:
Why states fail. (Will the extractive 1% impoverish us?)
- 2012‑04‑02:
Most cancer "discoveries" cannot be reproduced.
- 2012‑04‑02:
How Linux is changing lives in Zambia.
- 2012‑04‑01:
The national security and anti-terrorism party.
- 2012‑04‑01:
Nigeria Google.
- 2012‑04‑01:
The pirates who are fighting for your vote.
- 2012‑04‑01:
Girls put off coding by peer pressure.
- 2012‑04‑01:
Government plans to introduce more Internet snooping in the next Queen's speech.
- 2012‑04‑01:
Parliamentary privacy committee says Google, Twitter, etc. should enforce superinjunctions.
- 2012‑04‑01:
What if carpenters had forums like camera geeks?
- 2012‑04‑01:
Landlord turns tables on anti-abortion harassment.
- 2012‑03‑31:
Too Smart to Fail: Notes on an Age of Folly.
- 2012‑03‑31:
Copyright stagnation.
- 2012‑03‑30:
Phonetic hashes for fuzzy matching names.
- 2012‑03‑30:
More evidence that pesticides are killing bees.
- 2012‑03‑30:
More on the EU criminalisation of hacking tools.
- 2012‑03‑30:
"Servo" next generation browser layout engine design.
- 2012‑03‑30:
Roy Fielding's "Waka" proposal for HTTP/2.0.
- 2012‑03‑30:
Comments on Microsoft's SPDY proposal.
- 2012‑03‑30:
Train wreck: the privatization of British Rail.
- 2012‑03‑30:
People, Power, Area: how the laws of physics constrain our sustainable energy options. (TEDx vid)
- 2012‑03‑30:
Mitigating DNS denial of service attacks.
- 2012‑03‑29:
A Woman's Story.
- 2012‑03‑29:
EU plans to criminalize security research.
- 2012‑03‑29:
A new television series of Yes, Prime Minister.
- 2012‑03‑29:
Copenhagen's bicycle account says cycling is a net gain to society and driving is a net loss.
- 2012‑03‑29:
Kiva Systems order fulfillment robots. (YouTube)
- 2012‑03‑29:
EU To criminalise hacking tools.
- 2012‑03‑29:
DNSSEC deployment in .nl
- 2012‑03‑29:
The case for fair trade porn.
- 2012‑03‑29:
IETF hotel WiFi re-engineering.
- 2012‑03‑29:
Patents keep assistive communication technology clunky and expensive.
- 2012‑03‑29:
Change of glibc maintainers.
- 2012‑03‑28:
Wikipedia is rejecting about half of the good contributions by new editors.
- 2012‑03‑28:
Comparison of graph layout algorithms.
- 2012‑03‑28:
pandoc2rfc: low-markup IETF document tool.
- 2012‑03‑28:
Elephant plays with a smartphone. (YouTube)
- 2012‑03‑28:
UK speech crime: What can't you say on Twitter?
- 2012‑03‑28:
Finding IPv6 hosts by efficiently mapping ip6.arpa.
- 2012‑03‑28:
8-bit PC can run Ubuntu; takes about 6 hours to boot.
- 2012‑03‑28:
A fan site about the ATS programming language.
- 2012‑03‑28:
Hacker News discusses BitC, Rust, and Golang.
- 2012‑03‑28:
Optimizing for V8.
- 2012‑03‑28:
A profile of the mathematical genius Amalie Noether.
- 2012‑03‑28:
The (LEGO) Duel. (YouTube)
- 2012‑03‑28:
Ursula Le Guin on the supposed death of the book.
- 2012‑03‑28:
Headblade: razors for scalps.
- 2012‑03‑28:
Touring DNS open houses for trends and configurations.
- 2012‑03‑28:
Put more entropy at the start of your key names for better Amazon S3 performance.
- 2012‑03‑28:
Death of a data haven: cypherpunks, WikiLeaks, and Sealand, the world's smallest nation.
- 2012‑03‑28:
Bespoke fitted hat making with a conformateur and a formillon.
- 2012‑03‑28:
The best birth control in the world is for men.
- 2012‑03‑27:
Erasure coding makes files more fragile, not less.
- 2012‑03‑27:
Twitter's pull-to-refresh patent.
- 2012‑03‑27:
A linguistic history of cocks, dicks, and nuts.
- 2012‑03‑27:
Android or condom?
- 2012‑03‑27:
Geek identity, mainstreaming, authenticity, and adulthood.
- 2012‑03‑27:
News Corporation promoted piracy of pay TV rivals in Australia and other countries.
- 2012‑03‑27:
After major First Amendment ruling, Boston police settle cellphone recording wrongful arrest lawsuit.
- 2012‑03‑27:
Why power generators are terrified of solar PV.
- 2012‑03‑27:
SGI has turned into a patent troll.
- 2012‑03‑27:
Akamai will offer IPv6 to its customers starting April 2012.
- 2012‑03‑27:
Pirate Party now a significant political force in Germany.
- 2012‑03‑27:
A blow for speculative copyright invoicing.
- 2012‑03‑27:
Linux 3.3: finally a little good news about bufferbloat.
- 2012‑03‑27:
One drug to shrink all tumours?
- 2012‑03‑27:
Rainbow: small syntax highlighting library for Javascript.
- 2012‑03‑27:
Time to renegotiate the European Arrest Warrant.
- 2012‑03‑27:
CPS makes errors of analysis and judgment in 7% of prosecution cases.
- 2012‑03‑27:
The tweet police: illiberal courts don't believe in common sense or decency.
- 2012‑03‑27:
Ontario legalizes brothels on safety grounds.
- 2012‑03‑27:
Documentation style: declarative or imperative?
- 2012‑03‑27:
Teratogenic effects of pure evil in ursus teddius domesticus.
- 2012‑03‑27:
Scalability lessons from YouTube.
- 2012‑03‑27:
Redis persistence demystified.
- 2012‑03‑27:
femtolisp: a lightweight robust lisp interpreter built on reusable C libraries.
- 2012‑03‑26:
A config library for JVM languages.
- 2012‑03‑26:
Safe elegant configuration files with Scala.
- 2012‑03‑26:
Explore the fourth dimension on your iPad or iPhone.
- 2012‑03‑26:
16-year-old makes working scientific graphing calculator in Minecraft.
- 2012‑03‑26:
Bike Butterfly.
- 2012‑03‑26:
A News Corporation company gave money and trade secrets to a hacker site to kill Sky rival ITV Digital with piracy.
- 2012‑03‑26:
How the TSA handles a plane full of soldiers.
- 2012‑03‑26:
The cultural clout of young female readers.
- 2012‑03‑26:
cmonster: a Python wrapper for the Clang C++ parser.
- 2012‑03‑26:
Racist Hunger Games fans are very disappointed.
- 2012‑03‑26:
A total disaster for homoeopathy.
- 2012‑03‑26:
Language-independent sandboxing (in NaCl) of just-in-time compilation and self-modifying code.
- 2012‑03‑26:
Work-efficient higher-order vectorization.
- 2012‑03‑26:
Debtris.
- 2012‑03‑26:
How the Daily Mail conquered Britain.
- 2012‑03‑26:
The USA must stop wanting good government in the middle east more than the Arabs do.
- 2012‑03‑26:
How a language can be faster than C.
- 2012‑03‑25:
Why to prefer gzip not deflate compression for HTTP.
- 2012‑03‑25:
Retrospective thoughts on BitC.
- 2012‑03‑25:
The six stages of debugging.
- 2012‑03‑25:
Legit: git for humans.
- 2012‑03‑25:
LaTeX for logicians.
- 2012‑03‑25:
This is what the end of Moore's law looks like: NVidia grumbles about TSMC.
- 2012‑03‑24:
Governments spending millions for zero-day exploits, keeping them secret from software vendors.
- 2012‑03‑24:
Google Service Accounts: OAuth 2 certificate-based app authentication.
- 2012‑03‑24:
Lessons from the Iraq war.
- 2012‑03‑24:
An efficient scholarly journal.
- 2012‑03‑24:
A collection of web development cheat sheets.
- 2012‑03‑24:
The wheels come off Toronto's experiment in Tea Party politics.
- 2012‑03‑24:
US federal agencies still struggling to deploy mandatory DNSSEC.
- 2012‑03‑24:
Summit Entertainment claims to own the date November 20, 2009.
- 2012‑03‑24:
Antibiotic over-use means the end of safe medicine.
- 2012‑03‑24:
ISO lobbies against open standards, but doesn't know what they are.
- 2012‑03‑24:
Statistical laws governing fluctuations in word use from word birth to word death.
- 2012‑03‑24:
Perverse incentives and pizza delivery.
- 2012‑03‑24:
Frustro: the impossible typeface, based on Penrose triangles.
- 2012‑03‑23:
NFC phones can pull details from contactless cards through wallets and clothes.
- 2012‑03‑23:
The injustice of minimum alcohol pricing.
- 2012‑03‑23:
Using a laser and an ultrafast camera to see around corners.
- 2012‑03‑23:
Optimized strings for Java. (One allocation for header and data, like Lua.)
- 2012‑03‑23:
m0n0wall: a firewall package based on an embedded unix with init scripts written in PHP and configured with XML.
- 2012‑03‑23:
Florian Weimer's passive DNS replication software.
- 2012‑03‑23:
The art of always being right.
- 2012‑03‑23:
The US Department of Defense computer networks have been completely compromised by foreign spies.
- 2012‑03‑23:
ISC passive DNS architecture.
- 2012‑03‑23:
Nine open problems for conjunctive and Boolean grammars.
- 2012‑03‑23:
Parsing: the solved problem that isn't.
- 2012‑03‑23:
The proof is trivial!
- 2012‑03‑22:
Ten million DNS resolvers on the Internet.
- 2012‑03‑22:
The debunking handbook: a guide to correcting misinformation.
- 2012‑03‑22:
How not to provide a mobile optimised website AND how not to use QR codes.
- 2012‑03‑22:
Comcast and Time Warner cable rolling out IPv6 this year.
- 2012‑03‑21:
Hierarchies of ebook design.
- 2012‑03‑21:
Perl secret operators and constants.
- 2012‑03‑21:
85% of SPF hard fail messages are legit.
- 2012‑03‑21:
Petition to put Alan Turing on the next £10 note.
- 2012‑03‑21:
The Millcroft Campanile: a ten bell mini-ring at Willingham in Cambridgeshire.
- 2012‑03‑21:
Version control timeline.
- 2012‑03‑21:
Geocities-izer.
- 2012‑03‑21:
The digital detective: Mikko Hypponen's war on malware is escalating.
- 2012‑03‑20:
Clay: a language for generic programming.
- 2012‑03‑20:
Big flaws in web apps that rely on cloud single sign-on.
- 2012‑03‑20:
Dave Crocker on the history of email.
- 2012‑03‑20:
The history of email.
- 2012‑03‑20:
"That's what she really said." Fighting sexist jokes the geeky way!
- 2012‑03‑20:
An idea for fluid window controls.
- 2012‑03‑20:
Libya regime change bombing campaign made UN missions to protect civilians less likely.
- 2012‑03‑19:
Why bcrypt is somewhat better than PBKDF2.
- 2012‑03‑19:
A brief bit about near misses by asteroid 2012 DA14.
- 2012‑03‑19:
D is for Digital, by Brian Kernighan.
- 2012‑03‑19:
Stumped by a problem? This technique unsticks you.
- 2012‑03‑19:
How to hang a picture using n nails so that removing any k nails makes the picture fall.
- 2012‑03‑19:
Dance the digital/physical flip-flop: a pattern for art.
- 2012‑03‑19:
Judge chooses Pi Day to reject lawsuit over attempt to copyright pi as a tune.
- 2012‑03‑19:
The growth of the Elsevier boycott for open access to scientific journals.
- 2012‑03‑19:
"Feminism" is making a roaring comeback, thanks to the Republican War On Women: misogyny on steroids.
- 2012‑03‑19:
Chirpclock: who is mentioning the current time on Twitter.
- 2012‑03‑19:
Writing with word processors: a research overview.
- 2012‑03‑19:
Growth in DNS resolvers with IPv6 connectivity.
- 2012‑03‑19:
UK digital economy dwarfs the creative sector.
- 2012‑03‑19:
The evolution of character codes, 1874-1968.
- 2012‑03‑19:
Free Universal Construction Kit: interoperability between construction toys.
- 2012‑03‑19:
Bilingualism makes you smarter.
- 2012‑03‑19:
How UK ENUM abuses the DNS.
- 2012‑03‑19:
Metropolitan Police pay compensation to student who was wrongly arrested for filming buildings.
- 2012‑03‑19:
The left in the UK is divided between labourism and liberalism.
- 2012‑03‑19:
About those vector icons.
- 2012‑03‑19:
Speaking to a technical conference.
- 2012‑03‑19:
How good is JavaScript?
- 2012‑03‑19:
Divided We Stand: the polarization of American politics.
- 2012‑03‑19:
Bank of America: too crooked to fail.
- 2012‑03‑18:
The future for cash in the UK.
- 2012‑03‑18:
In Sweden, cash is king no more.
- 2012‑03‑18:
In protest, Democrats zero in on men's reproductive health.
- 2012‑03‑18:
Megaupload seizure order "null and void" says NZ High Court.
- 2012‑03‑18:
How to explain your game to an asshole.
- 2012‑03‑18:
How one man escaped from a North Korean prison camp.
- 2012‑03‑18:
Very large RSA public exponents and DNSSEC validator CPU usage.
- 2012‑03‑18:
When Ulysses S. Grant expelled the Jews.
- 2012‑03‑18:
What ails the Linux desktop? The wrong kind of freedom.
- 2012‑03‑18:
0800Buster: 0800 to geographical number translation.
- 2012‑03‑18:
Radical biplane design might fly supersonic without the boom.
- 2012‑03‑17:
World's most annoying business (direct marketing) complains about privacy regulations.
- 2012‑03‑17:
This might seem silly: "git pull" in Swedish.
- 2012‑03‑17:
Catholic bishop to hospitals: let women die, that's an order.
- 2012‑03‑17:
Ranto: learn NOT to speak Esperanto.
- 2012‑03‑17:
MPAA ratings and the film "Bully".
- 2012‑03‑17:
The end of Pax Papyra and the fall of Big Paper.
- 2012‑03‑17:
RSA public exponent size, performance, and DNSSEC.
- 2012‑03‑17:
Why they didn't use a bloom filter.
- 2012‑03‑17:
The new iPad's screen under the microscope.
- 2012‑03‑17:
Single page web apps with Backbone.js.
- 2012‑03‑16:
Church encodings and the U and Y combinators in JavaScript.
- 2012‑03‑16:
Diagnosing weird problems: a debugging case study.
- 2012‑03‑16:
Regulatory Catch 22: distillery regulations in Tennessee.
- 2012‑03‑16:
Terry Winograd: Thinking machines: Can there be? Are we?
- 2012‑03‑16:
For every network service, there's an equal and opposite disservice.
- 2012‑03‑16:
The NSA is building a huge communications interception data centre in Utah.
- 2012‑03‑16:
Texas loses Medicaid funding owing to anti-contraception lunacy.
- 2012‑03‑16:
Why software patents are evil.
- 2012‑03‑16:
How not to attract tourists.
- 2012‑03‑16:
European Parliament blocks orphan works copyright reform with 113% turnout.
- 2012‑03‑16:
Correlation between white rice consumption and risk of diabetes.
- 2012‑03‑16:
MPs should sever links with the Christian charity CARE which co-sponsored 'gay cure' event.
- 2012‑03‑16:
Ruby, Ruby on Rails, and _why: The disappearance of one of the world's most beloved computer programmers.
- 2012‑03‑16:
Make Commodity Beautiful.
- 2012‑03‑15:
Copyright math. (TED talk)
- 2012‑03‑15:
Decades of research proves that shorter work hours raise productivity and profits, and overtime destroys them.
- 2012‑03‑15:
What's really wrong with Goldman Sachs.
- 2012‑03‑15:
The first press article about the first webcam: the Trojan Room coffee pot camera.
- 2012‑03‑15:
International domain takedowns for copyright infringement: ICANN to cooperate with global law enforcement.
- 2012‑03‑15:
What to say to the government in the equal marriage consultation.
- 2012‑03‑15:
An estimate of the size of Amazon AWS.
- 2012‑03‑15:
Linear Scan register allocator for the OCaml native code compiler.
- 2012‑03‑15:
The Microsoft Azure outage: time is a SPOF, leap day doubly so.
- 2012‑03‑15:
Number misuse, telecommunications regulations, the Internet, and WCIT.
- 2012‑03‑14:
Cyberwar is still more hype than reality.
- 2012‑03‑14:
Dave Gorman takes on Flickr's quick permanent deletion DMCA takedown policy.
- 2012‑03‑14:
Unknown tech company defies FBI national security letter in secret surveillance case.
- 2012‑03‑14:
Judge orders failed copyright troll Righthaven to forfeit all its copyrights to pay off its debts.
- 2012‑03‑14:
Why Greg Smith is leaving Goldman Sachs.
- 2012‑03‑14:
Wrecking crew orchestra. (YouTube)
- 2012‑03‑14:
Twitter's tales of sexism.
- 2012‑03‑14:
Carrier-grade NAT address space: 100.64.0.0/10.
- 2012‑03‑14:
ICANN 43 DNSSEC workshop slides.
- 2012‑03‑14:
European GDP per region.
- 2012‑03‑14:
Machine pareidolia: applying a face detection algorithm to antropomorphic objects.
- 2012‑03‑14:
Yahoo-Facebook patent fight: more than meets the eye.
- 2012‑03‑14:
A homeless person costs $40,000 a year or more; providing housing is much cheaper.
- 2012‑03‑14:
A reason insurers won't cover people with pre-existing conditions.
- 2012‑03‑14:
Stop innovating, please: Kaleidescape loses DVD jukebox case.
- 2012‑03‑14:
Miles of rail line could be re-opened.
- 2012‑03‑14:
The possible physics of Angry Birds in Space.
- 2012‑03‑14:
Encyclopedia Britannica halts print publication after 244 years.
- 2012‑03‑14:
Why James Whittaker left Google.
- 2012‑03‑13:
The Fall of the House of Murdoch.
- 2012‑03‑13:
India uses a compulsory patent licence to reduce cost of anti-cancer drug.
- 2012‑03‑13:
Going DNSSEC with Unbound and PowerDNS.
- 2012‑03‑13:
Fukushima was no disaster, no matter how you spin it.
- 2012‑03‑13:
Olympics 2012: you had better not upset anyone in lockdown London.
- 2012‑03‑13:
"Influencers" are not the key to viral success: fans are.
- 2012‑03‑13:
Catholic Church uses US courts to attack paedo priest victim support organization.
- 2012‑03‑13:
Fake Unicode Consortium
- 2012‑03‑12:
Train stations are no place for armed police.
- 2012‑03‑12:
Technology and morality: Apple vs freedom.
- 2012‑03‑12:
Metaprogramming custom control structures with the C preprocessor.
- 2012‑03‑12:
UX design tips for iPad apps for small children.
- 2012‑03‑12:
An alternative to pharmaceutical patents.
- 2012‑03‑12:
How patent monopolies work in the real world, not the fairyland of the lone inventor.
- 2012‑03‑12:
Why Monsanto could not believe weeds would develop resistance to herbicide.
- 2012‑03‑12:
Spanish and German national libraries release bibliographic databases under CC0.
- 2012‑03‑12:
Edgar Rice Burroughs copyright zombie uses trademark law to prevent derivative use of public domain works.
- 2012‑03‑12:
Dangerous assumptions and unconscious discrimination.
- 2012‑03‑12:
The 01:58 rail replacement service from Stevenage, when the clocks go forwards (daylight saving time starts).
- 2012‑03‑12:
How Labour and Conservative politicians invited News International into government.
- 2012‑03‑12:
Why is C++ iostreams so amazingly slow?
- 2012‑03‑12:
time.is: display your time and place.
- 2012‑03‑12:
Plead "not guilty" and demand a trial, to crash the justice system.
- 2012‑03‑12:
British banks failed owing to simply lending too much: no CDOs or derivatives to blame.
- 2012‑03‑11:
Apple launch events usually break live blogging platforms.
- 2012‑03‑11:
Using an iPad effectively in the classroom: feedback support / overviews with attitude.
- 2012‑03‑11:
Annotated NHS bill letter from Lib Dem leadership.
- 2012‑03‑10:
Department of Health still trying to keep reform risk assessment secret.
- 2012‑03‑10:
What privatised out-of-hours GP service has been like in Cornwall.
- 2012‑03‑10:
Summary of Windows Azure service disruption on Feb 29th, 2012.
- 2012‑03‑10:
The not-so-sweet smell of odious sovereign debt.
- 2012‑03‑10:
£153 to get a licence to hold an Easter egg hunt.
- 2012‑03‑10:
What free speech really means.
- 2012‑03‑10:
Consequences of increased resistance in corn rootworm to GM plants.
- 2012‑03‑10:
Apple causes nice problems for OpenStreetMap.
- 2012‑03‑10:
Examples of Lisp code typography.
- 2012‑03‑09:
Chisel: Fossil SCM hosting.
- 2012‑03‑09:
SPCDNS: a DNS library with Lua binding.
- 2012‑03‑09:
Boozy Britain, or not: what the media don't tell you.
- 2012‑03‑09:
Predicting Internet telephony call setup delay.
- 2012‑03‑09:
The personal analytics of Stephen Wolfram's life.
- 2012‑03‑09:
The fatal mistake of programming language research is to create a new language.
- 2012‑03‑08:
load81: a Lua programming environment for children.
- 2012‑03‑08:
The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes.
- 2012‑03‑08:
Apple is using OpenStreetMap in iPhoto.
- 2012‑03‑08:
If you don't feel that International Women's Day is for you ...
- 2012‑03‑08:
Open source military helicopters to fight proprietary lock-in.
- 2012‑03‑08:
George Dyson's continued downplaying of British computing efforts is tiresome.
- 2012‑03‑08:
Where is it safe to register a domain name? Which TLDs are independent from the US government.
- 2012‑03‑08:
SSL and browsers: the pillars of broken security.
- 2012‑03‑07:
How to get anything past a TSA nude body scanner.
- 2012‑03‑07:
When full disclosure meets SCADA PLCs.
- 2012‑03‑07:
History of free birth control in the UK.
- 2012‑03‑07:
The practical reality of contraception in the USA.
- 2012‑03‑07:
Five years ago the House of Commons voted for an elected House of Lords.
- 2012‑03‑07:
Who would have thought that a web taxi firm would have it easier in France than in the US?
- 2012‑03‑07:
TfL advised engineers to ignore cyclists at killer Kings Cross junction, despite cyclists being 20% of casualties.
- 2012‑03‑07:
Trans-Pacific Partnership Agreement: a stealth attempt to undermine democracy.
- 2012‑03‑07:
Why Hayek would have hated software patents.
- 2012‑03‑07:
Reddit v Hacker News v Twitter.
- 2012‑03‑07:
A self-organising news site?
- 2012‑03‑06:
EFF argues in court that Warner Bros bogus DMCA takedowns stifle free speech.
- 2012‑03‑06:
This time is different: A panoramic view of eight centuries of financial crises.
- 2012‑03‑06:
Intro to DNS for developers.
- 2012‑03‑06:
Weapons of mass assignment: Ruby on Rails PHP-style vulnerability. (May 2011)
- 2012‑03‑06:
The new networked feminism and Limbaugh's spectacular social media defeat.
- 2012‑03‑05:
Ayn Rand's libertarianism is the ugliest philosophy since the second world war.
- 2012‑03‑05:
Japanese writing, design and typography.
- 2012‑03‑05:
Paul Krugmsn on economics in the crisis.
- 2012‑03‑05:
US government agencies will be required to validate DNSSEC signatures.
- 2012‑03‑05:
Web site bandwidth. Twitter uses a 4MB framework to transmit a 140 character tweet.
- 2012‑03‑05:
The human rights statistician.
- 2012‑03‑05:
Invisible Mercedes. (YouTube)
- 2012‑03‑04:
Got Mead?
- 2012‑03‑04:
Agriculture: the worst mistake ever.
- 2012‑03‑04:
Why an MRI costs $1,080 in America and $280 in France.
- 2012‑03‑04:
Food marketing is a big lie.
- 2012‑03‑04:
NHS fairness tsar received £799,000 payment from US private health giant.
- 2012‑03‑04:
The Raspberry Pi can help schools get with the program.
- 2012‑03‑04:
Artist and hacktivists sabotage Spanish anti-piracy law.
- 2012‑03‑04:
Is there still research to be done in programming languages?
- 2012‑03‑04:
"Forget Your Past": Buzludzha, Bulgaria.
- 2012‑03‑04:
Why is nobody using X.509 client certificates?
- 2012‑03‑04:
60 metre asteroid 2012 DA14 to approach within geosynchronous orbit and may collide.
- 2012‑03‑04:
A few thoughts on Bell Labs and innovation.
- 2012‑03‑04:
Nobody wants to learn how to program: teaching how to make computers do new things.
- 2012‑03‑04:
Police help construction firms to blacklist troublesome workers.
- 2012‑03‑04:
Cult information centre under attack.
- 2012‑03‑04:
Mari0: Super Mario Brothers clone with Portal mashup.
- 2012‑03‑03:
The NY Times explains Londoners.
- 2012‑03‑03:
Misunderstanding higher education: eight "category mistakes".
- 2012‑03‑03:
Why the F5 BIG-IP iRules are based on Tcl.
- 2012‑03‑03:
Fault tolerance in NetFlix's high volume distributed system.
- 2012‑03‑03:
Spotlight on movie profitability: an excellent data visualisation.
- 2012‑03‑02:
Copyright lawyers sue patent lawyers for using academic papers to prepare patents.
- 2012‑03‑02:
Vortex radio modulation could boost wireless capacity "infinitely".
- 2012‑03‑02:
The impact of Raspberry Pi on the RS website.
- 2012‑03‑02:
Harmony explained: progress towards a scientific theory of music.
- 2012‑03‑02:
How the giant patent troll Intellectual Ventures operates.
- 2012‑03‑02:
"Sorry mate, I didn't see you." The excuse of the dangerous driver.
- 2012‑03‑02:
UK police to be privatised.
- 2012‑03‑02:
Fantasy shipping forecast.
- 2012‑03‑02:
The Washington Post gets taught a lesson about credulous press release churnalism and the need for fact-checking.
- 2012‑03‑02:
Every car in France must carry a breathalyzer from July 1st.
- 2012‑03‑02:
ICANN's dodgy ccTLD redelegations in 2005. (The Register)
- 2012‑03‑02:
How not to sell software in 2012.
- 2012‑03‑01:
Microsoft Windows Azure cloud service hit by 8 hour downtime due to leap day bug.
- 2012‑03‑01:
How Red Hat killed its core product to became a billion dollar business.
- 2012‑03‑01:
Too big to fail: the first 5000 years.
- 2012‑03‑01:
The 50% tax rate, and tax breaks for entrepreneurs.
- 2012‑03‑01:
East African internet resilience.
- 2012‑03‑01:
New speech-jamming gun hints at dystopian future.
- 2012‑03‑01:
SSL/TLS deployment best practices.
- 2012‑03‑01:
Programs as proofs: models and types in the lambda calculus.
- 2012‑02‑29:
Large exponent overflows in Golang's RSA library, causing godns DNSSEC interop problems.
- 2012‑02‑29:
US authorities require Verisign to seize Canadian .com subdomain registered via foreign registrar.
- 2012‑02‑29:
Disputes about bogus automated YouTube DMCA takedowns are judged by the accuser.
- 2012‑02‑29:
Faster Javascript through category theory.
- 2012‑02‑29:
Ned Freed describes a few problems in X.400.
- 2012‑02‑29:
Six real people with mind-blowing mutant superpowers.
- 2012‑02‑29:
Frank King and the Paternoster Square sundial.
- 2012‑02‑29:
No right to parody in the UK / the video Olympics Authorities want banned.
- 2012‑02‑29:
What Raspberry Pi is for: encouraging children to write software.
- 2012‑02‑29:
News of the World interfered with a murder inquiry.
- 2012‑02‑29:
Key SOPA/PIPA article censored by bogus DMCA takedown notice.
- 2012‑02‑29:
Cotton Candy: $200 powerful thumb-sized ARM Linux machine.
- 2012‑02‑29:
An attempt to gag parliament with a super-injunction covering 7/7 allegations.
- 2012‑02‑29:
Young women are, like, way ahead of the linguistic curve?
- 2012‑02‑28:
Profile of a failed Anonymous attack.
- 2012‑02‑28:
Richer people are less ethical.
- 2012‑02‑28:
Carmen Sandiego: latina rôle model.
- 2012‑02‑28:
vsResolver: a validating stub DNSSEC resolver written in Python.
- 2012‑02‑28:
Principles and objectives for safer cycling in Britain.
- 2012‑02‑28:
The corrupt relationship between News International and the Met Police becomes clearer.
- 2012‑02‑28:
How to build a naive Bayes classifier.
- 2012‑02‑28:
The hue and cry over buying and selling tickets for live music.
- 2012‑02‑28:
A whole /8 legacy class A block of IP addresses for sale.
- 2012‑02‑27:
The intelligent argument for legalizing cannabis in California.
- 2012‑02‑27:
Coerced citations and manipulated impact factors: the dirty tricks of academic journals.
- 2012‑02‑27:
FCC fires FUD at the idea of a UN-controlled Internet.
- 2012‑02‑27:
NPR will now avoid "he said, she said" false-balance reporting.
- 2012‑02‑27:
Regenemies: a regex matching game.
- 2012‑02‑27:
Petition to stop the beer duty escalator.
- 2012‑02‑27:
Boycotts and access to back issues of scholarly journals.
- 2012‑02‑27:
goluago: an implementation of Lua written in Golang.
- 2012‑02‑27:
Why HDDs have a higher failure rate when operated at altitude.
- 2012‑02‑27:
LuaDNS: scriptable bulk DNS hosting managed with git.
- 2012‑02‑27:
Imaging the charge distribution within a single molecule using Kelvin probe force microscopy.
- 2012‑02‑27:
Economists cling to beliefs that no longer apply in an overconnected world.
- 2012‑02‑27:
The case of the $517 chest x-ray.
- 2012‑02‑27:
The business of bookmarking: pinboard.in.
- 2012‑02‑27:
Cities fit for people, on foot as well as on bike.
- 2012‑02‑27:
Increasing TCP's initial window as standard.
- 2012‑02‑27:
Google and Microsoft have large TCP initial windows.
- 2012‑02‑27:
Innovation at Bell Labs.
- 2012‑02‑27:
The social mobility problem: poor children do badly in most of England's schools.
- 2012‑02‑27:
Conversation, Twitter, and Susan Greenfield.
- 2012‑02‑26:
If you want reproducible science, the software needs to be open source.
- 2012‑02‑26:
The Bechdel Test and the 2012 Oscars. (YouTube)
- 2012‑02‑26:
Simon Beck makes huge geometric patterns by walking in snow.
- 2012‑02‑26:
Testing a steam locomotive on the London Underground.
- 2012‑02‑26:
Feminism.
- 2012‑02‑26:
Beeb@30: celebrating the 30th birthday of the BBC Micro.
- 2012‑02‑26:
How to make pseudoephedrine from meth.
- 2012‑02‑26:
Attacking the Washington DC Internet voting system.
- 2012‑02‑26:
What happens to the cocaine from making Coca-Cola?
- 2012‑02‑26:
The sun is setting on Rails-style MVC frameworks.
- 2012‑02‑26:
Bitcoin & Gresham's Law: the economic inevitability of collapse.
- 2012‑02‑25:
Why the super-rich love the UK.
- 2012‑02‑25:
Safecracking for the computer scientist.
- 2012‑02‑25:
Anti-authoritarianism is deemed a mental health problem.
- 2012‑02‑25:
Twitter as a vector for disinformation.
- 2012‑02‑25:
The UN/ITU threat to Internet freedom.
- 2012‑02‑25:
Teller reveals his magical secrets.
- 2012‑02‑25:
Designing geared twisty 3D puzzles.
- 2012‑02‑25:
Can economic growth last? The limits on thermodynamic efficiency.
- 2012‑02‑25:
A history of multitouch.
- 2012‑02‑24:
iBooks DRM has been cracked.
- 2012‑02‑24:
How Olivetti stitched up Acorn.
- 2012‑02‑23:
How credit card payment processing works, from the online merchant point of view.
- 2012‑02‑23:
PHP 0+2=4.
- 2012‑02‑23:
Amazon pulls thousands of ebooks from sale after publisher refuses to reduce prices.
- 2012‑02‑23:
EFF press release on the failed Astrolabe TZ copyright claim.
- 2012‑02‑23:
Astrolabe Inc. drop their copyright claims against Olson and Eggert for the TZ database.
- 2012‑02‑23:
SO_REUSEPORT: scaling multicore servers with high connection rates.
- 2012‑02‑23:
Cecil/Diesel/Vortex programming languages.
- 2012‑02‑23:
How bots seized control of a pricing strategy.
- 2012‑02‑23:
Why do we need academic journals in the first place?
- 2012‑02‑23:
333 donations from private healthcare sources totalling £8.3 million given to the Tories.
- 2012‑02‑23:
Australian National Health and Research Council CEO supports open access and the Elsevier boycott.
- 2012‑02‑22:
Butter improves brain function?
- 2012‑02‑22:
Registrars that support end user DNSSEC + DS record management.
- 2012‑02‑22:
The 4+4 hour sleeping pattern.
- 2012‑02‑22:
The case for publishing the source code of research software.
- 2012‑02‑22:
The US music industry is stealing from people who post videos on YouTube.
- 2012‑02‑22:
According to Fox News, Iran is always a year away from having nukes.
- 2012‑02‑22:
All dead Mormons are now gay.
- 2012‑02‑22:
The RIAA is collapsing; the rest of the music industry is thriving.
- 2012‑02‑22:
The future is not evenly distributed per gender.
- 2012‑02‑22:
How to brick an electric car.
- 2012‑02‑22:
Britain fails the maths test.
- 2012‑02‑22:
How Mailinator compresses email by 90%.
- 2012‑02‑22:
A better way to teach science than lecturing.
- 2012‑02‑21:
DNSChef: a highly configurable response-forging DNS proxy.
- 2012‑02‑21:
Luerl: a version of Lua written in Erlang.
- 2012‑02‑21:
Valerie Aurora has Ehlers-Danlos syndrome.
- 2012‑02‑21:
IE cookie loophole reported in 2010.
- 2012‑02‑21:
Google bypassing user privacy settings in IE too.
- 2012‑02‑21:
The problems with hashbangs.
- 2012‑02‑21:
Twitter to get rid of hashbangs.
- 2012‑02‑20:
On removing call/cc from Scheme R7RS.
- 2012‑02‑20:
Sauerkraut Station.
- 2012‑02‑20:
Mountain Lion safety guide.
- 2012‑02‑20:
Two Canadian universities to monitor internal email for copyright infringement, which includes sending hyperlinks.
- 2012‑02‑20:
Infinite copyright: a modest proposal.
- 2012‑02‑20:
How a papermaker helps preserve civilization.
- 2012‑02‑20:
Elsevier is doing an unbelievably shitty job of accomplishing its ONE AND ONLY PURPOSE.
- 2012‑02‑20:
How Forbes stole a New York Times article and got all the traffic.
- 2012‑02‑20:
Our unrealistic views of death: "aggressive medical treatment can become sanctioned torture."
- 2012‑02‑19:
How Gordon Moore invented the talent economy on which Silicon Valley is based.
- 2012‑02‑19:
John Nash's 1955 letter to the NSA on cryptography and computational complexity.
- 2012‑02‑19:
AMD: what went wrong?
- 2012‑02‑19:
Examples of misuse of Census 2001 data on religion.
- 2012‑02‑19:
The Citizens United catastrophe: replacing American democracy with plutocracy.
- 2012‑02‑19:
PLOT: Programming Language for Old Timers.
- 2012‑02‑19:
Why we created Julia - a fresh approach to technical computing.
- 2012‑02‑19:
Origami micro-drones laser-cut from a sheet.
- 2012‑02‑19:
The Julia programming language.
- 2012‑02‑19:
Cameron's hospital visit covered up after all the staff treat him like scum.
- 2012‑02‑19:
Time in the 10,000 year clock.
- 2012‑02‑19:
Michael Gove says anti-discrimination law does not apply to school curriculum.
- 2012‑02‑19:
The Mu USB adapter. (Folding UK plug, 1A output.)
- 2012‑02‑19:
Brilliant UK folding plug finally goes on sale - as a USB wall wart.
- 2012‑02‑19:
The politicians who will profit from wrecking the NHS.
- 2012‑02‑18:
Stop paying your jQuery tax.
- 2012‑02‑18:
Sloppy reporting on the self-driving car.
- 2012‑02‑18:
Inside the amazing and embarrassing French postnatal "perineal re-education" class.
- 2012‑02‑18:
How category theory relates to programming language theory.
- 2012‑02‑18:
Labour broke the state in its manic attempt to set markets free and then prop them up when they inevitably failed.
- 2012‑02‑18:
Martin Amis's guide to classic video games: 100-proof WTF.
- 2012‑02‑18:
Another reason for boycotting GoDaddy.
- 2012‑02‑18:
Labour: an illiberal elitist capitalist party with no taste for democracy and a misplaced paternalism towards the masses.
- 2012‑02‑18:
Cops spend weeks to seduce 18-year-olds into selling pot, pointlessly ruining their lives.
- 2012‑02‑18:
The piracy threshold: when honesty becomes too difficult.
- 2012‑02‑18:
Who is, and is not, invited to Cameron's emergency NHSbill summit?
- 2012‑02‑18:
SSD performance and reliability drops as feature sizes shrink.
- 2012‑02‑18:
LSM B-tree: log-structured merge tree storage engine in Erlang.
- 2012‑02‑17:
Does your smartphone speak your language?
- 2012‑02‑17:
How to save money on FOI without changing the law.
- 2012‑02‑17:
Fatigué? Pensif? Triste?
- 2012‑02‑17:
How Target figured out a teenager was pregnant before her father did.
- 2012‑02‑17:
First peal by members of the Regent House of the University of Cambridge.
- 2012‑02‑17:
Nimrod: logfile-based metrics server written in Clojure.
- 2012‑02‑17:
How Etsy developers manage their test suite.
- 2012‑02‑17:
Google stealthily exploits bug in Safari to violate users' privacy settings.
- 2012‑02‑17:
Autometrics: self-service metrics collection at LinkedIn.
- 2012‑02‑17:
MapReduce patterns, algorithms, and use cases.
- 2012‑02‑16:
Who can name the biggest number?
- 2012‑02‑16:
iOS apps and the address book: who has your data, and how they're getting it.
- 2012‑02‑16:
Why philosophers should care about computational complexity.
- 2012‑02‑16:
Why all this new stuff was needed in Linux: dynamic change.
- 2012‑02‑16:
The destructive desktop: Linux in trouble?
- 2012‑02‑16:
The original (?) greylisting whitepaper.
- 2012‑02‑16:
Where the Lua programming language is used.
- 2012‑02‑16:
Britain is neither a religious country nor a secular one, but an interesting mix of both.
- 2012‑02‑16:
European hosting providers cannot be required to scan their users data for copyright infringement.
- 2012‑02‑16:
Google Public DNS "no longer experimental" despite lack of DNSSEC support.
- 2012‑02‑16:
The Sun's journalists change their minds about the Human Rights Act when it might help them protect their informants.
- 2012‑02‑16:
SSL traffic analysis finds the location you view by sniffing Google Maps tile image sizes.
- 2012‑02‑16:
Canada bans masked protest; penalty up to 5 years in prison.
- 2012‑02‑15:
The "undue weight" of truth on Wikipedia.
- 2012‑02‑15:
A comparison between Misultin, Mochiweb, Cowboy (all Erlang), node.js, and Tornadoweb (Python).
- 2012‑02‑15:
Department of Health fails to cover up senior staff tax avoidance scheme after lying to Parliament.
- 2012‑02‑15:
David Cameron knows the drug laws aren't working; his failure to change them is simple cowardice.
- 2012‑02‑15:
Vintage London.
- 2012‑02‑15:
Mobile devices to exceed human population this year: about two devices per IPv4 address.
- 2012‑02‑15:
The cost of knowledge.
- 2012‑02‑15:
Elsevier boycott grows to 5000+ academics.
- 2012‑02‑15:
Successful Lisp: how to understand and use Common Lisp.
- 2012‑02‑15:
Movie lawyers destroy a student project for no Reason.
- 2012‑02‑15:
When you find something scary in your genome...
- 2012‑02‑15:
Orange UK blocks access to free speech advocacy site La Quadrature Du Net.
- 2012‑02‑15:
The Guardian on the Heartland Institute climate denial leak.
- 2012‑02‑15:
Heartland Institute exposed: internal documents reveal backers and strategy of the climate denial machine.
- 2012‑02‑15:
Bret Victor: inventing on principle. (Vimeo)
- 2012‑02‑15:
At last the FCC ditches the LightSquared GPS-jamming cellphone system.
- 2012‑02‑15:
Tumblr's architecture.
- 2012‑02‑15:
Lasagna.
- 2012‑02‑15:
Where to wait for an elevator.
- 2012‑02‑15:
The golden rule of web site performance.
- 2012‑02‑15:
Vintage LP stereo banners.
- 2012‑02‑14:
Popular British insults.
- 2012‑02‑14:
"Shitstorm" is best German Anglicism of the year.
- 2012‑02‑14:
Is there sufficient historical evidence to establish the resurrection of Jesus? No.
- 2012‑02‑14:
A squalid brutal Scientology child labourcamp in Australia.
- 2012‑02‑14:
The Department for Culture Media and Sport vs. the Intellectual Property Office: good vs. bad policy-making.
- 2012‑02‑14:
Dutch government planning to relax copyright to allow creative remixes.
- 2012‑02‑14:
Whitehall accidentally devolved power over British Antarctic territory to Scotland.
- 2012‑02‑14:
Implementing a DANE DNSSEC-for-TLS validator.
- 2012‑02‑14:
UK govt has six days to release "extraordiary rendition" prisoner or face war crimes investigation.
- 2012‑02‑14:
Avoiding and exploiting JavaScript's warts.
- 2012‑02‑14:
Many "Christian" Brits do not believe in God, or that Jesus was his son, or in the resurrection.
- 2012‑02‑14:
Why concatenative programming matters.
- 2012‑02‑14:
The Sun learns a hard lesson about human rights and due process.
- 2012‑02‑14:
How to spot bad books.
- 2012‑02‑14:
The late Tony Sale and Colossus, the world's first electronic programmable computer.
- 2012‑02‑14:
Public-access policies that make research more open result in accelerated progress in science and faster economic growth.
- 2012‑02‑14:
AT&T expects $100bn real estate windfall from VOIP's smaller space requirements.
- 2012‑02‑14:
Learning magic in the age of the Internet.
- 2012‑02‑14:
The mystery of the exploding pig shit.
- 2012‑02‑14:
Piracy does not affect box office takings in US, but does in countries with delayed releases.
- 2012‑02‑12:
Beware the CDPATH environment variable.
- 2012‑02‑12:
Why understanding Chris Lightfoot matters.
- 2012‑02‑12:
McKinsey and Company: the firm that hijacked the NHS.
- 2012‑02‑11:
Fuck your Noguchi coffee table.
- 2012‑02‑11:
Clean up your web app access permissions.
- 2012‑02‑10:
JITs for free with RPython and PyPy.
- 2012‑02‑10:
Alan Moore on Guy Fawkes, V for Vendetta, and Anonymous.
- 2012‑02‑10:
Anatomy of a LEGO minifig.
- 2012‑02‑10:
NLnet Labs DNSSEC workshop presentation and exercise materials.
- 2012‑02‑10:
Lower than reprinted press releases and simply making shit up, is the Daily Mail.
- 2012‑02‑10:
Two cheers for the Eolas patent troll victory.
- 2012‑02‑10:
Bideford town council prayers ruled unlawful.
- 2012‑02‑10:
The Economist on the growing Elsevier boycott.
- 2012‑02‑10:
Proponents of US critical infrastructure security bills worried about being seen to regulate the Internet.
- 2012‑02‑10:
Patent troll Eolas loses claim to own the interactive web.
- 2012‑02‑10:
Powers of Ten: the scale of the universe. (Flash)
- 2012‑02‑10:
The federal research public access act.
- 2012‑02‑09:
Kiwi helmet law cut cyclist numbers by half.
- 2012‑02‑09:
The Land of the Free and the Elements of Style: everything in Strunk and White is wrong.
- 2012‑02‑09:
Homemade collapsible TARDIS.
- 2012‑02‑08:
London street map distorted to match the Tube map.
- 2012‑02‑08:
Clarifying TLD syntax requirements, wrt dotted-quad IP addresses and internationalized domain names.
- 2012‑02‑08:
Enough, already: US copyright law is strict enough, and secret treaties export it worldwide.
- 2012‑02‑08:
Vixie's attempt to address the "ghost domain" problem. (2010)
- 2012‑02‑08:
How parking shapes urban form.
- 2012‑02‑08:
A look back at single-threaded CPU performance.
- 2012‑02‑08:
Twitter Joke Trial made law look silly.
- 2012‑02‑08:
United States v Shipp: rape, lynching, habeas corpus, and contempt of the Supreme Court.
- 2012‑02‑08:
File sharing after the death of MegaUpload.
- 2012‑02‑08:
Ghost domain names: revoked yet still resolvable.
- 2012‑02‑07:
Bullet: adventures in a minimally delimited Lisp.
- 2012‑02‑07:
San Francisco's 19th century telegraphic public fire alarm system.
- 2012‑02‑07:
Federal appeals court rules California's gay marriage ban is unconstitutional.
- 2012‑02‑07:
You can't copyright porn, argues BitTorrent defendant.
- 2012‑02‑07:
Judge Dredd: the Bod TV special.
- 2012‑02‑06:
Seeing the patriarchy.
- 2012‑02‑06:
LLBMC, the low-level bounded model checker: a tool for finding bugs in C programs.
- 2012‑02‑06:
On system rollback and totalised fields: an algebraic approach to system change.
- 2012‑02‑06:
Will Self thinks the Olympics suck dogshit through a straw.
- 2012‑02‑06:
How hangovers work.
- 2012‑02‑06:
Satphone encryption cracked: another failure of secret crypto.
- 2012‑02‑06:
Many boardroom videoconferencing systems are open to unauthorized remote access.
- 2012‑02‑06:
FBI / Scotland Yard conference call hacked by Anonymous.
- 2012‑02‑06:
Encyclopaedia Morningtonia.
- 2012‑02‑06:
GSL Shell: LuaJIT + GNU Scientific Library.
- 2012‑02‑06:
Yieldable LPEG: for parsing a dynamic buffer fed from a socket.
- 2012‑02‑06:
Tim Montgomerie of ConservativeHome supports equal marriage rights.
- 2012‑02‑06:
Melton: A static memory leak detector for C programs based on the clang static analyser.
- 2012‑02‑06:
Fail-Safe C: a memory-safe implementation of the full ANSI C language.
- 2012‑02‑06:
Regressive tax in the US, state-by-state.
- 2012‑02‑06:
The Tesla valve: one way flow without moving parts.
- 2012‑02‑06:
The sociology of drunkenness.
- 2012‑02‑05:
You will never kill piracy, and piracy will never kill you.
- 2012‑02‑05:
UK Police hired out to work for private companies.
- 2012‑02‑05:
The US kills people with drones and fires on the rescuers who arrive at the scene, then goes after mourners at the funeral.
- 2012‑02‑05:
The decline of the amateur expert.
- 2012‑02‑05:
Don't store that in a float.
- 2012‑02‑05:
Four touchscreen-compatible gloves reviewed.
- 2012‑02‑05:
Can your smartphone stand the cold?
- 2012‑02‑05:
Maillardet's writing automaton.
- 2012‑02‑05:
DNSSHIM: hidden master DNSSEC signer. (Java)
- 2012‑02‑05:
Why did PledgeBank fail when GroupOn and Kickstarter flew?
- 2012‑02‑05:
Google's horrible January.
- 2012‑02‑05:
From sand to silicon: the making of a chip.
- 2012‑02‑04:
Justice Department says prison rape accounted for majority of rapes committed in US in 2008.
- 2012‑02‑04:
Atheism in America.
- 2012‑02‑04:
Journals boost their impact factor by asking academics to pad their citations.
- 2012‑02‑04:
On the ethics, pragmatics, and politics of cryptographic application design.
- 2012‑02‑04:
Three things Twitter has not got right yet.
- 2012‑02‑04:
Genetic IP reduces innovation and product development by 20-30%.
- 2012‑02‑03:
Why Mark Jaquith is an atheist.
- 2012‑02‑03:
The 64-bit counter-revolution.
- 2012‑02‑03:
Darkness. (Wonderful 24 hour comic.)
- 2012‑02‑03:
Why oh why do those nutheads use vi?
- 2012‑02‑03:
The Prince vs Cariou copyright case has a chilling effect on appropriated images in art.
- 2012‑02‑03:
Opposition to intellectual property laws is starting to look like a political winner for the Republican party.
- 2012‑02‑02:
DMARC anti-spam protocol leads to private information leakage.
- 2012‑02‑02:
On Temple Island Collections v New English Teas, the Westminster bus photograph copyright case.
- 2012‑02‑02:
It is time for the rebirth of the university press.
- 2012‑02‑01:
No, that's not snow: pesticides coat California's central valley.
- 2012‑02‑01:
Some of the world's most beautiful book shops.
- 2012‑02‑01:
Lua vs Javascript for MediaWiki.
- 2012‑02‑01:
The Jackdaw database package. (1974) (The current version of Jackdaw is Oracle on Solaris.)
- 2012‑02‑01:
Lua to be Wikipedia's template scripting language.
- 2012‑02‑01:
The sky is rising! The growth of the entertainment industry in the Internet age.
- 2012‑02‑01:
Why Lua?
- 2012‑02‑01:
The founder of PLoS on the research works act and publishing failed experiments.
- 2012‑02‑01:
Reducing the retrieval time of scatter storage techniques: Brent's variation on hash tables.
- 2012‑02‑01:
People are spouting nonsense about Chinese manufacturing.
- 2012‑02‑01:
Transgender people are completely banned from boarding airplanes in Canada.
- 2012‑02‑01:
The trouble with popularity: repetitive fun memes crowd out meaningful content.
- 2012‑02‑01:
Piracy is the new radio: it's how music gets around.
- 2012‑02‑01:
Linotype: The Film.
- 2012‑01‑31:
Apache httpOnly cookie disclosure vulnerability.
- 2012‑01‑31:
Environmental protection rules may be headed for government shredder.
- 2012‑01‑31:
CuBox: small computer built around Marvell Armada 510 SoC.
- 2012‑01‑31:
The caffeine curve.
- 2012‑01‑31:
Sublime threats and ridiculous consequences as the works of 3 great English writers enter the global public domain.
- 2012‑01‑31:
Tiny Core Linux 4.2 is a complete operating system in 64MB or less.
- 2012‑01‑31:
GSM tracking: obvious in the UK. (para 46 et seq.)
- 2012‑01‑31:
How to learn effectively.
- 2012‑01‑31:
Python pbs: run commands as if they were Python functions.
- 2012‑01‑31:
Desirability and density of urban design.
- 2012‑01‑31:
Australia: the confusing country.
- 2012‑01‑30:
Avoidable failures of peer review.
- 2012‑01‑30:
A police state for benefits claimants.
- 2012‑01‑30:
What is a "private-sector research work"?
- 2012‑01‑30:
How the puffer fish gets you high, zombifies you, and kills you.
- 2012‑01‑30:
Helmet cam secures conviction of motorist who assaulted cycling QC, despite police attempts to drop case.
- 2012‑01‑30:
Windows Azure Storage: tackling the CAP theorem head-on.
- 2012‑01‑30:
How should British vacancies in the European parliament be filled?
- 2012‑01‑30:
What financial regulators can learn from nuclear reactors.
- 2012‑01‑30:
Broderick? Broderick?
- 2012‑01‑30:
Baby clothes without the pink-or-blue.
- 2012‑01‑30:
The Führer speaks out on Downfall parodies.
- 2012‑01‑30:
Format string vulnerability in sudo.
- 2012‑01‑30:
20th birthday of alt.fan.pratchett.
- 2012‑01‑30:
The complexity of font sizes.
- 2012‑01‑30:
American youth becoming even more godless.
- 2012‑01‑30:
A serious flaw emerges in quantum cryptography.
- 2012‑01‑30:
DNSSEC libraries for application developers.
- 2012‑01‑30:
Wall Street Joirnal rejects climate essay from 255 National Academy of Science scientists; accepts anti-climate essay from 16 others.
- 2012‑01‑30:
Why your network should go IPv6 only.
- 2012‑01‑30:
The strong principle of charity.
- 2012‑01‑30:
Really, Google is evil now? How about Apple?
- 2012‑01‑29:
What is wrong with electronic academic journals?
- 2012‑01‑29:
The P-versus-NP page.
- 2012‑01‑29:
The Lancet: the Research Works Act is a damaging threat to science.
- 2012‑01‑29:
A cold war missile silo converted to a private home in the Adirondacks.
- 2012‑01‑29:
Google+ nymwar is not a matter of behaviour, it's a matter of aesthetic appearance of names.
- 2012‑01‑29:
Why Twitter's new policy is helpful for free-speech advocates.
- 2012‑01‑29:
Single-block collision attack on MD5.
- 2012‑01‑29:
How the badly maimed BBC can stand up to parasitic Sky.
- 2012‑01‑29:
Twitter's censorship is a gray box of shame for governments that impose it, not for Twitter.
- 2012‑01‑29:
Wind electricity to be competitive with cheap natural gas by 2016.
- 2012‑01‑29:
Inder's kitchen.
- 2012‑01‑29:
The BBC's science problem.
- 2012‑01‑29:
Hollywood edition: if computers were as user-friendly as movies.
- 2012‑01‑29:
What have academic publishers ever done for us? And do we need them?
- 2012‑01‑29:
IcedCoffeeScript: just add "await" and "defer" keywords.
- 2012‑01‑28:
The why of WAT.
- 2012‑01‑28:
Which computers star in which films.
- 2012‑01‑28:
Our courtrooms make a mockery of "beyond reasonable doubt".
- 2012‑01‑28:
Megaupload: a lot less guilty than you think.
- 2012‑01‑28:
Why eating fat doesn't make you fat.
- 2012‑01‑28:
Discussing the bin, sbin, usr/bin , usr/sbin split.
- 2012‑01‑28:
The BBC pays Sky to broadcast their channels.
- 2012‑01‑28:
Understanding the bin, sbin, usr/bin , usr/sbin split.
- 2012‑01‑28:
Why does that QR code take me to justinsomnia.org?
- 2012‑01‑28:
Universal Music abuses YouTube takedown process preventing independent band from posting their own song.
- 2012‑01‑28:
Three faces of feminism: Louise Mensch, Laurie Penny, and Jodie Marsh.
- 2012‑01‑28:
The soaring cost of gritting roads is forcing local authorities to gamble on weather derivatives.
- 2012‑01‑27:
1960s password hacks on MIT's CTSS.
- 2012‑01‑27:
Identity slippage: when sensitive personal data goes to the wrong email address.
- 2012‑01‑27:
Red bus photo copyright case spells trouble for reverse engineering.
- 2012‑01‑27:
Let the robot drive: the autonomous car of the future is here.
- 2012‑01‑27:
Vancouver cuts sexual assaults by targeting anti-rape ads at men.
- 2012‑01‑27:
iPoo.
- 2012‑01‑27:
European parliament rapporteur quits and denounces the "masquerade" behind ACTA.
- 2012‑01‑27:
Smartphone-powered Lego robot beats human Rubik cube record.
- 2012‑01‑27:
On the computational complexity of video games.
- 2012‑01‑27:
What can the IETF do when an open spec is ambushed by a patent?
- 2012‑01‑27:
A small bill in the US, a giant impact for research worldwide.
- 2012‑01‑27:
ACTA: signed, not yet sealed - now it's up to us.
- 2012‑01‑26:
Bueller? Bueller?
- 2012‑01‑26:
Regarding regulation, we are all Internet exceptionalists now.
- 2012‑01‑26:
The origin of the "Write Only Memory".
- 2012‑01‑26:
Cars kill cities.
- 2012‑01‑26:
Building memory-efficient Java applications.
- 2012‑01‑26:
Copyright encounters of the third kind: physical goods. (2009)
- 2012‑01‑26:
Beetles dressed as characters from Jurassic Park.
- 2012‑01‑25:
Initial algebras and terminal coalgebras.
- 2012‑01‑25:
A self-rendering digital image encoding.
- 2012‑01‑25:
Photographers who compose a picture in a similar way to an existing image risk losing a copyright infringement lawsuit.
- 2012‑01‑25:
Tinker Tailor: a guide to the perplexed.
- 2012‑01‑25:
O2 fix their phone number exposure bug.
- 2012‑01‑25:
O2 changing web content on the fly, inlining CSS @import.
- 2012‑01‑25:
Striking a pose like women on fantasy covers.
- 2012‑01‑25:
Dear Merriam-Webster, your dictionary is RUINING YOUNG MINDS!
- 2012‑01‑25:
USA .gov DNSSEC deployment status.
- 2012‑01‑25:
Gibson enquiry into complicity in torture cancelled in favour of a Met Police investigation. The Met say there is no such thing.
- 2012‑01‑25:
Privacy leaks in mobile phone Internet access.
- 2012‑01‑25:
How the Glock became America's weapon of choice.
- 2012‑01‑25:
Large validating ISPs (eg. Comcast) make DNSSEC cockups (eg. NASA) visible and embarrassing.
- 2012‑01‑25:
O2 send your phone number to every site you visit using their mobile data network.
- 2012‑01‑25:
Are expensive batteries worth the extra cost?
- 2012‑01‑25:
Quote Investigator: "The future has arrived — it's just not evenly distributed yet."
- 2012‑01‑24:
USDA approves Monsanto's utterly useless GM maize - no more drought-tolerant than existing varieties.
- 2012‑01‑24:
Measuring the speed of light using a microwave oven and cheese. (YouTube)
- 2012‑01‑24:
Some devops rules.
- 2012‑01‑24:
Jenga pistol.
- 2012‑01‑24:
Norwegian Data Inspectorate rules corporate Google Apps breaches data protection law.
- 2012‑01‑24:
It is landlords, not tenants, getting rich off benefit payments.
- 2012‑01‑24:
Barack Obama, the post-partisan president, meets Washington gridlock.
- 2012‑01‑24:
Stringly typed.
- 2012‑01‑24:
Open source is like improv, so say "Yes, and...".
- 2012‑01‑24:
SOPA stopped, so back to the ACTA arrête campaign.
- 2012‑01‑24:
Form letter template for acquired startups.
- 2012‑01‑24:
A review of the Simtec entropy key: random numbers for crypto.
- 2012‑01‑24:
Tarantool: a high performance key/value storage server.
- 2012‑01‑24:
Americans can be forced to decrypt self-incriminating data.
- 2012‑01‑24:
How parents normalize teen password sharing.
- 2012‑01‑24:
Patent inflation.
- 2012‑01‑24:
Google's work to make TCP faster.
- 2012‑01‑23:
Supply chains, Apple, and the American economy.
- 2012‑01‑23:
It is time to end the failed war on some drugs.
- 2012‑01‑23:
£35,000 on the speaking clock is quite reasonable.
- 2012‑01‑23:
The SCOTUS warrantless GPS tracking decision is a near-optimal result.
- 2012‑01‑23:
Cambridge is Britain's top city.
- 2012‑01‑23:
What Google search results would look like if more relevant social network results took the place of Google+.
- 2012‑01‑23:
The cost of knowledge: researchers taking a stand against Elsevier.
- 2012‑01‑23:
SCOTUS rule that a warrant is required for GPS tracking of suspects' cars.
- 2012‑01‑23:
Public speaking for normal people.
- 2012‑01‑23:
Megaupload could spawn caselaw more destructive than SOPA.
- 2012‑01‑23:
Another US Internet bill requires ISPs to keep detailed activity logs for 18 months.
- 2012‑01‑23:
Is Ladies Learning Code awesome and feminist, or just awesome?
- 2012‑01‑23:
US Customs ban on importing subversive or immoral goods.
- 2012‑01‑23:
iTerm2 and tmux integration.
- 2012‑01‑23:
The links between contraception, abortion, and maternal mortality.
- 2012‑01‑23:
Harbin international ice and snow festival.
- 2012‑01‑23:
HTML5 please: which parts of the spec are ready for use.
- 2012‑01‑23:
Oovium: novel multi-touch calculator / spreadsheet for iOS.
- 2012‑01‑23:
Better living without ads.
- 2012‑01‑23:
Linux local privilege escalation via writing to /proc/pid/mem of setuid process.
- 2012‑01‑22:
Security vulnerability in Oracle with deeper architectural implications.
- 2012‑01‑22:
Old confused man tortured to death by Florida police.
- 2012‑01‑22:
Copyright and Internet regulation, and the economics of sharing.
- 2012‑01‑22:
Japanese multiplication. (video)
- 2012‑01‑22:
Exercise and longevity: understanding the link.
- 2012‑01‑22:
The copyright industry is putting its faith in god.
- 2012‑01‑22:
Red flags of quackery.
- 2012‑01‑22:
The Megaupload indictment, with a crash course in the DMCA and why they're totally fucked.
- 2012‑01‑22:
The sad death of tactile feedback in car controls.
- 2012‑01‑22:
"Alien" as told by the cat.
- 2012‑01‑22:
Foolish attempt to block new nuclear power plants using competition regulation.
- 2012‑01‑22:
The rise and fall of personal computing.
- 2012‑01‑22:
Building instructions from LEGO.
- 2012‑01‑22:
Mighttpd: a high performance web server in Haskell.
- 2012‑01‑22:
Cartel-like behaviour can emerge naturally without collusion between sellers.
- 2012‑01‑22:
The secret document that transformed China.
- 2012‑01‑22:
strcpycat
- 2012‑01‑21:
International governments using ITU to reduce US (and NGO?) control of the Internet.
- 2012‑01‑21:
Why iPhones are not made in America.
- 2012‑01‑21:
HTML5 codec popularity: Theora > WebM > H.264.
- 2012‑01‑21:
"Publishers are in Amazon's sights and they're going to kill us."
- 2012‑01‑21:
Rob Pike says rm should remove directories.
- 2012‑01‑21:
Tim Gowers shuns evil Elsevier.
- 2012‑01‑21:
Rape is R but consensual sex is NC-17.
- 2012‑01‑21:
Clarks sexist shoes.
- 2012‑01‑21:
The SOPA and PIPA demonstrations were a first rough beta test of the power to impact policy online.
- 2012‑01‑21:
Any musicians noticed that since they shut down MegaUpload, the money has been POURING in?
- 2012‑01‑21:
They wouldn't demand a longer jail term for streaming a Michael Jackson video than Jackson's own doctor got for killing actual Michael Jackson? Would they?
- 2012‑01‑21:
A series of articles on Lords reform.
- 2012‑01‑21:
Keyboard shortcut to break out of screen lockers on recent Xorg.
- 2012‑01‑21:
Vim for iOS.
- 2012‑01‑20:
The next SOPA.
- 2012‑01‑20:
With MegaUpload down, who's next? RapidShare? SoundCloud? DropBox? - TechCrunch
- 2012‑01‑20:
The non-infringing uses of Megaupload.
- 2012‑01‑20:
Wat: Ruby and JavaScript misfeatures. (video)
- 2012‑01‑20:
UK CET bill runs out of time in Commons.
- 2012‑01‑20:
Live music red tape to be relaxed.
- 2012‑01‑20:
Revisiting network I/O APIs: the netmap framework.
- 2012‑01‑20:
Amazon DynamoDB: a fast and scalable NoSQL database service designed for Internet scale applications.
- 2012‑01‑20:
ITU press release on the decision to revisit the leap second question at the next Radiocommunication Assembly in 2015.
- 2012‑01‑20:
LEGO instruction booklet scans.
- 2012‑01‑20:
US statement on leap seconds and the future of UTC.
- 2012‑01‑20:
Top income tax rate: how does 83% sound?
- 2012‑01‑20:
Are there fundamental laws of cooking?
- 2012‑01‑20:
Making system configuration more declarative.
- 2012‑01‑20:
Anti-employee control fraud: mistreatment of workers at Apple's suppliers.
- 2012‑01‑19:
Leap second decision postponed to 2015.
- 2012‑01‑19:
Russ Cox releases key parts of Google Code Search as open source.
- 2012‑01‑19:
Will 2012 be the dawn of widespread DNSSEC deployment?
- 2012‑01‑19:
A second here a second there may just be a waste of time. (NY Times front page story on leap seconds.)
- 2012‑01‑19:
.nz DNSKEY RSA exponent encoding anomaly.
- 2012‑01‑19:
McAfee Endpoint Protection Suite includes an open proxy.
- 2012‑01‑19:
1967 flying clock experiment.
- 2012‑01‑19:
Rush to sign up for Free Mobile accounts overwhelms French number portability systems.
- 2012‑01‑19:
World-wide time synchronization, 1966.
- 2012‑01‑19:
Correlating time from Europe to Asia with flying clocks. (1us precision in 1965.)
- 2012‑01‑19:
A new performance of the "flying clock" experiment. (Precise time transfer in 1964.)
- 2012‑01‑19:
Time for decision on removing leap seconds.
- 2012‑01‑19:
Leap seconds may have only hours to live!
- 2012‑01‑19:
The murderous insanity of the War on Drugs.
- 2012‑01‑19:
The ins and outs of gradual type inference for ActionScript.
- 2012‑01‑19:
Performance of JavaScript vs type inference and ActionScript.
- 2012‑01‑19:
Internet blackout in 1996 for the Communications Decency Act.
- 2012‑01‑19:
PIPA supporters violate copyright laws, too.
- 2012‑01‑19:
Pointer Analysis: haven't we solved this problem yet?
- 2012‑01‑19:
Wanted: epitaphs for hot topics & retrospectives of academic fads.
- 2012‑01‑19:
Inside Apple's secretive corporate culture.
- 2012‑01‑18:
What happens when pirates have a better experience of your product than paying customers.
- 2012‑01‑18:
Nature Publishing Group does not support the ban on open access to federally funded science.
- 2012‑01‑18:
The politics (and lies) of the apostrophe.
- 2012‑01‑18:
NASA blocks release of first sf movie made in space.
- 2012‑01‑18:
Faster Fourier transforms.
- 2012‑01‑18:
Marine biologist prosecuted for filming killer whales feeding.
- 2012‑01‑18:
Notes on reducing Firefox's memory consumption.
- 2012‑01‑18:
Jacob Rees-Mogg MP proposes to return Somerset to local mean solar time.
- 2012‑01‑18:
Litigating time in America at the turn of the 20th century. (Describes Curtis v. March.)
- 2012‑01‑18:
Building the next generation file system for Windows: ReFS.
- 2012‑01‑18:
ZEVO: ZFS for Mac OS X.
- 2012‑01‑18:
The tragedy of the Smurfs.
- 2012‑01‑18:
Why UEFI secure boot is difficult for Linux.
- 2012‑01‑18:
Copyright King: you have to pay for "I have a dream".
- 2012‑01‑18:
Elsevier = Evil: more on the Research Works Act.
- 2012‑01‑17:
Should evidence determine policy?
- 2012‑01‑17:
The authoritarian cause will be defeated by its own cognitive dissonance.
- 2012‑01‑17:
The captain of the Costa Concordia is totally screwed.
- 2012‑01‑17:
Effective ways to improve school performance.
- 2012‑01‑17:
Movie posters from another universe.
- 2012‑01‑17:
Peacock's Tearoom, Ely.
- 2012‑01‑17:
Delegates at the ITU are expected to vote on the abolition of leap seconds on Thursday or Friday.
- 2012‑01‑17:
Mistruths and insults from the copyright lobby over the proposal to ban open access publication of federally funded research.
- 2012‑01‑17:
Is it still possible to extend TCP despite interfering middleboxes?
- 2012‑01‑17:
Review of Android's Roboto typeface.
- 2012‑01‑17:
Submarine cable map.
- 2012‑01‑17:
The first lawsuit to challenge the Payment Card Industry regulations and fines imposed on merchants.
- 2012‑01‑17:
Quickly! Create this silly Tumblr before anyone else does!
- 2012‑01‑17:
How the Hammersmith Flyover was cleverly constructed and why it currently has problems.
- 2012‑01‑17:
Typing at 255 WPM shouldn't cost $4000: Plover, the open source steno system.
- 2012‑01‑16:
Spacewalk: Red Hat system provisioning, monitoring, and updating.
- 2012‑01‑16:
Defining "creepy treehouse".
- 2012‑01‑16:
Why e-safety isn't part of digital literacy.
- 2012‑01‑16:
Academic publishers have become the enemies of science.
- 2012‑01‑16:
Regarding the 5th amendment, is a password something you know or something you have?
- 2012‑01‑16:
Blue Monday: a depressing day of pseudoscience and humiliation.
- 2012‑01‑16:
ITU-R WRC-12 news report on UTC.
- 2012‑01‑16:
Networking needs a VMware: part 1: address virtualization.
- 2012‑01‑16:
Graph of latency of four million DNS queries.
- 2012‑01‑15:
Cait Reilly on her campaign for a judicial review of unpaid work for unemployed people.
- 2012‑01‑15:
Why the US is no longer the land of the free.
- 2012‑01‑15:
The rise of the new groupthink.
- 2012‑01‑13:
Name of the Year.
- 2012‑01‑13:
Node.js/V8 postmortem debugging.
- 2012‑01‑13:
Advanced DTrace tips, tricks, and gotchas.
- 2012‑01‑13:
FreeBSD 9.0 release notes.
- 2012‑01‑13:
Google apologise to Mocality for scamming their customers.
- 2012‑01‑13:
PayPal feature doesn't exist and no-one knows how it works, says PayPal.
- 2012‑01‑13:
Royal Society report on computing in schools.
- 2012‑01‑13:
Google makes fraudulent phone calls to steal business from a Kenya business directory service.
- 2012‑01‑13:
JNLua: Java <-> Lua bridge.
- 2012‑01‑13:
China Daily on the abolition of leap seconds.
- 2012‑01‑13:
EFF demands withdrawal of bogus time zone database lawsuit, Astrolabe v. Olson & Eggert.
- 2012‑01‑13:
Analysis of DNS setups of Internet2.edu members.
- 2012‑01‑13:
Microsoft confirms that UEFI secure boot will lock down ARM Windows devices.
- 2012‑01‑13:
The Economist on the possible abolition of leap seconds.
- 2012‑01‑13:
Android as we know it will die in the next two years.
- 2012‑01‑13:
Libtask: a coroutine library for C and Unix.
- 2012‑01‑13:
Copy elision, the return value optimisation, and passing by value in C++.
- 2012‑01‑13:
Defining declarative programming.
- 2012‑01‑13:
Only the Good Die Twice: the only man who can stop Bond ... is Bond.
- 2012‑01‑12:
BSD-style Sedgewick 2-3 left-leaning red-black tree macros.
- 2012‑01‑12:
Obituary of Ronald Searle by Nigel Molesworth in the Economist.
- 2012‑01‑12:
Lua/Linux icons.
- 2012‑01‑12:
Lualubit: bitwise operator patch for Lua.
- 2012‑01‑12:
Museum volunteer forced to work unpaid at Poundland instead, in order to keep her job seeker's allowance.
- 2012‑01‑12:
WhatDoTheyKnow.com: four years and 100,000 FOI requests.
- 2012‑01‑12:
Why JavaScript will not get coroutines.
- 2012‑01‑12:
Popular programming languages converge on CLispScript.
- 2012‑01‑12:
JavaScript needs blocks.
- 2012‑01‑12:
Good bye, Google Maps... hello OpenStreetMap.
- 2012‑01‑11:
Intel gets serious about the fight with ARM for the mobile market.
- 2012‑01‑11:
Guantánamo was a hole into which suspects would for all practical purposes disappear, never to be heard from again.
- 2012‑01‑11:
Behind the scenes of the Cambridge undergraduate admissions process.
- 2012‑01‑11:
The complexity of a change is closely correlated to the indentation of the code in the diff.
- 2012‑01‑11:
Darknet Rising: private, secure and anonmyous meshnets are emerging.
- 2012‑01‑11:
Out with ICT and in with a British computing renaissance.
- 2012‑01‑11:
Police anti-protest technology: after the kettle, the cordon.
- 2012‑01‑11:
Homemade synth: "Kitchen Music" by Stephen J Anderson. (YouTube)
- 2012‑01‑11:
The iPad has great potential as a tool for teaching programming, if Apple would allow it.
- 2012‑01‑11:
Congress proposing to ban open access to federally funded research.
- 2012‑01‑11:
Why Raspberry Pi is not being assembled in the UK.
- 2012‑01‑11:
Campaign of assassination of Iranian nuclear engineers.
- 2012‑01‑11:
Rebooting computer science in schools.
- 2012‑01‑11:
Free.fr disrupts the French mobile market.
- 2012‑01‑11:
The anatomy of an American hospital bill.
- 2012‑01‑11:
Android's broken openness promise and its failure to tackle the mobile network operators.
- 2012‑01‑11:
Your body wasn't built to last: the Gompertz Law of human mortality.
- 2012‑01‑11:
Rhombus Tech working on faster cheaper ARM board with Chinese SOC manufacturer and open source.
- 2012‑01‑11:
Map of C++.
- 2012‑01‑11:
TRESOR runs AES on x86 securely without RAM.
- 2012‑01‑11:
Gridlines are the most important feature of Excel, not calculation.
- 2012‑01‑10:
the.pm: This is teh, best module evar!
- 2012‑01‑10:
Common coding mistakes with wide character arrays.
- 2012‑01‑10:
Comcast completes its DNSSEC deployment.
- 2012‑01‑10:
An innocent German kidnapped and imprisoned by the US government in Guantánamo.
- 2012‑01‑10:
An innocent Bosnian kidnapped and imprisoned by the US government in Guantánamo.
- 2012‑01‑10:
Hedge fund managers take 84% of profits leaving 16% for their clients.
- 2012‑01‑10:
Stockholm library interior architectural concept.
- 2012‑01‑09:
The true complexity of Scala.
- 2012‑01‑09:
Bifferboard: tiny £35 two-board 486SX computer (no graphics or floating-point).
- 2012‑01‑09:
How Facebook will decline after its IPO.
- 2012‑01‑09:
Report web sites incorrectly censored by mobile Internet providers.
- 2012‑01‑09:
Comprehensive experimental analyses of automotive attack surfaces.
- 2012‑01‑09:
A disturbing Trend: MAPS has lost its way. (We gave up on the RBL+ 2.5 years ago.)
- 2012‑01‑09:
A warning to ducks.
- 2012‑01‑08:
Diomidis Spinellis on his Greek Ministry of Finance mind map.
- 2012‑01‑08:
Dara O'Briain on the Gilette Fusion Power Stealth. (YouTube)
- 2012‑01‑08:
How Diomidis Spinellis tried and failed to fix Greek tax collection with software.
- 2012‑01‑08:
A Moore's law for razor blades?
- 2012‑01‑08:
Shaving product parodies.
- 2012‑01‑08:
Bigger Than Cheeses on the razor size wars.
- 2012‑01‑08:
The Onion predicts the Gillette Fusion.
- 2012‑01‑08:
The restart page: simulated rebooting on vintage operating systems.
- 2012‑01‑08:
Damn Cool Algorithms: Fountain Codes.
- 2012‑01‑08:
Cello Wars. (YouTube)
- 2012‑01‑08:
Video and description of pyroclastic flow on Mount Etna a few days ago.
- 2012‑01‑08:
Obscenity law in doubt after jury acquits distributor of gay pornography.
- 2012‑01‑07:
Lots of free programming eBooks.
- 2012‑01‑06:
Solving the Sudoku minimum number of clues problem (=17).
- 2012‑01‑06:
Sad Etsy kids.
- 2012‑01‑06:
How SOPA can be used to wreck scholarly publication.
- 2012‑01‑06:
Minimum viable SEO.
- 2012‑01‑06:
UK national grid status.
- 2012‑01‑06:
Punching through the Great Firewall of T-Mobile. (They need to read RFC 5068.)
- 2012‑01‑06:
Investigating disk erasure using household chemicals.
- 2012‑01‑06:
The USA is not the "land of opportunity": it is the least socially mobile rich country.
- 2012‑01‑06:
The obscene publications act has become an anachronism.
- 2012‑01‑06:
Evolutionary and Monte Carlo AI game design: the Shibumi challenge.
- 2012‑01‑06:
Which of these drinks will dissolve a mouse fastest?
- 2012‑01‑06:
Obscenity trial ends with "not guilty" verdict.
- 2012‑01‑06:
It is time to stop pretending to endorse the copyright monopoly.
- 2012‑01‑06:
Virtualizing storage for scale, resiliency, and efficiency of Windows 8.
- 2012‑01‑06:
Google+, Tumblr, and the importance of proper attribution.
- 2012‑01‑06:
Google+ is going to mess up the Internet, says someone who really hates Google+.
- 2012‑01‑06:
How Rick Santorum's official web site is worse than spreadingsantorum.com.
- 2012‑01‑06:
The decline of the public good in America.
- 2012‑01‑06:
Why you might like to read Foreign Affairs magazine this month...
- 2012‑01‑05:
Le klaxophone. (YouTube)
- 2012‑01‑05:
Why US cars have poor milage despite advances in fuel economy.
- 2012‑01‑05:
Mogees: interactive realtime audio mosaicing by gesture recognition using contact microphones on any surface.
- 2012‑01‑05:
A gross miscarriage of justice in computer chess.
- 2012‑01‑05:
The depressing state of statelessness: Microsoft's war against thin clients.
- 2012‑01‑05:
Esther Dyson on the ideals and reality of TLD expansion.
- 2012‑01‑05:
SOPA protest effect on GoDaddy.
- 2012‑01‑05:
Google+ is going to mess up the Internet.
- 2012‑01‑05:
Why do we pay sales commissions?
- 2012‑01‑04:
Dear Customer, who stuck up for his little brother ...
- 2012‑01‑04:
Berlin's Pirate Party has "pony time" in their rules of order.
- 2012‑01‑04:
Benedict Cumberbatch's violin coach for Sherlock.
- 2012‑01‑04:
Error handling patterns
- 2012‑01‑04:
Virtual values for extending JavaScript. (Just like Lua userdata metamethods?)
- 2012‑01‑04:
A nice Apple-style monitor stand and USB hub.
- 2012‑01‑04:
Live maps of North American power grid frequency and phase variation.
- 2012‑01‑04:
Encrypted Ubuntu on a MacBook Air.
- 2012‑01‑04:
Dallol: the world's weirdest volcanic crater.
- 2012‑01‑04:
Why you should never fly into Ronald Reagan Washington National Airport.
- 2012‑01‑04:
Why time is difficult. (video)
- 2012‑01‑04:
Paypal hates violins.
- 2012‑01‑04:
Ronald Searle & the St Trinian's cartoons.
- 2012‑01‑03:
Renationalise the railway.
- 2012‑01‑03:
In Our Time: The Written World - every day this week.
- 2012‑01‑03:
FaceTime for apes: Orangutans use iPads to video chat with friends in other zoos.
- 2012‑01‑03:
What we would like to know about the railways over the last 30 years.
- 2012‑01‑03:
The US presidential primary process is a meaningless sideshow.
- 2012‑01‑03:
Best of Ronald Searle? the rake's progress.
- 2012‑01‑03:
TVs are all awful: the horrors of overscan.
- 2012‑01‑03:
End of the pro-democracy pretense.
- 2012‑01‑03:
Copyright extension: good for Cliff and the Beatles, bad for the little guys.
- 2012‑01‑03:
Violinists can't tell the difference between Stradivarius violins and new ones.
- 2012‑01‑03:
The tactical advantage of the retreat against riot police.
- 2012‑01‑03:
META: pragmatic parsing in Common Lisp.
- 2012‑01‑03:
Physicists seek to lose the lecture as a teaching tool.
- 2012‑01‑03:
Type inference and optimisation for an impure world.
- 2012‑01‑03:
Obscenity trial will clarify what porn is illegal to publish and posess.
- 2012‑01‑03:
How not to use symmetric encryption.
- 2012‑01‑03:
10% of .se domain names now signed using PowerDNSSEC.
- 2012‑01‑03:
Microsoft's holodeck research project.
- 2012‑01‑02:
The Linuxification of software development: platforms shifting to rapid update.
- 2012‑01‑02:
SF gives us a vocabulary for speaking about the future.
- 2012‑01‑02:
Neil Gaiman and Terry Pratchett write Crowley and Aziraphale's New Year's resolutions.
- 2012‑01‑02:
A top ten list of top ten lists of top ten lists.
- 2012‑01‑02:
Lightweight static resources: sexy types for embedded and systems programming.
- 2012‑01‑01:
Deca: a higher-level assembly language.
- 2012‑01‑01:
Hungarian quick sort folk dance.
- 2012‑01‑01:
De-duplicating streams with reservoir sampling and Bloom filters.
- 2012‑01‑01:
Lego's various attempts to appeal more to girls.
- 2012‑01‑01:
Why Obama was forced to sign the NDAA.
- 2012‑01‑01:
Banks rejecting American customers because of the foreign account tax compliance act.
- 2012‑01‑01:
Authors entering the Public Domain on 2012-01-01.
- 2012‑01‑01:
A full-colour homemade laser projector.
- 2011‑12‑31:
Audiofools and the need to feel special.
- 2011‑12‑31:
Raiders of the lost archives. (YouTube)
- 2011‑12‑31:
The dangerous effects of reading.
- 2011‑12‑31:
A proposal to stress-test implementations of C++11 concurrency.
- 2011‑12‑30:
Just ordered a ladle from Amazon ...
- 2011‑12‑30:
The myth of Japan's lost decades.
- 2011‑12‑30:
Bruce Lee plays pingpong and lights matches with nunchuks.
- 2011‑12‑30:
What's the deal with RC4?
- 2011‑12‑30:
Visualizing Reddit ranking with a bumps chart.
- 2011‑12‑30:
Mob response - think before you weigh in.
- 2011‑12‑30:
RED in a different light: Van Jacobson on active queue management.
- 2011‑12‑30:
Take your DNSSEC with a pinch of salt: how authenticated denial of existence works.
- 2011‑12‑30:
Why movie revenue is dropping.
- 2011‑12‑30:
Brute forcing Wi-Fi Protected Setup.
- 2011‑12‑30:
The coming war on general-purpose computation.
- 2011‑12‑30:
High quality education in Finland.
- 2011‑12‑30:
Can you explain why ++[[]][+[]]+[+[]] = 10 in JavaScript?
- 2011‑12‑30:
The development of a storm surge barrier control system - revisiting the seven myths of formal methods.
- 2011‑12‑30:
Fair use vs appropriation in contemporary art.
- 2011‑12‑30:
Augmented reality with Processing: a tutorial.
- 2011‑12‑30:
The incredible true story of the collar bomb heist.
- 2011‑12‑30:
Some particularly stupid patents.
- 2011‑12‑30:
The web browser platform should be radically refactored.
- 2011‑12‑30:
California's equal marriage ban leads to constitutional challenge on tax raising restrictions.
- 2011‑12‑30:
Digital fireplace.
- 2011‑12‑30:
Remake: photographic reconstructions of classic art.
- 2011‑12‑30:
What hackers learn that the rest of us don't: notes on a hacker curriculum.
- 2011‑12‑30:
Occupy Babel explain LANGSEC in a few slogans.
- 2011‑12‑29:
Dot-dash-diss: The gentleman hacker's 1903 lulz.
- 2011‑12‑29:
Radical honesty.
- 2011‑12‑28:
Unofficial LEGO advanced building techniques guide.
- 2011‑12‑28:
Maize rootworm evolves to resist Monsanto Bt corn.
- 2011‑12‑28:
Google+ fingering profile pictures.
- 2011‑12‑28:
"Blue hour" twilight photography.
- 2011‑12‑27:
Lessons from suppressing research.
- 2011‑12‑27:
The coming retail apocalypse.
- 2011‑12‑27:
Launching the Kindle Fire in its current state was a mistake.
- 2011‑12‑27:
The dumbest idea in the world: maximizing shareholder value.
- 2011‑12‑27:
Why (and how) we've switched from Google Maps to Open Street Map.
- 2011‑12‑27:
The amazing power of deflationary economics for startups.
- 2011‑12‑27:
HTTP status dogs.
- 2011‑12‑26:
GoDaddy breaks ICANN rules by delaying domain transfers.
- 2011‑12‑26:
GoDaddy: A glimpse of the Internet under SOPA.
- 2011‑12‑26:
ByeDaddy: find out if a domain is registered with GoDaddy.
- 2011‑12‑26:
The status of Cambridge and the Lucasian Chair of mathematics when Newton was appointed.
- 2011‑12‑25:
James Bond: you know the rules, and so does he.
- 2011‑12‑25:
Why didn't Thorium molten salt reactors happen?
- 2011‑12‑24:
John Carmac on the value of static code analysis.
- 2011‑12‑23:
Yossi Kreinin's history with Forth and stack machines.
- 2011‑12‑23:
One teachers approach to preventing gender bullying in a classroom.
- 2011‑12‑23:
Five things Roger Ebert taught me about criticizing programming languages.
- 2011‑12‑23:
Forty things about writing.
- 2011‑12‑23:
A Christmas message from America's rich.
- 2011‑12‑23:
Programming with technological ritual and alchemy.
- 2011‑12‑22:
Step-by-step guide to transferring your domains away from GoDaddy.
- 2011‑12‑22:
Folding cup eliminates need for plastic lids.
- 2011‑12‑22:
Multiple sclerosis is a metabolic disorder, not an autoimmune disease.
- 2011‑12‑22:
Convicted for words not deeds.
- 2011‑12‑22:
Why not to expose your VM bytecode.
- 2011‑12‑22:
Why do humans menstruate when most mammals do not?
- 2011‑12‑22:
Smoke screening: how airport security accomplishes nothing, at enormous cost.
- 2011‑12‑22:
Police militarization and the war on drugs.
- 2011‑12‑22:
Thatcher state funeral should be privatised.
- 2011‑12‑22:
JavaScript as a first language.
- 2011‑12‑22:
How Harvey Mudd College increased female compsci enrolment to 40%.
- 2011‑12‑22:
20 JavaScript showcase sites of 2011.
- 2011‑12‑22:
Jurors in New York need to know they can say no.
- 2011‑12‑22:
Dropping a magnet through a copper pipe.
- 2011‑12‑21:
Mozilla secures continued funding from Google search revenue.
- 2011‑12‑21:
Stories from North Korea by Kim Jong Il's Russian tutor.
- 2011‑12‑21:
Unfortunate Python features to avoid.
- 2011‑12‑21:
There is no formal legal means in Texas to confess to a crime for which someone else has been convicted.
- 2011‑12‑21:
Zombie Borders.
- 2011‑12‑21:
Interview with ARM co-founder John Biggs.
- 2011‑12‑21:
Five reasons why Trey Ratcliff doesn't care if his photos are pirated.
- 2011‑12‑21:
A secret that Big Shaving has kept from you.
- 2011‑12‑21:
Worst (and some best) Xmas happenings.
- 2011‑12‑20:
An Indian inventor disrupts the period industry.
- 2011‑12‑19:
Roller derby breastfeeding.
- 2011‑12‑19:
A case for using CoffeeScript.
- 2011‑12‑19:
Visualizing device utilization.
- 2011‑12‑19:
Aeropress-gang.
- 2011‑12‑19:
Lego is for girls - or should be.
- 2011‑12‑19:
Federated account management using SAML and Shibboleth.
- 2011‑12‑19:
Republic Lost: how government centralization and expansion puts democracy in the service of special interests.
- 2011‑12‑19:
Prof David Nutt: science and non-science in drug policy. (23 Jan @ Churchill Coll)
- 2011‑12‑19:
The changing face of the Lego minifigure.
- 2011‑12‑19:
Collection of light: an LED taxonomy like an insect collection.
- 2011‑12‑19:
Bradshaw's descriptive railway handbook: an 1860s tourist guide.
- 2011‑12‑19:
Britain's ghost trains.
- 2011‑12‑19:
CoffeeScript is not a language worth knowing.
- 2011‑12‑19:
Progress with the HTTP cookie opt-in consent regulations.
- 2011‑12‑19:
The node.js aesthetic.
- 2011‑12‑19:
Why CloudKick switched from Twisted Python to node.js.
- 2011‑12‑19:
The orbit of the Moon around the Sun is convex!
- 2011‑12‑19:
The recording industry likes to make its supporters look like assholes.
- 2011‑12‑18:
Lord of the Buns: Tim Hayward and why saving Fitzbillies matters.
- 2011‑12‑18:
PHP's problem: "no design and no plan".
- 2011‑12‑18:
Goodbye World! The perils of relying on output streams in C. (video)
- 2011‑12‑17:
Institutional memory, engineering archaeology, and reverse corporate espionage.
- 2011‑12‑17:
GNU/Linux distribution timeline.
- 2011‑12‑17:
POSIX close(2) is broken.
- 2011‑12‑17:
A history of source code control in ten innovations.
- 2011‑12‑16:
lua_udunits2
- 2011‑12‑16:
UDUNITS: a library for manipulation of units of measurement.
- 2011‑12‑16:
Anagram tube map.
- 2011‑12‑16:
The surprise exam, and more surprises.
- 2011‑12‑16:
GPU-accelerated RSA.
- 2011‑12‑16:
A review of "Unjustifiable Risk? The Story of British Climbing".
- 2011‑12‑16:
Why programmers work at night.
- 2011‑12‑16:
Sun Java JDK evicted from Ubuntu following security vulnerability and withdrawal of licence by Oracle.
- 2011‑12‑16:
Lego has lost its gender-neutral creativity.
- 2011‑12‑16:
Fantasy armour and lady bits.
- 2011‑12‑15:
Bug prediction at Google.
- 2011‑12‑15:
CarrierIQ: the real story.
- 2011‑12‑15:
Elevator algorithms.
- 2011‑12‑15:
Best YA GLBTQ books of the year.
- 2011‑12‑15:
A review of MoonScript, CoffeeScript-style syntactic sugar for Lua.
- 2011‑12‑15:
Quel est le sexe des RFC ?
- 2011‑12‑14:
GlobalSign web server compromise incident report.
- 2011‑12‑14:
Long-form journalism highlights of the year.
- 2011‑12‑14:
Cheap PID-controlled espresso machine. (Kickstarter)
- 2011‑12‑14:
Louis C.K. on the production costs and profitability of his DRM-free comedy video.
- 2011‑12‑14:
Some iOS apps for children.
- 2011‑12‑14:
HTTP status cats.
- 2011‑12‑13:
IBM CMS "Hartmann" pipelines.
- 2011‑12‑13:
The Fox News approach to charting unemployment.
- 2011‑12‑13:
As expected, retreat of arctic ice leads to extensive methane plumes.
- 2011‑12‑13:
NOtES: nano-scale biomimicry for secure optical effects on cash.
- 2011‑12‑13:
Using augmented reality to show what it is like to have anomalous colour vision.
- 2011‑12‑13:
Statistical analysis of widespread Russian electoral fraud.
- 2011‑12‑13:
Vim: revisited.
- 2011‑12‑12:
Megaupload to sue Universal Music for false DMCA takedown.
- 2011‑12‑12:
The growth of the NYC commuter cycling indicator.
- 2011‑12‑12:
STFU about what women want.
- 2011‑12‑12:
Do not go rioting with remaining eye.
- 2011‑12‑12:
A skyscraper without windows: the AT&T long lines building at 33 Thomas St in Manhattan.
- 2011‑12‑12:
EU bans export of thiopental for use in executions.
- 2011‑12‑12:
DNSSEC validating stub resolver NSS plugin for glibc.
- 2011‑12‑12:
Kindle Touch jailbreak via JavaScript in an ID3 tag.
- 2011‑12‑12:
Why Spotify can never be profitable: the secret demands of record labels.
- 2011‑12‑11:
Tanenbaum's law vs. SETI.
- 2011‑12‑10:
Come bellringing in Cambridge on BBC Four.
- 2011‑12‑10:
The moment that David Cameron lost his argument at the EU summit.
- 2011‑12‑10:
René Carmille: founder of the French national statistics service, hero of the résistance, and hacker of IBM punched cards.
- 2011‑12‑10:
How to dispel your illusions: Freeman Dyson reviews "thinking, fast and slow" by Daniel Kahneman.
- 2011‑12‑10:
A BBC Micro for the 21st Century?
- 2011‑12‑10:
The deepening Fermi paradox.
- 2011‑12‑10:
Getting value for money from cloud computing.
- 2011‑12‑10:
RIAA musicians promote "rogue site" Megaupload. (Plus interesting business plan.)
- 2011‑12‑09:
Australian exceptionalism.
- 2011‑12‑09:
Painting the Forth Bridge now finished.
- 2011‑12‑09:
Producing documents by programming in Postscript.
- 2011‑12‑09:
The Crunchpad is proof that the iPad design is obvious.
- 2011‑12‑09:
Cory Doctorow reviews "how to fix copyright" by William Patry.
- 2011‑12‑09:
WebOS goes open source.
- 2011‑12‑09:
Apple using patents to undermine open web standards again.
- 2011‑12‑09:
New ice cream flavour: cookies and e. coli.
- 2011‑12‑09:
An infographic describing the criminal enterprise of counterfeit drug spam.
- 2011‑12‑09:
Popular xmas songs by decade of recording - UK version of today's XKCD.
- 2011‑12‑09:
Deutsch Bahn ICE channel tunnel service delayed until 2015 owing to late arrival of trains.
- 2011‑12‑09:
Buffer bloat: what's wrong with the Internet? - ACM Queue
- 2011‑12‑09:
US immigration and customs enforceme unjust domain name seizure processes.
- 2011‑12‑09:
An end to UK student loan phishing spam?
- 2011‑12‑09:
Results of UK publicly funded research will be open access.
- 2011‑12‑08:
DNSSEC deployment status at Comcast.
- 2011‑12‑08:
Understanding prototypes in Javascript.
- 2011‑12‑08:
Dutch government X.509 CA KPN Gemnet hacked via PHP MyAdmin.
- 2011‑12‑08:
Some pictures of the St Pancras Lego christmas tree.
- 2011‑12‑08:
Lads' mags use the same misogynist language as rapists to describe women.
- 2011‑12‑08:
Cambridge Noir.
- 2011‑12‑07:
Mandelbrot beats economics at modelling markets.
- 2011‑12‑07:
Corruption and dumbing down in exam boards.
- 2011‑12‑07:
Truly open data.
- 2011‑12‑07:
Who looked at /etc/motd on ubuntu and thought, HEY, I KNOW WHAT THIS NEEDS - SHELL SCRIPTS!?
- 2011‑12‑07:
Exploiting holes in deeper security layers of Intel CPUs.
- 2011‑12‑07:
git gets easier once you get the basic idea that branches are homeomorphic endofunctors mapping submanifolds of a Hilbert space.
- 2011‑12‑07:
Is your logo design phallic?
- 2011‑12‑07:
"I like to urge designers to always ask themselves, does this logo look like a penis?"
- 2011‑12‑07:
More news: C|Net download.com bundles adware trojans with free software.
- 2011‑12‑07:
Google has raised the bar for intelligence gathering.
- 2011‑12‑06:
Piumarta's cola: combined object/lambda architecture.
- 2011‑12‑06:
The Kernel programming language: first class fexprs.
- 2011‑12‑06:
Bringing a Norwich Pharmacal order as a litigant-in-person to identify a nasty online troll.
- 2011‑12‑06:
The curious case of 128.0.0.0/16.
- 2011‑12‑06:
C|Net download.com bundles trojan adware with free software downloads.
- 2011‑12‑06:
PayPal says Christmas is for sick cats not poor people.
- 2011‑12‑06:
Busway car traps are the new rising bollards.
- 2011‑12‑06:
The Eurozone's terrible mistake: to guarantee banks' foolish lending.
- 2011‑12‑05:
What do you do when an entire system of laws is flouted and unenforced?
- 2011‑12‑05:
How integers should work in systems programming languages.
- 2011‑12‑05:
American Christmas devil is coming!
- 2011‑12‑05:
The discovery of dolphin language.
- 2011‑12‑05:
Botnets in the UK: spam and hi-tech crime.
- 2011‑12‑05:
Bulls Dairies - a preserved sign in Cambridge.
- 2011‑12‑05:
Anti-Grain Geometry - accurate text rasterization.
- 2011‑12‑05:
Animated Bézier curves in SVG.
- 2011‑12‑05:
Cubic spline & bezier curves library.
- 2011‑12‑05:
Hermite curve interpolation.
- 2011‑12‑05:
Bezier curves - a primer.
- 2011‑12‑05:
What powers Instagram.
- 2011‑12‑04:
British public life is 78% male or worse.
- 2011‑12‑04:
On the feasibility of maglev monorails.
- 2011‑12‑04:
How Rachel Aaron went from writing 2000 to 10,000 words a day.
- 2011‑12‑04:
A programming language for DNA-based computing.
- 2011‑12‑04:
A review of "don't take no for an answer" on the Yes to AV campaign.
- 2011‑12‑04:
Moving from SVN to Git in 1,000 easy steps!
- 2011‑12‑04:
Has Mozilla lost its Google search revenue?
- 2011‑12‑04:
Damn you autocorrect: top 25 of the year.
- 2011‑12‑04:
The medical loss ratio: the bomb buried In Obamacare explodes today, Hallelujah!
- 2011‑12‑04:
Beall's list of predatory "open-access" vanity publishers.
- 2011‑12‑03:
The great Ivy League nude posture photo scandal.
- 2011‑12‑03:
How Google killed the long tail of search ad keywords.
- 2011‑12‑03:
This site's domain name has been stolen.
- 2011‑12‑03:
Doug McIlroy's guide to Research Unix.
- 2011‑12‑02:
The strange birth and long life of Unix.
- 2011‑12‑02:
Dutch anti-piracy campaign and collection agency caught in big copyright infringement and corruption scandal.
- 2011‑12‑02:
Skeuomorphism in iOS: the opiate of the people.
- 2011‑12‑02:
Microsoft Windows Server 2003 lack-of support for DNAME.
- 2011‑12‑02:
Eleven charts on inequality in America.
- 2011‑12‑02:
How Republicans are being taught to talk about Occupy Wall Street.
- 2011‑12‑02:
Email problems at UC Berkeley.
- 2011‑12‑02:
Will Abellio, Dutch operator of East Anglian rail franchise, improve cycle parking at Cambridge?
- 2011‑12‑01:
Carrier IQ usage tracking on iPhones, and how to turn it off.
- 2011‑12‑01:
A Lua DLZ back end for BIND.
- 2011‑12‑01:
DNSSEC: how to deploy it, and why you should bother.
- 2011‑12‑01:
How cleaning up the DNSChanger malware highlights the law's control over the IP address registries.
- 2011‑12‑01:
Learning modern 3D graphics programming.
- 2011‑12‑01:
Do data caps punish the wrong users?
- 2011‑11‑30:
Software in the Public Interest associated projects.
- 2011‑11‑30:
Frink: a programming language that knows about units of measurement.
- 2011‑11‑30:
Ben Collins-Sussman on the ASF/git debate: "your community is not your tools".
- 2011‑11‑30:
Amazing glass staircase wrapped around a huge cylindrical aquarium.
- 2011‑11‑30:
Royal Flying Corps trainee Graham Donald tries a new manoeuvre with his Sopwith Camel.
- 2011‑11‑30:
Norman Matloff's R programming language page.
- 2011‑11‑30:
Making sure your site can be read by a screen reader just got a whole lot more important, wouldn't you say?
- 2011‑11‑30:
Amusing bug: can't type lowercase e on Amazon EC2 Linux server.
- 2011‑11‑30:
Mary Beard on the Oxbridge interview.
- 2011‑11‑30:
RFC 6441: time to remove /8 bogon filters.
- 2011‑11‑30:
"My head teacher won't let me teach computing."
- 2011‑11‑30:
Wikipedia on the Intercity Express Programme for new trains and electrified lines.
- 2011‑11‑30:
Cambridge to get faster trains, up from 160 to 200 km/h.
- 2011‑11‑30:
Monadic region-based resource management.
- 2011‑11‑30:
Why one company is switching back from Scala to Java.
- 2011‑11‑30:
Reddit discusses "simple made easy".
- 2011‑11‑29:
Rich Hickey: simple made easy.
- 2011‑11‑29:
Hank Paulson's inside jobs.
- 2011‑11‑29:
There should never, ever be even a trace of the supernatural in the world of Scooby-Doo.
- 2011‑11‑29:
ACLs in SQL for Geeklog2.
- 2011‑11‑29:
How to build role-based access control in SQL.
- 2011‑11‑29:
HTTP Strict-Transport-Security: protection against TLS stripping attacks.
- 2011‑11‑29:
Certificate transparency: public audit logs for TLS.
- 2011‑11‑29:
GitHub is the shape of things to come, but the Apache Software Foundation still has a role.
- 2011‑11‑29:
Node.js is the most popular repo on GitHub.
- 2011‑11‑29:
DNS DNAME is almost useless.
- 2011‑11‑29:
A standard is open when it has an active open source implementation.
- 2011‑11‑29:
Thinking of impact as re-use could be key to uniting funders and researchers behind open research.
- 2011‑11‑29:
The real climategate.
- 2011‑11‑29:
Idiomatic Python: code like a Pythonista.
- 2011‑11‑29:
A basic tutorial on the pragmatics of Python.
- 2011‑11‑29:
Some equations computer scientists should (at least pretend to) know.
- 2011‑11‑29:
NPR interviews biographer of Hedy Lamarr, inventor of spread spectrum radio.
- 2011‑11‑29:
Matrix multiplication is O(n^2.373).
- 2011‑11‑29:
John Bercow's arms have an LGBT motto.
- 2011‑11‑28:
Publishers are cutting their own throats by requiring DRM on ebooks.
- 2011‑11‑28:
The death of Flash was eight years in the making.
- 2011‑11‑28:
Cumbria police killed a man by repeated tasering.
- 2011‑11‑28:
What a lender of last resort looks like: the Federal Reserve and Morgan Stanley.
- 2011‑11‑28:
"The Dick Night" featuring Frank Miller.
- 2011‑11‑28:
US Senate voting whether to allow indefinite military detention of US citizens without charge or trial.
- 2011‑11‑28:
The rise and fall of Bitcoin.
- 2011‑11‑28:
Male comic-book superheroes drawn like female ones.
- 2011‑11‑28:
The King James bible, still in copyright in the UK after 400 years.
- 2011‑11‑28:
libfaketime: a preload library that reports fake time to programs without having to change the system-wide time.
- 2011‑11‑28:
Toy advertising and gender stereotypes.
- 2011‑11‑28:
Burzynski clinic "cancer cure" quacks learn about the Streisand Effect from a school boy.
- 2011‑11‑28:
A century of reactionary deceit fromt he copyright industry.
- 2011‑11‑28:
Companies that ban Facebook are 30% more likely to have IT security breaches.
- 2011‑11‑28:
LLVM 3.0 type system rewrite.
- 2011‑11‑28:
Roll over, Frank Miller: or, why Occupy Wall Street is better than the Spartans.
- 2011‑11‑28:
Alan Moore: meet the man behind the protest mask.
- 2011‑11‑27:
How Spotify works.
- 2011‑11‑27:
Pre-fabricated energy-saving homes from Hanse-Haus.
- 2011‑11‑27:
Modern houses in Cambridgeshire.
- 2011‑11‑26:
This stupid new housing policy takes us back to the glory days of Northern Rock.
- 2011‑11‑26:
Mirth helps correct cognitive errors.
- 2011‑11‑26:
HDCP cracked using leaked master key and cheap FPGA.
- 2011‑11‑26:
Your moons are rubbish, astronomer tells Christmas card artists.
- 2011‑11‑26:
Ten things to know about the King James bible.
- 2011‑11‑25:
Daily Mail trying to force Leveson enquiry to reveal who is criticising the tabloids.
- 2011‑11‑25:
Chronic Fatigue Syndrome and the CDC: a long, tangled tale.
- 2011‑11‑25:
Evangelical churches in UK killing people with HIV by convincing them to stop taking medicine.
- 2011‑11‑25:
Peter Losher from the ISC talks about running root DNS servers.
- 2011‑11‑25:
Cory Doctorow on cold-brewed coffee.
- 2011‑11‑25:
The Times and the Daily Mail attack a support group for victims of press intrusion.
- 2011‑11‑25:
Three dying platforms: Flash, Silverlight, Win32.
- 2011‑11‑25:
Good footage of American football is an NFL trade secret.
- 2011‑11‑24:
What's wrong with OKCupid's matching algorithm.
- 2011‑11‑24:
A more detailed summary of the ECJ decision against court orders that require indiscriminate filtering by ISPs.
- 2011‑11‑24:
Air Traffic Control marches into the 1990s with new X.400 deployments!
- 2011‑11‑24:
Prevalence of swearing in the Guardian, 1999-2009.
- 2011‑11‑24:
European Court of Justice decision limits ability of member states to turn ISPs into copyright police.
- 2011‑11‑23:
World's tallest Lego Christmas tree at St Pancras: 12 metres, 3 tonnes.
- 2011‑11‑23:
Apache Software Foundation considered harmful.
- 2011‑11‑23:
Google TLS services now support forward secrecy for Firefox and Chrome users.
- 2011‑11‑23:
Porting TeX to the iPad.
- 2011‑11‑23:
After this experiment we reckon the vodka tampon is an urban myth.
- 2011‑11‑23:
Transactional memory in gcc 4.7+.
- 2011‑11‑23:
New York reporters meet the fists of the law.
- 2011‑11‑23:
Open source (almost) everything.
- 2011‑11‑23:
The Atlantic's online ad revenue surpasses print.
- 2011‑11‑22:
Is SpaceX changing the rocket equation?
- 2011‑11‑22:
Leave the history curriculum alone but teach it for longer.
- 2011‑11‑22:
What's wrong with #firstworldproblems.
- 2011‑11‑22:
Hospital patients forced to watch continuous message from Andrew Lansley, or pay £5 a day to a private company.
- 2011‑11‑22:
Monopolistic tendencies in the domain name system.
- 2011‑11‑22:
David Frum asks, when did Republicans lose touch with reality?
- 2011‑11‑22:
How the automatic gearbox nearly killed off the sperm whale.
- 2011‑11‑22:
Full disk encryption is too good, complain digital CSI teams, demanding more research to make it stronger.
- 2011‑11‑21:
What is pepper spray and what harm does it do?
- 2011‑11‑21:
Café threatened for unauthorized use of hobbit.
- 2011‑11‑21:
Neelie Kroes, EU commission VP for the digital agenda: "trying to enforce copyright has not stemmed piracy".
- 2011‑11‑21:
Iceland let the creditors of its banks hang. Ireland did not. Good for Iceland!
- 2011‑11‑21:
Sovereign Keys: a proposal to make TLS more secure.
- 2011‑11‑20:
Journals are the dinosaurs of academia.
- 2011‑11‑20:
How the police treat abuse of women and minorities online.
- 2011‑11‑20:
Improve diversity by making recruitment more objectively meritocratic.
- 2011‑11‑20:
How the San Francisco Ruby meetup grew from 2% to 18% women.
- 2011‑11‑20:
Militarized police treat prisoners better than students in California.
- 2011‑11‑20:
Cleggmania round two?
- 2011‑11‑20:
Cassandra's curse: how "The Limits to Growth" was demonized.
- 2011‑11‑20:
Seven misunderstandings about classical architecture.
- 2011‑11‑20:
Most laser printers add a tracking watermark to every page they print.
- 2011‑11‑20:
eWAVE: the world atlas of varieties of English - online.
- 2011‑11‑19:
Demonstrating should not be not a crime.
- 2011‑11‑19:
One third of Americans are below the poverty line or just scraping by.
- 2011‑11‑19:
Occupy HOPE.
- 2011‑11‑19:
Clayton Christensen: how pursuit of profits kills innovation and the U.S. economy.
- 2011‑11‑19:
Phonological change in English: the trap-bath split.
- 2011‑11‑19:
Modest dressing.
- 2011‑11‑19:
Declassified 7000 sq.m. nuclear bunker 65m under Moscow.
- 2011‑11‑19:
How tabloids treat your family if you speak against their evil acts.
- 2011‑11‑19:
Thoughts and ideas about teaching computing in school.
- 2011‑11‑19:
How to fix copyright, by William Patry of Google.
- 2011‑11‑19:
A review of the Kindle Fire.
- 2011‑11‑19:
The systemd journal: a syslog replacement for Fedora.
- 2011‑11‑18:
The Hotel Silken Puerta América in Madrid - different design and architecture on each floor.
- 2011‑11‑18:
An experiment in extreme schooling at the Moscow New Humanitarian.
- 2011‑11‑18:
The top ten supercomputers, illustrated.
- 2011‑11‑18:
The United States Supreme Court has another chance to reverse the mission creep in patent law - Prometheus vs Mayo.
- 2011‑11‑18:
In praise of clutter and paper.
- 2011‑11‑18:
Are you reading too much? (Am I?!)
- 2011‑11‑18:
"The police tried to provoke people to react violently [...] but we all supported one another and prevented the police from causing a riot."
- 2011‑11‑18:
poll() vs select()
- 2011‑11‑18:
On the Google WiFi mapping opt-out.
- 2011‑11‑18:
The NTP nanokernel.
- 2011‑11‑18:
Martian Time FAQ.
- 2011‑11‑17:
Optimization tricks used by the lockless allocator.
- 2011‑11‑17:
NeverWet coatings are superhydrophobic surfaces.
- 2011‑11‑17:
Graphene improves lithium-ion battery capacity and recharge rate ten times.
- 2011‑11‑17:
The mouse trap: the dangers of using one lab animal to study every disease.
- 2011‑11‑17:
Teaching good sex.
- 2011‑11‑17:
Windows 8 secure boot is not secure.
- 2011‑11‑17:
nixio: Lua networking + crypto + filesystem functions.
- 2011‑11‑17:
WinKexec: a Linux bootloader implemented as a device driver for Windows.
- 2011‑11‑17:
The fall of America's r-less class.
- 2011‑11‑16:
Miss World and Mary Beard.
- 2011‑11‑16:
The 3-D printing free-for-all. (Not for long!)
- 2011‑11‑16:
What exactly is HMRC paying Capgemini billions for?
- 2011‑11‑16:
Javascript minitel emulator.
- 2011‑11‑16:
SPDY is not hard. Securing the Internet is.
- 2011‑11‑16:
Zoho mail sends messages with a Status: header marking them as already seen.
- 2011‑11‑16:
Men-only policy debates must stop.
- 2011‑11‑16:
Oh dear, another BIND crash bug.
- 2011‑11‑15:
"Verbatim" mode stops Google search from trying to be clever.
- 2011‑11‑15:
Cracking Siri: how an iPhone 4S talks to the speech recognition engine hosted at Apple.
- 2011‑11‑15:
PDP-10/X: a reimplementation of a PDP-10 on an FPGA, running ITS.
- 2011‑11‑15:
sortu: sort | uniq in one.
- 2011‑11‑15:
"My ICT teacher can't mark my homework" - a problem for children who can code.
- 2011‑11‑15:
DNSSEC reality and utility.
- 2011‑11‑15:
Lua-CodeGen: a template engine based on Terence Parr's ideas.
- 2011‑11‑15:
Condorcet internet voting service.
- 2011‑11‑14:
Observations of two "happy eyeballs" quick IPv6 / IPv4 connect implementations.
- 2011‑11‑14:
Remembrance Sunday and Germans.
- 2011‑11‑14:
The handling of sex offenders in the USA makes the problem worse.
- 2011‑11‑14:
101 - national non-emergency number for contacting the police.
- 2011‑11‑14:
Google's smeared leap seconds vs. Markus Kuhn's smoothed leap seconds.
- 2011‑11‑13:
Cheap drugs reduce violent crime.
- 2011‑11‑13:
A memory of sexist abuse.
- 2011‑11‑13:
The nocebo effect.
- 2011‑11‑13:
In America some women who lose babies face murder charges.
- 2011‑11‑13:
Grammatical variation in Irish English.
- 2011‑11‑12:
Luma Labs discontinues their camera sling products to avoid patent litigation.
- 2011‑11‑12:
Finally, a judge stands up to Wall Street.
- 2011‑11‑12:
Planning for the post euro Irish economy.
- 2011‑11‑12:
The Riot's catcaller form.
- 2011‑11‑12:
"How I stopped worrying and learned to love OWS."
- 2011‑11‑11:
The slow approach of the bananapocalypse.
- 2011‑11‑11:
Bright: a C-like Lua derivative.
- 2011‑11‑11:
How Fitzbillies was saved.
- 2011‑11‑11:
Wittgenstein on fog-like sensations and road signs.
- 2011‑11‑11:
80 mph speed limit does not look so clever now.
- 2011‑11‑11:
"The Eurozone countries most under threat aren't the ones with generous welfare states or effective social contracts."
- 2011‑11‑10:
Confident code.
- 2011‑11‑10:
Everson Mono font.
- 2011‑11‑10:
Google+ does not understand its users.
- 2011‑11‑10:
Online abuse: what about the men?
- 2011‑11‑10:
OFCOM study on the state of DNSSEC deployment in the UK and internationally.
- 2011‑11‑10:
Engineering the ten thousand year clock.
- 2011‑11‑10:
Computer programming for children, minus cryptic syntax.
- 2011‑11‑10:
Campaign against the "keep calm and carry on" trademark.
- 2011‑11‑10:
Celebrating 50 years of human-powered flight.
- 2011‑11‑10:
60th birthday of the Lyons Electronic Office, the first business computer, based on EDSAC.
- 2011‑11‑10:
More water rocket construction tutorials.
- 2011‑11‑10:
NASA water rocket launcher build instructions.
- 2011‑11‑10:
High-power paper rocket launcher.
- 2011‑11‑10:
NASA water rocket build instructions.
- 2011‑11‑10:
NASA project X-51: water rockets for kids.
- 2011‑11‑10:
DTrace and Erlang.
- 2011‑11‑09:
Comcast IPv6 deployment.
- 2011‑11‑09:
Authenticated denial of existence in DNSSEC.
- 2011‑11‑09:
xv6: 6th Edition Unix and Lions' commentary ported to ANSI C and x86 for teaching.
- 2011‑11‑09:
A brief rant on the future of interaction design.
- 2011‑11‑09:
HMG says open source is as secure as proprietary software, and should not be ruled out of the procurement process.
- 2011‑11‑09:
The social graph is neither.
- 2011‑11‑08:
32 questions for sysadmins.
- 2011‑11‑08:
Berp: a Python 3 to Haskell translator.
- 2011‑11‑08:
Michael Lewis on Daniel Kahneman, "the king of human error".
- 2011‑11‑08:
Non-errors in English usage.
- 2011‑11‑08:
La Brea allows you to insert Lua scripts into a program without recompiling.
- 2011‑11‑08:
The big sexy problem with superheroines and their "liberated sexuality".
- 2011‑11‑08:
Nature reports on the Royal Society leap second meeting.
- 2011‑11‑08:
Burj Khalifa has no sewers, so relies on trucking out the poo instead.
- 2011‑11‑08:
libfiu: fault injection in userspace.
- 2011‑11‑08:
Sir Paul Nurse on the Fracis Crick institute.
- 2011‑11‑08:
Francis Crick institute building. (Should have used the plot to keep more books on site at the library.)
- 2011‑11‑08:
The saggar maker's bottom knocker.
- 2011‑11‑08:
Morality and the markets.
- 2011‑11‑08:
Robert Fisk on remembrance poppies.
- 2011‑11‑08:
Version numbers in Perl are not boring enough.
- 2011‑11‑08:
Demystifying the chinese hacking industry.
- 2011‑11‑08:
ACPO and UCAS now count as public bodies for freedom of information purposes.
- 2011‑11‑08:
"All right, fine. I'll add a disclaimer to my emails."
- 2011‑11‑08:
NY Times obituary of Norman Ramsey, whose work led to atomic clocks and nuclear magnetic resonance.
- 2011‑11‑08:
Bayes' theorem not banned from British courts.
- 2011‑11‑08:
What lies behind online misogyny?
- 2011‑11‑08:
All Wired staff photos released under CC-BY-NC.
- 2011‑11‑08:
The project to build Babbage's Analytical Engine.
- 2011‑11‑08:
Ruby crypto key generation bug.
- 2011‑11‑07:
What should we do about sexist abuse online?
- 2011‑11‑07:
BozoCrack: depressingly effective MD5 password hash cracker.
- 2011‑11‑07:
Automated content: the future of sports journalism?
- 2011‑11‑07:
Artificial intelligence is putting people out of work.
- 2011‑11‑07:
The most amazing room in Queens.
- 2011‑11‑07:
Chaitin's incompleteness theorem and the surprisingly small complexity barrier.
- 2011‑11‑07:
IKEA's convoluted ownership and accounting.
- 2011‑11‑07:
Google's tax dodge.
- 2011‑11‑07:
"I think dead children should be used as a unit of currency. I know this sounds controversial, but hear me out."
- 2011‑11‑07:
1TB hard drive prices up 180% in a month due to floods in Tailand.
- 2011‑11‑07:
Glass-Steagall Act: the senators and economists who got it right.
- 2011‑11‑07:
Goldman Sachs is forcing up the price of aluminium.
- 2011‑11‑06:
The origins of Scala.
- 2011‑11‑06:
Eclipse Xtend: syntactic sugar for Java programmers.
- 2011‑11‑05:
Is abuse really a necessary occupational hazard of blogging?
- 2011‑11‑05:
The only way to have a successful revolution in any field of human activity.
- 2011‑11‑05:
Words on plot and treason.
- 2011‑11‑05:
DNSSEC-trigger on Mac OS X.
- 2011‑11‑05:
L'énergie tirée des forêts polluerait plus que le charbon.
- 2011‑11‑05:
When centralised purchasing wastes money.
- 2011‑11‑05:
Capitalism can't just be about money.
- 2011‑11‑05:
The thing about bullying.
- 2011‑11‑05:
haveged: an entropy gathering daemon based on variable execution timing.
- 2011‑11‑05:
Proportional Rate Reduction for TCP: another improved flow control algorithm.
- 2011‑11‑05:
FileVault 2 and Find My Mac foil thieves.
- 2011‑11‑05:
A woman's opinion is the mini-skirt of the Internet.
- 2011‑11‑04:
Universal Music sued again for not paying licensing royalties to musicians.
- 2011‑11‑04:
KON Getronics suspends CA operations after finding DDOS tool on web server.
- 2011‑11‑04:
Patently absurd: copyright law provides enough protection for software.
- 2011‑11‑04:
The BBC on the leap second debate.
- 2011‑11‑04:
Gaslighting: belittling women and dismissing their legitimate emotions as unreasonable.
- 2011‑11‑04:
Future of UTC meeting presentations.
- 2011‑11‑04:
Women in finance.
- 2011‑11‑04:
Apple's supply chain expertise.
- 2011‑11‑04:
Not One-Off Britishisms: UK expressions that have taken hold in the US.
- 2011‑11‑04:
Four ways men stunt women's careers.
- 2011‑11‑04:
Gas mask, $20, ideal for occupying Oakland or Wall St.
- 2011‑11‑04:
A senior police officer says brothels should be legal.
- 2011‑11‑03:
An RFC 4819 secure shell public key subsystem implementation for OpenSSH.
- 2011‑11‑03:
Mozilla revokes trust in a Malaysian intermediate CA, DigiCert Sdn. Bhd.
- 2011‑11‑03:
Australian weather calendar 2012.
- 2011‑11‑03:
How iAds support WebGL, and how developers can use WebGL on iOS.
- 2011‑11‑03:
The Mac app sandbox is restrictive.
- 2011‑11‑03:
Knot authoritative DNS server from nic.cz. (RIPE63)
- 2011‑11‑03:
Yadifa: beyond BIND and NSD. (RIPE63)
- 2011‑11‑03:
"Google release something, and I no longer have any faith that it's going to be any good."
- 2011‑11‑03:
The flat world of BGP: AS and prefix counts growing, but not update rate. (RIPE63)
- 2011‑11‑03:
IPv6 day: what did we learn? (RIPE63)
- 2011‑11‑03:
DNSCCM: an implementation of the nameserver control protocol. (RIPE63).
- 2011‑11‑03:
DNSSEC-trigger: mobile Unbound validator autoconfiguration. (RIPE63)
- 2011‑11‑03:
The sheer volume of sexist abuse thrown at female bloggers is the Internet's festering sore.
- 2011‑11‑03:
The Daily Mail and Hugh Grant: how tabloids intimidate privacy campaigners.
- 2011‑11‑03:
Documentation about the ITO map.
- 2011‑11‑03:
ITO Map: view hidden layers of Open Street Map.
- 2011‑11‑03:
Copyright policy is Internet policy.
- 2011‑11‑03:
Almost all BT Newzbin2 users are bypassing the court-ordered block.
- 2011‑11‑03:
Yadifa: a full-featured DNS server in development at EURID.
- 2011‑11‑03:
Knot DNS: full featured high performance authoritative DNS server from nic.cz.
- 2011‑11‑03:
A beautiful ring counter clock.
- 2011‑11‑03:
Don't give your users shit work: manually categorizing contacts is a waste of time.
- 2011‑11‑03:
Studded bicycle tires.
- 2011‑11‑02:
In-place modification/assignment patch for Lua.
- 2011‑11‑02:
East Bergholt.
- 2011‑11‑02:
Germany's difficulties caused by phasing out nuclear power.
- 2011‑11‑02:
Inside the mind of the octopus.
- 2011‑11‑02:
So you think Linux's capability model is bad? What about the web's?
- 2011‑11‑02:
Did accounting help sink Corzine's MF Global?
- 2011‑11‑02:
Ex Google Reader PM on the redesign.
- 2011‑11‑02:
Chemistry and early hominid diets.
- 2011‑11‑01:
Jamie Zawinsky discusses RSS feed readers.
- 2011‑11‑01:
Ten years of ZFS.
- 2011‑11‑01:
Notes d'EuroBSDcon 2011 en Français.
- 2011‑11‑01:
Status of the ITU-R study of UTC.
- 2011‑11‑01:
Key escrow from a safe distance: looking back at the Clipper chip.
- 2011‑11‑01:
Telescript programming guide.
- 2011‑11‑01:
Telescript language reference.
- 2011‑11‑01:
Protesters decide they actually like wind turbines now they have been built.
- 2011‑11‑01:
Three RSS feed readers.
- 2011‑10‑31:
The mediaeval plutocracy at the heart of London.
- 2011‑10‑31:
Android has swallowed the UK smartphone market in the last 18 months.
- 2011‑10‑31:
Siri ported to jailbroken iPhone 4.
- 2011‑10‑31:
Averia: an average font made using generative typography.
- 2011‑10‑31:
jgrep: a grep for JSON written in Ruby.
- 2011‑10‑31:
The OTCA metapixel: running Life inside Life, 4 million times bigger and 35 thousand times slower.
- 2011‑10‑31:
The Dish celebrates its 50th birthday.
- 2011‑10‑31:
A senior civil servant on the unavoidable truths about government IT.
- 2011‑10‑31:
State schools are not properly guiding pupils through university applications; UCAS planning to move process after A-levels.
- 2011‑10‑31:
The Guardian on the Janet 6 network upgrade project. (Wot no "super"?)
- 2011‑10‑31:
Acoustic cryptanalysis: nosy people and noisy machines.
- 2011‑10‑31:
Tachyon: a meta-circular optimizing JavaScript virtual machine.
- 2011‑10‑31:
TLS out-of-band public key validation: divorcing TLS from X.509.
- 2011‑10‑31:
TACK: Tethered Assertions for Certificate Keys. Convergence widens its TLS protection.
- 2011‑10‑31:
The war on lemonade stands.
- 2011‑10‑31:
Giving Haskell a promotion: kind polymorphism and typed type-level programming.
- 2011‑10‑31:
All Chinese maps are subtly obfuscated.
- 2011‑10‑31:
Brian Kernighan talks about Dennis Ritchie.
- 2011‑10‑31:
Extensible programming with first-class cases - a solution to Wadler's expression problem.
- 2011‑10‑31:
The evolution of RISC technology at IBM.
- 2011‑10‑31:
A Smalltalker reviews Google Dart.
- 2011‑10‑31:
Freedom and crutches in programming language design.
- 2011‑10‑30:
Open Access to scientific publications: a short summary.
- 2011‑10‑30:
Wall Street isn't winning, it's cheating.
- 2011‑10‑29:
kramdown-rfc2629: an xml2rfc back end for a ruby markdown processor.
- 2011‑10‑29:
Markdown -> pandoc -> docbook -> xslt -> xml2rfc -> Internet draft.
- 2011‑10‑29:
The EFF on SOPA: "Hollywood finally gets a chance to break the Internet."
- 2011‑10‑29:
Why everything R2D2 says is bleeped out.
- 2011‑10‑29:
DNSCCM: DNS Configuration, Control and Monitoring.
- 2011‑10‑29:
Freshmeat renamed FreeCode.
- 2011‑10‑29:
Publicly funded science should be published and practised in the open.
- 2011‑10‑29:
Dr. Walter Bortz on his patient and friend, John McCarthy.
- 2011‑10‑29:
Google Apps admins have unrestricted access to all their users' Google+ data.
- 2011‑10‑29:
RSS vs social media.
- 2011‑10‑29:
Copyright troll loses case for not owning rights; must pay nearly $120k costs.
- 2011‑10‑29:
StackExchange's battles with the .NET garbage collector.
- 2011‑10‑28:
Google staff being put on probation or sacked for arguing against the real names policy.
- 2011‑10‑28:
Legal aid: the new poor law.
- 2011‑10‑28:
Sexist reactions to feminism in open source.
- 2011‑10‑28:
How Occupy Wall Street cost Caitlin Curran her job.
- 2011‑10‑28:
Girls often driven away from STEM by their teachers.
- 2011‑10‑28:
USPTO grants patent on obvious application of scientific method.
- 2011‑10‑28:
If Google don't like your name they will delete the contacts from your Android phone.
- 2011‑10‑28:
Why Dave Winer needs to learn about RFC 2136 DNS updates.
- 2011‑10‑28:
Broadway: a JavaScript H.264 decoder.
- 2011‑10‑28:
lolcat(1)
- 2011‑10‑28:
Apple gift catalogue 1983.
- 2011‑10‑28:
Codify: game and simulation development with Lua on iPad.
- 2011‑10‑27:
An experimental evaluation of rate-adaptation algorithms for streaming over HTTP.
- 2011‑10‑27:
Google nymwars, redux.
- 2011‑10‑27:
Norman Davies on Europe's vanished states.
- 2011‑10‑27:
EPO grants patent on broccoli.
- 2011‑10‑27:
Brian Cox is wrong: blogging your research is not a recipe for disaster.
- 2011‑10‑27:
PLoS Won: the success of open access journals.
- 2011‑10‑27:
Playing the probabilities: blackjack, shuffles, and residual correlations.
- 2011‑10‑27:
The EFF on the security of and attacks on TLS.
- 2011‑10‑27:
Australian helmet cam study reveals motorists to blame in vast majority of cycling crashes.
- 2011‑10‑27:
Android orphans: visualizing a sad lack of supported software updates.
- 2011‑10‑27:
Valve: "The easiest way to stop piracy is to give people a service that's better than what they get from pirates."
- 2011‑10‑27:
Paraglider survives encounter with thunderstorm.
- 2011‑10‑27:
Parachuting through a cumulonimbus.
- 2011‑10‑27:
Two amusing side channel attacks.
- 2011‑10‑27:
Higher-Order Perl.
- 2011‑10‑27:
Modern Perl.
- 2011‑10‑27:
Perl tutorials suck (and cause serious damage).
- 2011‑10‑27:
The making of Arduino.
- 2011‑10‑26:
Sealand, HavenCo, and the rule of law.
- 2011‑10‑26:
It has to work: the essential ingredient of successful software.
- 2011‑10‑26:
French government "banning vegetarianism" in school canteens.
- 2011‑10‑26:
The road to better web authorization.
- 2011‑10‑26:
Cutting the Gordian knot of web identity.
- 2011‑10‑26:
The forbidden story of Argentina's post-default economic success.
- 2011‑10‑26:
Reminiscing about The Princess Bride.
- 2011‑10‑26:
How the Joy of Sex was illustrated.
- 2011‑10‑26:
The St Paul's protesters are taking health and safety more seriously, with more professional responsibility, than the Dean and Chapter.
- 2011‑10‑25:
Visa and MasterCard want to use credit card activity to target web ads.
- 2011‑10‑25:
Radiation and Reason: the impact of science on a culture of fear.
- 2011‑10‑25:
The Register's obituary of John McCarthy.
- 2011‑10‑25:
UN special rapporteur on health as a human right says all states must provide safe abortion and contraception.
- 2011‑10‑25:
A randomly generated language is as easy as Perl for novice programmers.
- 2011‑10‑25:
On parliamentary sovereignty.
- 2011‑10‑25:
Software patents come to the UK.
- 2011‑10‑25:
How to handle versioning in web APIs.
- 2011‑10‑25:
Jamie Zawinsky's tribute to John McCarthy.
- 2011‑10‑25:
Wired obituary of John McCarthy, father of AI and Lisp.
- 2011‑10‑24:
Empirical software engineering.
- 2011‑10‑24:
Who else was hit by the RSA attackers?
- 2011‑10‑24:
How to break XML encryption.
- 2011‑10‑23:
Tim O'Reilly on running a business, and the pursuit of passion rather than profit.
- 2011‑10‑23:
"Cookie Monster" explains Occupy Wall Street.
- 2011‑10‑23:
Congress warned in 1999 that deregulation would lead to cascade failures and make banks too big to fail.
- 2011‑10‑23:
Space Alert's genius is in combining its madness-inducing ten minute time limit with a spectacular demand for player co-ordination.
- 2011‑10‑23:
Holy Flying Circus: brilliant funny dramatization of the controversy over "Life of Brian".
- 2011‑10‑23:
Find out why the onions are in there before changing the recipe.
- 2011‑10‑23:
The Goertzel tone detection algorithm.
- 2011‑10‑23:
1e13 digits of pi.
- 2011‑10‑21:
Susan Greenfield should write up her techno-scare stories for scientific review.
- 2011‑10‑21:
How a tabloid ruins someone's life for no good reason.
- 2011‑10‑21:
The Economist's obituary of Dennis Ritchie.
- 2011‑10‑21:
Centralized shared HR and finance services for the research councils fails to save money.
- 2011‑10‑21:
The stilted grammar of telemarketing.
- 2011‑10‑21:
Quasiquotation in Lisp.
- 2011‑10‑21:
Labscam: Penn & Teller at Bell Labs, as told by Dennis Ritchie.
- 2011‑10‑20:
Design mistakes in mixed C / C++ and Lua projects.
- 2011‑10‑20:
A list of AJAX webmail software.
- 2011‑10‑20:
The case for copyright piracy.
- 2011‑10‑20:
Why did the BBC compare sex education to paedophilia? Cowardly uninformative journalism.
- 2011‑10‑20:
Buying second-hand goods for cash is illegal in Louisiana.
- 2011‑10‑20:
Network effects in share ownership: the concentration of economic power in 147 companies.
- 2011‑10‑20:
Cambridgeshire county councillors give themselves a 25% pay increase in violation of the council constitution.
- 2011‑10‑20:
On the ethical conduct of News International's solicitors Farrers.
- 2011‑10‑20:
EFF declares premature victory in the Google+ nymwars.
- 2011‑10‑20:
The challenges of turning the Photoshop deblur prototype into a product.
- 2011‑10‑19:
Using an iPhone accelerometer to decode what is typed on a nearby keyboard.
- 2011‑10‑19:
How to create a fictional language in a day.
- 2011‑10‑19:
Programming languages of the last five years.
- 2011‑10‑19:
The guild of Silicon Valley.
- 2011‑10‑19:
In defence of Objective-C.
- 2011‑10‑19:
The digital replacement of film in cinema.
- 2011‑10‑19:
Drawbridge: user mode NT for application sandboxing.
- 2011‑10‑19:
Inserting synthetic 3D objects into 2D photographs.
- 2011‑10‑19:
Hacker News recommends programming blogs.
- 2011‑10‑19:
Bundled, Buried & Behind Closed Doors - about an Internet hub, 60 Hudson St.
- 2011‑10‑19:
In memoriam Dennis Ritchie.
- 2011‑10‑18:
The great tech war of 2012.
- 2011‑10‑18:
A*: reweighting a graph for faster shortest paths.
- 2011‑10‑18:
A review of the Guardian's iPad app.
- 2011‑10‑18:
The Devenish-Phibbs memorial gallery.
- 2011‑10‑18:
Mitigating the BEAST attack on TLS.
- 2011‑10‑17:
A plaque on both your houses.
- 2011‑10‑17:
Skyscraper builders get in trouble for re-creating photo safely.
- 2011‑10‑17:
Lunch atop a skyscraper in London.
- 2011‑10‑17:
OpenResty web app server basedon nginx + Lua.
- 2011‑10‑17:
Why Stephen Bond is no longer a skeptic.
- 2011‑10‑17:
WeatherSpark: beautiful weather graphs and maps.
- 2011‑10‑17:
Amazon is now becoming a publisher in its own right.
- 2011‑10‑17:
Summary of the judicial review of the charitable status of independent schools.
- 2011‑10‑17:
Accessibility does not require reduced security. (Alec Muffett on Steve Yegge's Amazon / Google rant.)
- 2011‑10‑17:
DNSSEC-Trigger updates your Unbound validating resolver configuration as your connectivity changes.
- 2011‑10‑17:
Programming for children.
- 2011‑10‑17:
Siri's favourite colour is octarine?
- 2011‑10‑17:
The Cambridge Tab on the election of the Chancellor.
- 2011‑10‑17:
Metaphor to maturity: typography, the web, and ebooks.
- 2011‑10‑17:
IANA Time Zone Database.
- 2011‑10‑17:
Athene Donald on the election of the Chancellor.
- 2011‑10‑17:
Mary Beard on the election of the Chancellor.
- 2011‑10‑17:
There seems to be only one cloud icon in the entire universe.
- 2011‑10‑17:
The Shen programming language.
- 2011‑10‑17:
How much do Apple's factories cost?
- 2011‑10‑16:
Fibonacci flim-flam.
- 2011‑10‑16:
Document history of plan to pass TZ database to IANA.
- 2011‑10‑16:
ICANN officially takes responsibility for TZ database.
- 2011‑10‑16:
York University to get the Brian Blessed Centre for Quiet Study.
- 2011‑10‑16:
Official result of the election of the Chancellor.
- 2011‑10‑16:
The consequences of missing sex education.
- 2011‑10‑16:
High-viz, women's clothing, and blaming the victim.
- 2011‑10‑16:
Lord Sainsbury elected Chancellor of the University of Cambridge.
- 2011‑10‑16:
The Keaton music typewriter.
- 2011‑10‑15:
How to reform copyright.
- 2011‑10‑15:
More C programming tricks
- 2011‑10‑15:
What is your favourite C programming trick?
- 2011‑10‑15:
The LMAX architecture.
- 2011‑10‑15:
Shit that Siri says.
- 2011‑10‑15:
The Cambridge Science Centre initiative.
- 2011‑10‑15:
The Department for Transport now allows "Except Cycles" to be added to "No Entry" signs.
- 2011‑10‑15:
Amazon Kindle source code.
- 2011‑10‑15:
Cambridge University official map switching to Open Street Map.
- 2011‑10‑15:
Google Labs and Code Search killed.
- 2011‑10‑15:
Google+ support staff will cancel your account if your name is too foreign.
- 2011‑10‑14:
How to beat the CAP theorem.
- 2011‑10‑14:
Lights: pretty WebGL demo.
- 2011‑10‑14:
Speed up bloaty web apps with nginx microcaching.
- 2011‑10‑14:
Rob Pike on Dennis Ritchie.
- 2011‑10‑14:
Throwable 360° panoramic ball camera.
- 2011‑10‑14:
How Siri works.
- 2011‑10‑14:
Why extended display identification data (EDID) is untrustworthy for DPI.
- 2011‑10‑14:
The developer's guide to browser adoption rates.
- 2011‑10‑14:
More news on the Astrolabe / Olson + Eggert TZ database lawsuit.
- 2011‑10‑14:
Some funky new features in iOS 5.
- 2011‑10‑14:
Do anything interesting in the tech world, and you will get sued for patent infringement.
- 2011‑10‑14:
How to hide the iOS5 Newsstand icon in a folder.
- 2011‑10‑14:
Parsing expressions by recursive descent.
- 2011‑10‑14:
Top-down parsing of expressions.
- 2011‑10‑14:
Ars Technica obituary of Dennis Ritchie.
- 2011‑10‑14:
Wired obituary of Dennis Ritchie.
- 2011‑10‑14:
NY Times obituary of Dennis Ritchie.
- 2011‑10‑14:
Guardian obituary of Dennis Ritchie.
- 2011‑10‑14:
K&R and you.
- 2011‑10‑13:
A profile of Dennis Ritchie in the Economist, 2004.
- 2011‑10‑13:
The BLISS programming language: a history.
- 2011‑10‑13:
Herb Sutter on Dennis Ritchie and C.
- 2011‑10‑13:
Geoff Huston's progress report on IPv4 address exhaustion.
- 2011‑10‑13:
Who uses RFC 2136 dynamic DNS updates.
- 2011‑10‑13:
Smalltalk 80: the language and its implementation.
- 2011‑10‑13:
Why a RIM outage affects users on a corporate Blackberry Enterprise Server.
- 2011‑10‑13:
What our culture teaches about alcohol is all wrong.
- 2011‑10‑13:
Siri says some weird things.
- 2011‑10‑12:
Large scale pcap data analysis using Hadoop.
- 2011‑10‑12:
My Blackberry isn't working.
- 2011‑10‑12:
On blogging, death threats, and silence.
- 2011‑10‑12:
Benford's Law and the decreasing reliability of accounting data for US firms.
- 2011‑10‑12:
How Wall St salaries compare to the rest of New York.
- 2011‑10‑12:
Crash-only software.
- 2011‑10‑12:
Steve Yegge's Amazon vs Google platform rant.
- 2011‑10‑12:
Why isn't everyone hacked every day?
- 2011‑10‑12:
MDB: a memory-mapped database and backend for OpenLDAP.
- 2011‑10‑12:
The disfunction of Google's Wave project.
- 2011‑10‑12:
The search for a more perfect kilogramme.
- 2011‑10‑11:
Photoshop "unblur" / blind deconvolution.
- 2011‑10‑11:
Why your new programming language will not work.
- 2011‑10‑11:
The vicious trademark battle over "keep calm and carry on".
- 2011‑10‑11:
Why believe in Keynesian economics?
- 2011‑10‑11:
Why Caitlin Moran and Grace Dent are never on panel shows... but should be.
- 2011‑10‑11:
Dart has a feeble type system.
- 2011‑10‑11:
That's not online! Library collections, archives and other information that aren't accessible online, and how to find them.
- 2011‑10‑11:
The LONG and windy ROAD - a timeline of IPng and IPv6, 1991 - 1996.
- 2011‑10‑11:
UK ISP porn filter plans have been blown out of all proportion.
- 2011‑10‑11:
Radio 4 Long Wave's days are numbered - what will happen to Economy 7 radio teleswitching?
- 2011‑10‑11:
Ignition! An informal history of liquid rocket propellants.
- 2011‑10‑11:
What good is Wall Street?
- 2011‑10‑11:
List of languages that compile to JavaScript.
- 2011‑10‑11:
A first impression of Dart
- 2011‑10‑10:
Type inference for first-class messages with match functions.
- 2011‑10‑10:
Simple types are anti-modular.
- 2011‑10‑10:
Netflix realises that the Quikster split was a stupid idea.
- 2011‑10‑10:
Ben Pierce: "Types considered..."
- 2011‑10‑10:
Defending against spear phishing with Exim's embedded Perl feature.
- 2011‑10‑10:
Lambda The Ultimate discusses Dart.
- 2011‑10‑10:
The Dart programming language: Google updates Javascript for programming in the large.
- 2011‑10‑10:
Microtouch: AVR devel board with touch screen.
- 2011‑10‑10:
"Electronic communications privacy act" lets US law enforcement secretly search email logs.
- 2011‑10‑10:
The great American bubble machine.
- 2011‑10‑10:
HP plans to release first memristor memory alternative to flash in 18 months.
- 2011‑10‑09:
Vehicle and operator services agency: smoky vehicle report form.
- 2011‑10‑09:
How beer saved the world.
- 2011‑10‑09:
Edwin Land, the man who inspired Steve Jobs.
- 2011‑10‑09:
Steven Pinker's history of violence.
- 2011‑10‑08:
Margaret Dayhoff, pioneer of bioinformatics.
- 2011‑10‑08:
TCP-clouds, UDP-clouds, "design for fail" and AWS.
- 2011‑10‑07:
Understanding integer overflow in C and C++.
- 2011‑10‑07:
Microsoft ISA server is incompatible with CIDR.
- 2011‑10‑07:
LLVM IR is a compiler IR not a general-purpose bytecode.
- 2011‑10‑07:
ZBar bar code reader.
- 2011‑10‑07:
Infringement damages increased after CEO complains about patent system.
- 2011‑10‑07:
Swedish copyright policy is dictated by the USA.
- 2011‑10‑07:
Jason Kottke remembering Steve Jobs.
- 2011‑10‑07:
TZ database lawsuit the result of an argument between astrological software companies?
- 2011‑10‑07:
Answers to the IERS's UTC questionnaire.
- 2011‑10‑07:
IANA TZ Mailman list info page, including archives back to 1986.
- 2011‑10‑07:
F*: secure distributed programming with value-dependent types.
- 2011‑10‑07:
TZ mailing list makes early move to IANA.
- 2011‑10‑06:
Steve Jobs succumbs to alternative medicine.
- 2011‑10‑06:
A portrait of Steve Jobs.
- 2011‑10‑06:
Thanks, Steve.
- 2011‑10‑06:
Astrolabe Inc. vs. Arthur David Olson and Paul Eggert: complaint.
- 2011‑10‑06:
Astrolabe, Inc. vs. Arthur David Olson and Paul Eggert.
- 2011‑10‑06:
Law suit shuts down Olson TZ database servers.
- 2011‑10‑06:
Exploiting Apache httpd reverse proxy rewrite rules.
- 2011‑10‑06:
Luca Cardelli: an accidental Simula user.
- 2011‑10‑06:
Affirmative design / critical design / programming language design.
- 2011‑10‑06:
Practical file system design with the Be file system.
- 2011‑10‑06:
ICANN security and stability advisory committee preliminary report on DNS response modification.
- 2011‑10‑05:
Organic farming outperforms industrial farming on every measure.
- 2011‑10‑05:
Bluetooth 4 vs near-field RFID.
- 2011‑10‑05:
Diplomatic blowback in the UN following the NATO action to enforce an "immediate ceasefire" in Lybia.
- 2011‑10‑05:
Middleboxes in cellular networks.
- 2011‑10‑05:
Patently misguided.
- 2011‑10‑05:
Broadcom's pet patent troll is suing hotels and cafés that offer WiFi.
- 2011‑10‑05:
Gaming security by obscurity.
- 2011‑10‑05:
Apple Knowledge Navigator 1987 concept video, vs iPhone 4S.
- 2011‑10‑04:
Cache directory tagging standard.
- 2011‑10‑04:
Amon Tobin ISAM visualisation.
- 2011‑10‑04:
Sampling and mixing by cutting and pasting vinyl records.
- 2011‑10‑04:
A homemade receiver for GPS & GLONASS satellites.
- 2011‑10‑04:
Homemade GPS receiver.
- 2011‑10‑04:
Facebook promotes rape and violence against women.
- 2011‑10‑04:
When archbishops propagate tabloid lies about the BBC's lack of editorial policy on dates.
- 2011‑10‑04:
Domain name case law in the US.
- 2011‑10‑04:
Nissan Computer vs. Nissan Motor domain name dispute.
- 2011‑10‑04:
AC: composable asynchronous IO for conventional languages.
- 2011‑10‑03:
MIT Technology Review special science fiction edition.
- 2011‑10‑03:
Bitbucket now supports Git as well as Mercurial.
- 2011‑10‑03:
Beloit College mindset list for this year's freshers.
- 2011‑10‑03:
Algorithmic symphonies from one line of code.
- 2011‑10‑03:
DNSMON view of the F-root Beijing node IPv6 route leak.
- 2011‑10‑03:
BGPmon on the F-root Beijing node IPv6 route leak.
- 2011‑10‑03:
Fanfic refugees get to grips with Pinboard, as it were.
- 2011‑10‑03:
Pinboard gets to grips with the fanfic refugees from Delicious.
- 2011‑10‑03:
Microsoft blacklists email from Oxford University.
- 2011‑10‑03:
HTC Android phones log private data and expose it to unprivileged apps.
- 2011‑10‑03:
Cameron wants to scrap the Human Rights Act but Clegg prevents him.
- 2011‑10‑03:
Judge rules mathematical analysis of statistics and probability may not be used in court.
- 2011‑10‑03:
Cambridge Geek Night 13 featuring Bill Thompson and Simon Peyton Jones.
- 2011‑10‑02:
Innovation Starvation - Neal Stephenson.
- 2011‑10‑02:
How the US FRA is regulating passenger rail out of existence.
- 2011‑09‑30:
Browser speed tests: Opera wins, Chrome loses.
- 2011‑09‑30:
Chrome to pass Firefox in popularity by the end of the year.
- 2011‑09‑30:
Will Amazon buy Palm from HP?
- 2011‑09‑30:
LuaNode: asynchronous I/O based on Boost.Asio.
- 2011‑09‑30:
Whatever happened to the iPad rivals of 2010?
- 2011‑09‑30:
A Lua binding for libuv.
- 2011‑09‑30:
Cliff Stanford to appeal email interception conviction.
- 2011‑09‑30:
Spam feedback loop n-gram analyzer.
- 2011‑09‑29:
DJB's NaCl ECC-based cryptography library. No algorithm agility?
- 2011‑09‑29:
C#-style async/await support for node.js.
- 2011‑09‑29:
DJB vs. the IEEE on public domain papers and copyright assignment.
- 2011‑09‑29:
Academics should stop giving free peer review services to closed journals.
- 2011‑09‑29:
The BMJ on the Liberal Democrat drugs policy.
- 2011‑09‑29:
Organize your cables with toilet paper rolls.
- 2011‑09‑29:
ROBLOX FAQ for parents.
- 2011‑09‑29:
Video promo for ROBLOX: lego-ish kids' game engine scripted with Lua.
- 2011‑09‑28:
Tizen: Meego rides again.
- 2011‑09‑28:
On the proportion of women on comedy panel shows.
- 2011‑09‑28:
Luvit = node.lua = libuv + LuaJIT = node.js with Lua instead of JavaScript.
- 2011‑09‑28:
UK ICO guidance on freedom of information legislation and research information.
- 2011‑09‑28:
Can failure really be a spur to success?
- 2011‑09‑28:
Princeton bans academics from handing copyright to journals.
- 2011‑09‑28:
How journalists willingly get stitched up by the Daily Mail.
- 2011‑09‑28:
ThunderLOLcats.
- 2011‑09‑27:
John Dee's calendar and God's longitude.
- 2011‑09‑27:
libeatmydata
- 2011‑09‑26:
The (political) science of salt.
- 2011‑09‑26:
The engineers could [telnet into] the engine management system of a 747 [and] re-tune the engine in air.
- 2011‑09‑26:
It's time to end the war on salt.
- 2011‑09‑26:
Towards network reputation: analyzing the makeup of DNSBLs.
- 2011‑09‑26:
D-Link calls typosquatting and unreliability "Advanced DNS Service".
- 2011‑09‑26:
Identifying and characterizing anycast in the domain name system.
- 2011‑09‑26:
Einar Stefferud, 1930-2011.
- 2011‑09‑26:
Timelapse video of new bridge installation at Cambridge Station.
- 2011‑09‑26:
We buy any cat!
- 2011‑09‑26:
The simhash algorithm.
- 2011‑09‑26:
A program written by Charles Babbage.
- 2011‑09‑26:
Internal economic borders of the United States derived from tracking dollar bills.
- 2011‑09‑26:
Subdivision of the world into rectangles containing equal numbers of geotagged tweets.
- 2011‑09‑26:
Structure and Interpretation of Computer Programs, reformatted for Kindle.
- 2011‑09‑26:
ITU-R recommendation TF.460-6: standard-frequency and time-signal emissions.
- 2011‑09‑26:
Lessons from PostgreSQL's Git transition.
- 2011‑09‑25:
Why you should not go to medical school.
- 2011‑09‑24:
Apple Thunderbolt display teardown.
- 2011‑09‑24:
QR code clock.
- 2011‑09‑24:
Security impact of the Rizzo/Duong CBC "BEAST" attack.
- 2011‑09‑24:
Chrome and the BEAST.
- 2011‑09‑23:
The Internet is secure enough.
- 2011‑09‑23:
"Knot" authoritative DNS server from nic.cz.
- 2011‑09‑23:
Bunnie Huang on Moore's Law and the future of open hardware.
- 2011‑09‑23:
Squeak Smalltalk.
- 2011‑09‑23:
Pharo open source SmallTalk.
- 2011‑09‑23:
Mozilla's Rust programming language.
- 2011‑09‑23:
One million concurrent TCP connections with FreeBSD and Erlang.
- 2011‑09‑23:
Why SPDY is better than HTTP.
- 2011‑09‑23:
The BEAST attack on TLS 1.0.
- 2011‑09‑23:
Swedish Film Institute is accused of piracy based on BitTorrent IP address logging.
- 2011‑09‑22:
Pipe organ desk.
- 2011‑09‑22:
TOFU POP MONK: trust on first use, persistence of pseudonym, mesh overlay network keysigning.
- 2011‑09‑22:
Perspectives: public "notary" servers monitor certificates used by websites to detect man-in-the-middle attacks without certificate authorities.
- 2011‑09‑22:
Convergence: an agile distributed secure strategy for replacing certificate authorities.
- 2011‑09‑22:
How to write unmaintainable code.
- 2011‑09‑22:
University of Cambridge lecture list web site.
- 2011‑09‑21:
Bankers: an anthropological study.
- 2011‑09‑21:
Every time you make a PowerPoint, Edward Tufte kills a kitten.
- 2011‑09‑21:
Simhash: hash-based similarity detection.
- 2011‑09‑21:
Police attempted to make Guardian reveal phone hacking whistleblowers, but were prevented by the Human Rights Act.
- 2011‑09‑21:
Google Chrome "stable" version now supports DNSSEC-chained TLS certificates.
- 2011‑09‑20:
Patent trolls caused half a trillion dollars of lost wealth in the last 20 years.
- 2011‑09‑20:
DigiNotar files for bankruptcy after being comprehensively hacked.
- 2011‑09‑20:
Mining massive datasets.
- 2011‑09‑19:
A toolkit for spotting prejudice.
- 2011‑09‑19:
"He said, she said" binary journalism fails to inform the public.
- 2011‑09‑19:
Tenzing: Google's implementation of SQL on top of MapReduce.
- 2011‑09‑19:
The plot against the NHS.
- 2011‑09‑18:
The MIT guide to lockpicking.
- 2011‑09‑17:
Opening plain text files is not safe on Windows.
- 2011‑09‑16:
Adaptve cruise control on 20% of cars greatly reduces traffic jams.
- 2011‑09‑16:
Google Plus developer site and API documentation.
- 2011‑09‑16:
Cory Doctorow on the Lib Dem IT policy paper.
- 2011‑09‑16:
Google deploys Markus Kuhn's smoothed leap seconds to avoid having to audit code for leap second bugs.
- 2011‑09‑15:
Most of you have no idea of what Martin Luther King actually did.
- 2011‑09‑15:
You are all Johann Hari.
- 2011‑09‑15:
An interview with David Graeber.
- 2011‑09‑15:
David Graeber vs the Austrian shool of economics.
- 2011‑09‑15:
Metalimericks.
- 2011‑09‑15:
Eben Upton of Raspberry Pi answers some questions.
- 2011‑09‑15:
The Internet's not-very-secret back door: government certificate authorities support man-in-the-middle attacks.
- 2011‑09‑15:
Shock news: good ISPs and effective CERT teams lead to lower malware infection rates.
- 2011‑09‑15:
Evidence is scarce that expensive classroom IT improves results.
- 2011‑09‑15:
How money developed from debt accounting.
- 2011‑09‑15:
Why we should teach our kids to code.
- 2011‑09‑14:
Wonderful book sculptures anonymously left around Edinburgh "in support of libraries, books, words, ideas".
- 2011‑09‑14:
Convergent encryption reconsidered.
- 2011‑09‑14:
On the railways being a rich man's toy.
- 2011‑09‑14:
Tubular Fells: a topological map of the Lake District.
- 2011‑09‑14:
Are there any examples of good pie charts?
- 2011‑09‑14:
The BSD pf firewall on Mac OS X 10.7 Lion.
- 2011‑09‑14:
The HDCP magic inside Bunnie's NeTV.
- 2011‑09‑13:
Hotfile sues Warner Bros. for copyright fraud and abuse.
- 2011‑09‑13:
Dead Reckonings: a blog on nomograms and advanced mental arithmetic.
- 2011‑09‑13:
COMAP: Consortium for Mathematics and Its Applications: instructional resources for innovative educators.
- 2011‑09‑13:
The lost art of nomography.
- 2011‑09‑13:
Scratch: create and share your own interactive stories, animations, games, music, and art.
- 2011‑09‑13:
Royal Society education research and policy project on computing in schools.
- 2011‑09‑13:
Computer science for fun.
- 2011‑09‑13:
Alice: teaching programming in a 3D environment.
- 2011‑09‑13:
Programming is the new literacy.
- 2011‑09‑13:
Computing at school: a BCS / grass roots support + lobbying initiative.
- 2011‑09‑13:
Things we should teach in school. (Read the comments!)
- 2011‑09‑13:
Projet Gutenberg, son fondateur Michael Hart, et un objet mythique par excellence du monde geek: le plain-texte.
- 2011‑09‑13:
Intel gives $2.5 million a year to several universities, provided they open source their work with no patents.
- 2011‑09‑13:
Golomb-coded sets: smaller than Bloom filters.
- 2011‑09‑13:
Ferguson Ariva 120 Combo digital TV receiver review.
- 2011‑09‑12:
Global navigation space systems: reliance and vulnerabilities.
- 2011‑09‑12:
Nerdy day trips.
- 2011‑09‑12:
Copyright: you'd better swatch what you say.
- 2011‑09‑12:
European copyright term extension is a cultural disaster.
- 2011‑09‑12:
List of musical works with unusual time signatures.
- 2011‑09‑12:
Big Trak. "Retro and cool."
- 2011‑09‑12:
Programming doesn't fit into the primary school curriculum.
- 2011‑09‑12:
Teach our children to code.
- 2011‑09‑12:
Lua metatables are "hard".
- 2011‑09‑11:
Some ways in which the film industry is evil.
- 2011‑09‑11:
The fall and fall of Scottish Conservatism.
- 2011‑09‑11:
The great prosperity, 1947-1970 / the great regression, 1970-now.
- 2011‑09‑10:
Some papers every programmer should read.
- 2011‑09‑10:
Fundamental concepts in programming languages. (Christopher Strachey, 1967)
- 2011‑09‑09:
Helpful uranium-munching bacteria breath it through conducting nanowires.
- 2011‑09‑08:
Why are black boxes so hard to re-use? Towards a new model of abstraction in software engineering.
- 2011‑09‑08:
Which TLDs are most abused to support online criminal activity.
- 2011‑09‑08:
Git is simpler than you think.
- 2011‑09‑08:
How Google App Engine price changes are affecting the architecture of the hosted apps.
- 2011‑09‑08:
JSTOR now provides free access to old out-of-copyright papers.
- 2011‑09‑08:
Old papers from Philosophical Transactions of the Royal Society liberated from the paywall.
- 2011‑09‑08:
Über die Stabilität von Oszillatoren und Frequenznormalen.
- 2011‑09‑08:
Some similarities between Golang and Lua.
- 2011‑09‑08:
Digital archeology with drive-independent data recovery: recovering Cray 1 software from a big old drive infested with wasps.
- 2011‑09‑08:
What is the bandwidth of the IETF document publication process, in millibits/second?
- 2011‑09‑08:
From sundials to atomic clocks.
- 2011‑09‑07:
Shake to undo, for Mac OS X.
- 2011‑09‑07:
Why can't PC manufacturers compete with the MacBook Air?
- 2011‑09‑07:
What happens to your patent litigation after you shaft the inventors.
- 2011‑09‑06:
The future of light is the LED.
- 2011‑09‑06:
Please fix the dire cycle parking shortage at Cambridge Station.
- 2011‑09‑06:
Jari Arkko's home network.
- 2011‑09‑05:
Plan to revive the only UK built and launched satellite for its 40th birthday.
- 2011‑09‑05:
The Great Bank Robbery - Nassim Nicholas Taleb and Mark Spitznagel.
- 2011‑09‑05:
Small memory software: patterns for systems with limited storage.
- 2011‑09‑05:
Stupid in America.
- 2011‑09‑05:
A first look at the literacy of America's adults in the 21st century.
- 2011‑09‑05:
Mobile Web: Taiwan, Opera and WebOS.
- 2011‑09‑05:
Lessons learned from giving bug bounties.
- 2011‑09‑05:
Karl Marx may have been wrong about communism but he was right about much of capitalism.
- 2011‑09‑05:
Publish or perish: peer review and the corruption of science.
- 2011‑09‑05:
Achron: Starcraft with time travel.
- 2011‑09‑05:
Professor Moriarty elected Drapers Professor of French in the University of Cambridge with effect from 1 September 2011.
- 2011‑09‑05:
Open Science, Freedom of Information, and the big journal monopoly.
- 2011‑09‑05:
GOVCERT.nl factsheet on DigiNotar X.509 CA disaster.
- 2011‑09‑05:
The Pearl: erotica printed for the Society of Vice, 1880.
- 2011‑09‑05:
Feature branches vs. continuous integration.
- 2011‑09‑05:
Torvalds puts his Linux tree on GitHub to work around the kernel.org downtime.
- 2011‑09‑05:
The costs of open source development in isolation and collaboration.
- 2011‑09‑04:
Stop using unsafe keyed hashes: use HMAC.
- 2011‑09‑04:
More on the extent of the damage done by the DigiNotar X.509 CA.
- 2011‑09‑04:
A cultural perspective on gender diversity in computing.
- 2011‑09‑04:
Seriously: stop with the booth babes!
- 2011‑09‑04:
The true cost of 9/11.
- 2011‑09‑04:
Reflections of a Republican Party operative who left the cult.
- 2011‑09‑04:
BBC Radio 4: fighting the power of pink.
- 2011‑09‑04:
How Western Governors University is disrupting education.
- 2011‑09‑03:
What happens when disabled people ask for accessible web sites.
- 2011‑09‑03:
Rob Pike: the good, the bad, and the ugly, of 1e9 seconds of Unix.
- 2011‑09‑03:
No-one trusts DigiNotar now.
- 2011‑09‑02:
Protothreads: a minor improvement to Simon Tatham's C coroutine trick.
- 2011‑09‑02:
CS unplugged: computer science without a computer.
- 2011‑09‑02:
Average speed of Cambridgeshire guided bus is 12mph.
- 2011‑09‑02:
Intel's new "Bull Mountain" hardware random number generator.
- 2011‑09‑02:
Our children are mostly getting training in Microsoft Office rather than ICT education.
- 2011‑09‑02:
Doorstep "charity" clothes collection bags are a scam.
- 2011‑09‑01:
Unofficial Lua FAQ.
- 2011‑09‑01:
No, git does not magically make the kernel.org compromise harmless.
- 2011‑09‑01:
Sodastream kicked out of Swedish Co-op shops owing to factory in occupied West Bank.
- 2011‑09‑01:
Skeptics in the Pub: contacts, links and resources.
- 2011‑09‑01:
Low-overhead breakpoints for Lua.
- 2011‑09‑01:
Using git to work on the FreeBSD source code.
- 2011‑09‑01:
DigiNotar breach: the story so far.
- 2011‑09‑01:
The Carlton Arms new website.
- 2011‑09‑01:
Well, that about wraps it up for SCO.
- 2011‑09‑01:
Charlie Stross reinvents zombies.
- 2011‑08‑31:
Adrian Cockcroft of NetFlix is looking for AWS competitors, and OpenStack isn't up to it.
- 2011‑08‑31:
"We have to monetize more of what ordinary people do, or we make them into wards of the state" - Jaron Lanier.
- 2011‑08‑31:
What shapes do dice have?
- 2011‑08‑31:
With 95% probability, the Higgs boson does not exist within the energies the LHC has explored.
- 2011‑08‑31:
Bit-squatting: DNS hijacking using random bit-flip errors.
- 2011‑08‑31:
It is not clear that IPv6 will secure sufficient following to attain market viability. (John Curran, 1994)
- 2011‑08‑31:
Intel's plans to keep Moore's law going.
- 2011‑08‑31:
Flickr: automatic privacy settings based on photo locations.
- 2011‑08‑31:
That coloured road surface isn't a bike lane, it's a door zone.
- 2011‑08‑31:
Britain should be proud of the Human Rights Act - and protect it.
- 2011‑08‑31:
To kill a mocking name.
- 2011‑08‑30:
Facebook improves privacy controls.
- 2011‑08‑30:
FixMyTransport: report, view, and resolve public transport problems.
- 2011‑08‑30:
IETF very strongly urges Google and OpenDNS to follow the EDNS0 option code allocation procedure.
- 2011‑08‑30:
UK government supports copyright term extension despite the recommendation of the Hargreaves report.
- 2011‑08‑30:
The world time system.
- 2011‑08‑30:
Tony Sale, computer conservationist at Bletchley Park, has died.
- 2011‑08‑30:
OpenDNS and Google public DNS deploy workaround to fix CDN geo-IP pessimization.
- 2011‑08‑30:
Vasco press release on the hacking of their subsidiary X.509 CA DigiNotar.
- 2011‑08‑30:
"Cat women of the moon": Radio 4 programme on science fiction and relationships between the sexes.
- 2011‑08‑30:
Academic publishers make Murdoch look like a socialist.
- 2011‑08‑30:
DigiNotar X.509 CA portal hacked by Iranians years ago?
- 2011‑08‑30:
Mr.Hermes: simple Python debug/test SMTP server.
- 2011‑08‑30:
"High Table, Lower Orders": Cambridge comedy murder mystery currently on Radio 4 Extra.
- 2011‑08‑30:
Data mining the Science Museum catalogue: "inordinately fond of bottles".
- 2011‑08‑30:
Google and Mozilla revoke trust in a CA that issued a GMail man-in-the-middle cert.
- 2011‑08‑30:
Not Tetris 2 - Tetris with physics.
- 2011‑08‑30:
Microsoft fails at data-driven UI design.
- 2011‑08‑30:
The case for a free market in IPv4 addresses.
- 2011‑08‑30:
Trading IPv4 addresses will end in tears.
- 2011‑08‑29:
The Daily Mail's repeated deliberate photo copyright infringement.
- 2011‑08‑27:
Pacific Northwest superquake and megatsunami.
- 2011‑08‑27:
Schiehallion experiment to measure the density of the Earth.
- 2011‑08‑27:
From System F to typed assembly language.
- 2011‑08‑27:
ichbins: a self-hosting Lisp-to-C compiler in 6 pages of code.
- 2011‑08‑27:
Bootstrapping a metacircular PEG-to-JavaScript parser generator.
- 2011‑08‑27:
An incremental approach to compiler construction.
- 2011‑08‑27:
Stories about the B5000 and the people who were there.
- 2011‑08‑27:
Want to write a compiler? Just read these two papers.
- 2011‑08‑26:
Ellen Ripley saved my life.
- 2011‑08‑26:
How media clearly reflects the sexism and the racism we cannot see in ourselves.
- 2011‑08‑26:
UK's atomic clock is world's most accurate.
- 2011‑08‑26:
Corrections and clarifications on Iceland.
- 2011‑08‑26:
Why Iceland should be in the news, but is not.
- 2011‑08‑26:
Hints for computer system design from Butler Lampson.
- 2011‑08‑26:
Papers every computer scientist should read.
- 2011‑08‑26:
Tomasulo's algorithm for out-of-order instruction scheduling.
- 2011‑08‑26:
Out of the tar pit: minimizing complexity.
- 2011‑08‑26:
What would it be like walking around on a cube-shaped planet?
- 2011‑08‑26:
The Annotated Turing by Charles Petzold.
- 2011‑08‑26:
"Climategate" was a fake scandal.
- 2011‑08‑26:
Peter Norvig on Christopher Strachey's checkers program from Scientific American, Sept. 1966.
- 2011‑08‑26:
King's Cross Station redevelopment.
- 2011‑08‑26:
Paddington Station refurbishment.
- 2011‑08‑25:
Capanography helps emergency services know when not to give up CPR, even after 96 minutes.
- 2011‑08‑25:
Students don't know how to find information in libraries or online.
- 2011‑08‑25:
List of scientific equations named after people.
- 2011‑08‑25:
Google+: too much unnecessary drama.
- 2011‑08‑25:
NewsBlur online feed reader.
- 2011‑08‑25:
It's easy to steal PINs from cash machines using a thermal camera.
- 2011‑08‑25:
Where is Physics Barbie?
- 2011‑08‑25:
Free version of ISO 32000-1 PDF specification from Adobe, with the official ISO boilerplate filed off.
- 2011‑08‑24:
Intel product rosetta stone.
- 2011‑08‑24:
The financial industry has become a threat to the global economy again.
- 2011‑08‑24:
The 1922 New York straw hat riot.
- 2011‑08‑24:
Paul Krugman on Google+, or not.
- 2011‑08‑24:
The amazing disappearing BSD licence!
- 2011‑08‑24:
Org mode: an Emacs extension for notes, project planning, and authoring.
- 2011‑08‑24:
TiddlyWiki: a serverless wiki.
- 2011‑08‑24:
Operating system popularity statistics on Windows XP's tenth birthday.
- 2011‑08‑24:
List of enclaves and exclaves.
- 2011‑08‑23:
"OK Go and the Muppets? That sounds pretty exciting!" "Nah, let's watch cat videos."
- 2011‑08‑23:
Rob Pike says "don't write lexers and parsers with regular expressions".
- 2011‑08‑23:
Bretton Woods and the gold standard vs. floating exchange rates and paper money.
- 2011‑08‑23:
How to transport 211 tonnes of gold from London to Caracas?
- 2011‑08‑23:
The Register on BlueGene/Q.
- 2011‑08‑23:
BlueGene/Q includes hardware support for transactional memory.
- 2011‑08‑23:
Sales of non-iPad tablets vs. obscure game consoles.
- 2011‑08‑23:
Chinese military reveals a cyber-warfare tool on TV.
- 2011‑08‑23:
Ericsson's Computer Science lab: the first ten years.
- 2011‑08‑23:
luatrace: tracing, profiling and coverage for Lua.
- 2011‑08‑23:
Charlie Stross is not on Google Plus.
- 2011‑08‑22:
Reflections on diglossia.
- 2011‑08‑22:
The discovery of an underlying disease process for all types of ALS.
- 2011‑08‑22:
BHyVe: KVM-style hypervisor for FreeBSD.
- 2011‑08‑22:
European unitary patents could bring unlimited software patents over here.
- 2011‑08‑22:
Software patents: foolish business (says the Guardian).
- 2011‑08‑22:
Cherry Box Pizza: interesting toppings in Cambridge.
- 2011‑08‑22:
Vodka nation.
- 2011‑08‑22:
Peudonymity, privacy and responsibility on Google+.
- 2011‑08‑22:
Met Office building in Exeter - spot the supercomputer hall.
- 2011‑08‑22:
Smileua: an alternative syntax for Lua inspired by MoonScript.
- 2011‑08‑22:
Arabic language history.
- 2011‑08‑22:
Arabic is terrific.
- 2011‑08‑20:
Threads without locks - the Plan 9 / Golang approach to concurrency.
- 2011‑08‑20:
DNSSEC and trust agility. (Doesn't realise that hierarchial trust protects against foreign bad actors.)
- 2011‑08‑20:
$1 billion that nobody wants.
- 2011‑08‑20:
66 metre sundial / cable stay bridge in Redding, California.
- 2011‑08‑20:
Google+ must stop this identity theatre.
- 2011‑08‑20:
13yo designs solar panel mount using the Fibonacci sequence in trees.
- 2011‑08‑20:
Jamie Zawinsky on the nym wars.
- 2011‑08‑19:
A ban on programming language module imports.
- 2011‑08‑19:
How personal names differ around the world.
- 2011‑08‑19:
London Tube map with distance grid.
- 2011‑08‑19:
A more geographical version of the London Tube map.
- 2011‑08‑19:
Apple doesn't do concept products.
- 2011‑08‑18:
David May, creator of the transputer.
- 2011‑08‑18:
Writing a macro processor for Erlang.
- 2011‑08‑18:
How web browsers work.
- 2011‑08‑18:
$80 Huawei Android phone sells like hotcakes in Kenya.
- 2011‑08‑18:
Pigeons are better at the Monty Hall problem than people.
- 2011‑08‑17:
Redefining the SI units based on fixed values of fundamental constants.
- 2011‑08‑17:
An extended comparative study of language support for generic programming.
- 2011‑08‑17:
Termination combinators forever.
- 2011‑08‑17:
The Kitchen Sink DNS resource record type.
- 2011‑08‑17:
Judge Andrew Gilbart QC sentencing remarks on the Manchester riots.
- 2011‑08‑17:
A comparison of C++ "concepts" and Haskell type classes.
- 2011‑08‑17:
AKS primality test.
- 2011‑08‑17:
SpaceX to fly to ISS in November.
- 2011‑08‑17:
Vinay Deolalikar's claimed proof of P!=NP, one year later.
- 2011‑08‑16:
Secure dynamic DNS update howto.
- 2011‑08‑16:
Standard-ish secure dynamic DNS updates with Mac OS X, wide-area Bonjour and DNS service discovery.
- 2011‑08‑16:
Experiences porting KVM to SmartOS.
- 2011‑08‑16:
Joyent SmartOS.
- 2011‑08‑16:
Pandoc: a universal document converter.
- 2011‑08‑16:
Goodbye, cruel Word.
- 2011‑08‑16:
IBM pulls the plug on high performance computer systems research.
- 2011‑08‑16:
False confessions are easy to extract.
- 2011‑08‑16:
Building with Legos: immutable virtual servers.
- 2011‑08‑16:
Dark matter may be an illusion caused by gravitational polarization of the quantum vacuum.
- 2011‑08‑16:
How the head of Fox News is making Americans more right-wing, ignorant, and terrified.
- 2011‑08‑15:
The Black Blood of the Earth - triple cold-extraction coffee.
- 2011‑08‑15:
Design Patterns in Dynamic Languages.
- 2011‑08‑15:
The sunny side of smut.
- 2011‑08‑15:
How to create a sparsebundle without relying on Time Machine.
- 2011‑08‑15:
Time Machine - backing up to a locally-connected sparsebundle.
- 2011‑08‑15:
Apple's sleek new Fifth Avenue glass cube.
- 2011‑08‑15:
Evil traffic interception by US ISPs.
- 2011‑08‑15:
I'm sorry, but were you actually trying to remember your passwords?
- 2011‑08‑15:
The ethics of artificial intelligence.
- 2011‑08‑15:
Automated testing on iOS and Android.
- 2011‑08‑15:
Perlis languages.
- 2011‑08‑14:
The shapes of CSS.
- 2011‑08‑13:
Google finds 80 Flash exploit in four weeks using large scale fuzzing.
- 2011‑08‑13:
How to create an account on a Mac when you don't know its passwords.
- 2011‑08‑13:
AeroFS: file sync without servers.
- 2011‑08‑13:
How to put your logo into a QR code.
- 2011‑08‑12:
Research is in crisis and young scientists are suffering.
- 2011‑08‑12:
Independent police monitor beaten up in back of police van, while monitoring policing of riots.
- 2011‑08‑12:
Petition for no homeopathy on the NHS.
- 2011‑08‑12:
Design patterns are a sign of missing language features.
- 2011‑08‑12:
Armed Response Technologies, home of the DeathStation 9000.
- 2011‑08‑12:
An enlightened social contract is not built on subsidies or "handouts" - whether to the impoverished or to bankers.
- 2011‑08‑12:
What if Bertie Wooster, rather than being a mere layabout, was also Batman?
- 2011‑08‑12:
DragonFly Mail Agent - a small and secure MTA for edge systems.
- 2011‑08‑12:
Mac OS X Lion recovery disk assistant.
- 2011‑08‑12:
Death to the 'noreply' mailbox.
- 2011‑08‑12:
Hooking up a VT220 to a Mac.
- 2011‑08‑12:
LSI launches MegaRAID CacheCade Pro 2.0 SSD caching software.
- 2011‑08‑12:
Do not leave concentrated nitric acid unattended.
- 2011‑08‑12:
Charging and convicting rioters is not a simple matter.
- 2011‑08‑12:
Riot against moral relativism.
- 2011‑08‑12:
Patent-infringement lawsuit against Fark settled for zero dollars, sans NDA.
- 2011‑08‑11:
The patent system is broken, not us.
- 2011‑08‑11:
How terrorism laws brought back 1980s riots.
- 2011‑08‑11:
How BlackBerry BBM fed the riots.
- 2011‑08‑11:
How nice it is to change someone's mind on the Internet :-)
- 2011‑08‑11:
Deep structural problems lie beneath the London riots.
- 2011‑08‑11:
Reducing redundant RETURN opcodes in Lua.
- 2011‑08‑11:
Some fun C tricks and tips.
- 2011‑08‑11:
Graphs of rent prices in Cambridge used to set the Local Housing Allowance.
- 2011‑08‑11:
The eyesore on I-4.
- 2011‑08‑11:
The economic consequences of Gordon Brown.
- 2011‑08‑11:
Weapons of Lua.
- 2011‑08‑11:
Moonscript: an alternate syntax for Lua inspired by CoffeeScript.
- 2011‑08‑11:
The strange propaganda of the now-famous riot cleanup broom bic.
- 2011‑08‑11:
CAPTCHAs to keep idiots out of comment threads.
- 2011‑08‑10:
The GOES time code service, 1974-2004.
- 2011‑08‑10:
Metrologia special issue on modern applications of timescales.
- 2011‑08‑10:
What happens to the 13 to 20% of kids who walk away from school with no qualifications?
- 2011‑08‑10:
Google's list of bad words.
- 2011‑08‑10:
Index of multiple deprivation / riots map mashup.
- 2011‑08‑10:
"Self-pitying scumbags" - Tony Parsons on the rioters.
- 2011‑08‑10:
How have Europeans grown so tall?
- 2011‑08‑09:
Philips LED bulb tear-down.
- 2011‑08‑09:
How bad is News Corporation?!
- 2011‑08‑09:
Gamification is marketing bullshit.
- 2011‑08‑09:
Mac OS X Lion for unix hackers.
- 2011‑08‑09:
RetroBSD is a port of 2.11BSD Unix to Microchip PIC32 embedded MIPS systems.
- 2011‑08‑09:
An experiment with the Google+ profile abuse handling process.
- 2011‑08‑09:
Google employees whose G+ names violate their policy.
- 2011‑08‑09:
Policing riots: stand and watch or get stuck in?
- 2011‑08‑08:
The obfuscated vote counting competition.
- 2011‑08‑08:
Chuck out that tough Aussie bloke stereotype and bring back the laid-back Aussies.
- 2011‑08‑08:
Warren's Abstract Machine for Prolog: a tutorial reconstruction.
- 2011‑08‑07:
Enthusiasm to learn and marking school work.
- 2011‑08‑07:
Dan Carlin podcast on the death throes of the Roman Republic.
- 2011‑08‑07:
An explanation of Microsoft's anti-Google patent FUD.
- 2011‑08‑07:
"My name is me: your freedom to choose the name you use online.
- 2011‑08‑06:
The Economist on the moon - ultimate headline winnage.
- 2011‑08‑06:
In search of stupidity.
- 2011‑08‑06:
Realize that fold is nothing but replacing each n-ary constructor of an algebraic data type with an n-ary function.
- 2011‑08‑06:
Real name policies are an authoritarian assertion of power over vulnerable people.
- 2011‑08‑06:
Google IPv6 adoption statistics.
- 2011‑08‑06:
Lion, IPv6, happy eyeballs.
- 2011‑08‑06:
You can steal my ideas but I'm still the best person to carry them out.
- 2011‑08‑06:
Vince Cable anti-Murdoch leakers were bribed by News International.
- 2011‑08‑05:
"Phlebomania Hancocksia": prevalence of a previously undescribed psychomotor disturbance.
- 2011‑08‑05:
Google+ names policy explained.
- 2011‑08‑05:
Craig Murray was right about the UK's pro-torture policy.
- 2011‑08‑05:
Coalition cock-up or conspiracy?
- 2011‑08‑05:
This is an article about a statistic.
- 2011‑08‑05:
cython-ifdef: basic preprocessor support for cython using unifdef.
- 2011‑08‑05:
In love with Sheffield's architecture.
- 2011‑08‑04:
Another big miscarriage of justice.
- 2011‑08‑04:
What interests Google associates with your ads cookie.
- 2011‑08‑03:
When patents attack Android.
- 2011‑08‑03:
Charles' Rules of Argument.
- 2011‑08‑03:
Student journalists try producing a paper using 1980s tech.
- 2011‑08‑03:
The US legislation that could kill Internet privacy.
- 2011‑08‑03:
The mother of all interview questions.
- 2011‑08‑03:
The C2I2 hypothesis: customers vs. collaborators; implementations vs. inventions.
- 2011‑08‑03:
ViTunes: control iTunes from vim.
- 2011‑08‑03:
Standard LEDs can make a 800Mbps wireless network.
- 2011‑08‑03:
The myth of the sole inventor.
- 2011‑08‑03:
The Exonomist says America's intellectual-property system is a travesty which threatens the wealth and welfare of the whole world.
- 2011‑08‑02:
Efficient and practical distributed currency.
- 2011‑08‑02:
Liberty / Justice femslash.
- 2011‑08‑02:
Beware of Greeks bearing bonds.
- 2011‑08‑02:
The little manual of API design.
- 2011‑08‑02:
They could have had the moon but instead they got Afghanistan.
- 2011‑08‑02:
Your shoes make you walk wrong.
- 2011‑08‑02:
Moore's law hits a snag with power budgets.
- 2011‑08‑02:
Venture capital has stopped funding the future.
- 2011‑08‑02:
How fake money saved Brazil.
- 2011‑08‑02:
Oslo: Reflections on U.S. and Norwegian reactions.
- 2011‑08‑01:
Playgrounds can be too safe.
- 2011‑08‑01:
The Left might actually be right.
- 2011‑08‑01:
Everyone plays Monopoly wrong.
- 2011‑08‑01:
How Bush and Obama have affected US debt.
- 2011‑08‑01:
Time does not exist.
- 2011‑08‑01:
How not to do conference wifi.
- 2011‑08‑01:
Skud's survey of suspended Google+ accounts.
- 2011‑08‑01:
Freedom of the press implies that if you don't own the press, you don't get the freedom.
- 2011‑08‑01:
Test your vocabulary.
- 2011‑08‑01:
False Witnesses 2.
- 2011‑08‑01:
False witnesses, malicious liars.
- 2011‑08‑01:
God hates German words.
- 2011‑07‑31:
American patent reform may strengthen patent trolls.
- 2011‑07‑31:
Forbes says the US Supreme Court should invalidate software patents.
- 2011‑07‑30:
The secret ingredient flavouring your orange juice.
- 2011‑07‑30:
IPv6 brokenness problems are being fixed.
- 2011‑07‑28:
Moom: grid-based window positioning for Mac OS.
- 2011‑07‑25:
More people caught out by proliferation of US federal offenses.
- 2011‑07‑22:
Enable TRIM support for all SSDs in OS X Lion by editing a kext binary.
- 2011‑07‑22:
PowerDNS authoritative server 3.0 released - now with DNSSEC support.
- 2011‑07‑22:
ClojureScript is a dialect of Clojure that targets JavaScript as a deployment platform.
- 2011‑07‑21:
Nokia takes a nosedive. "Osborne Effect" henceforth known as "Elop Effect".
- 2011‑07‑21:
The Columbia Journalism Review summarizes the criminal activities of News Corporation.
- 2011‑07‑21:
Aaron Swartz's reckless open access activism.
- 2011‑07‑21:
Nominet DNSSEC signing service.
- 2011‑07‑21:
Open Cambridge - see inside places that are usually closed - Sep. 9-11.
- 2011‑07‑19:
Mork keeps on giving: When the database worms eat into your murder trial.
- 2011‑07‑19:
The reasoning behind changing daylight saving time in North America in 2007.
- 2011‑07‑18:
Connie Willis may be the worst writer in existence.
- 2011‑07‑18:
Fox News claims the News of the World was a VICTIM of phone hacking.
- 2011‑07‑18:
Paul Krugman on the insanity of the Republican Party.
- 2011‑07‑18:
How the Guardian broke the Murdoch scandal.
- 2011‑07‑18:
Why aren't the earliest sunset and latest sunrise on the same day as the winter solstice?
- 2011‑07‑18:
Higher-order Venn diagrams.
- 2011‑07‑17:
A literary appreciation of the Olson TZ database.
- 2011‑07‑16:
How Ethernet grew from 3Mbps to 100Gbps.
- 2011‑07‑16:
How Stuxnet was revealed to be a sophisticated cyberweapon.
- 2011‑07‑16:
The algebra of data, and the calculus of mutation.
- 2011‑07‑16:
Is there anything good about men?
- 2011‑07‑15:
The rise and fall of the independent software developer.
- 2011‑07‑15:
Small businesses sued after MacroSolve gets a patent covering HTML forms.
- 2011‑07‑13:
For the first time ever, the government publishes its consolidated accounts.
- 2011‑07‑13:
"Rupert Murdoch has done more to harm journalism in America and Britain than any other person." - Roger Ebert.
- 2011‑07‑13:
Floppy disks: it's too late.
- 2011‑07‑13:
A major improvement to BIND 9 startup performance with lots of zones.
- 2011‑07‑13:
TIME's Lev Grossman on fan fiction culture.
- 2011‑07‑13:
How the Metropolitan Police tries to cover up their mistakes with lies and corruption.
- 2011‑07‑13:
How New Corporation blackmailed a Fox Sports anchorman over his health.
- 2011‑07‑13:
Csmith is a compiler testing tool that generates random C programs which conform to the standard.
- 2011‑07‑13:
Rapid DHCP: Or, how do Macs get on the network so fast?
- 2011‑07‑13:
The fanless spinning heatsink: more efficient and immune to dust.
- 2011‑07‑12:
How News Corporation gets massive tax refunds from the US government.
- 2011‑07‑12:
Edward Tufte's slopegraphs.
- 2011‑07‑12:
Women in national parliaments.
- 2011‑07‑12:
Garbage collection is fast, but a stack is faster.
- 2011‑07‑12:
A library of high-level control operators based on continuations.
- 2011‑07‑12:
A retrospective on region-based memory management.
- 2011‑07‑11:
A reply to criticisms of the Knight and Leveson N-version programming experiment.
- 2011‑07‑11:
NSA SIGINT style guide.
- 2011‑07‑11:
This scandal goes to the heart of the way this country has been run, under both parties, for decades.
- 2011‑07‑11:
Analysis of increased query load on root name servers.
- 2011‑07‑11:
NY Times on the corruption and criminality of News International.
- 2011‑07‑11:
Royal Society event discussing UTC for the 21st century.
- 2011‑07‑11:
The Mine! project: open source online data and relationships logistics.
- 2011‑07‑08:
IERS surveys opinion on the possible redefinition of UTC.
- 2011‑07‑08:
Advanced Lawnmower Simulator. (almost as good as the Sinclair version)
- 2011‑07‑08:
Research on innovation by James Bessen et al.
- 2011‑07‑08:
A generation of software patents.
- 2011‑07‑08:
SURFnet on deploying DNSSEC validation on recursive nameservers.
- 2011‑07‑08:
Code in academic papers.
- 2011‑07‑08:
Nature: why scientific programming does not compute.
- 2011‑07‑08:
Microsoft's Android shakedown.
- 2011‑07‑07:
How mobile phone voicemail hacking worked.
- 2011‑07‑07:
IRA vs. al Qaeda.
- 2011‑07‑07:
The machine to build the machines. (NeXT promo video from 20 years ago.)
- 2011‑07‑07:
Revolution, hacktivism, lulz, and memes.
- 2011‑07‑06:
Brewing gluten-free strawberry beer with animated GIFs.
- 2011‑07‑06:
Dear photograph.
- 2011‑07‑06:
Google to retire Blogger and Picasa in favour of Google+.
- 2011‑07‑05:
Have cities in the developed world reached peak car use?
- 2011‑07‑05:
The (Deutsch)-Schorr-Waite graph marking algorithm, developed with style.
- 2011‑07‑05:
Police bail in the dock.
- 2011‑07‑05:
Sheryl Sandberg, Facebook's COO.
- 2011‑07‑05:
High speed rail in China.
- 2011‑07‑05:
Who holds Greek debt.
- 2011‑07‑05:
Once Greece goes...
- 2011‑07‑05:
A funny little calculus textbook.
- 2011‑07‑05:
Babbage - the language of the future.
- 2011‑07‑05:
Fukushima cover-up unravels.
- 2011‑07‑04:
Dutch beer glass sundial.
- 2011‑07‑04:
A beer glass with a built-in sundial.
- 2011‑07‑04:
Homophobic primary school stops community opera at last minute.
- 2011‑07‑02:
Decentralised currencies are probably impossible, but let's at least make them efficient.
- 2011‑07‑01:
How to safely store a password.
- 2011‑07‑01:
fexl: function expression language based on combinators.
- 2011‑07‑01:
Why do game developers prefer Windows? Direct3D vs OpenGL.
- 2011‑07‑01:
Hacker News discusses broadband competition.
- 2011‑06‑30:
Why Europe has fast cheap broadband, but America has arguments about net neutrality.
- 2011‑06‑30:
I like the buttery biscuit bass.
- 2011‑06‑30:
Jellyfish: networking data centres randomly.
- 2011‑06‑30:
Norvig vs. Chomsky and the fight for the future of AI.
- 2011‑06‑30:
No-nose bicycle saddles are better for you.
- 2011‑06‑30:
The technology inside Apple's $50 Thunderbolt cable.
- 2011‑06‑30:
Chip-scale atomic clock GPS-disciplined oscillator.
- 2011‑06‑30:
dotjs - Google Chrome plugin for easily adding your own JavaScript to web pages.
- 2011‑06‑30:
Programming in Clojure for beginners.
- 2011‑06‑29:
Root DNS server load up by factor of four in last 24 hours.
- 2011‑06‑29:
Why Programming Languages?
- 2011‑06‑28:
Designing GitHub for Mac.
- 2011‑06‑28:
How a code editor can indicate nesting level without indentation.
- 2011‑06‑28:
Cambridge's Richardson Candle street lights have been listed for preservation.
- 2011‑06‑28:
TCP Hybla: a transmission scheme for long RTT wireless networks.
- 2011‑06‑28:
Petition to ignore the EDL march in Cambridge.
- 2011‑06‑28:
How to make a clock run for 10,000 years.
- 2011‑06‑28:
Using Yubikey with Fastmail.
- 2011‑06‑28:
Inexpensive OATH OTP tokens.
- 2011‑06‑28:
Duo Security: two factor authentication made easy.
- 2011‑06‑28:
TCP over 2.5G and 3G wireless networks.
- 2011‑06‑28:
Why mobile networking sucks: bufferbloat and TCP over 3G.
- 2011‑06‑28:
American Scientist article on the future of UTC by pro-leap-second astronomers.
- 2011‑06‑28:
Update on revised spec for UTC and leap seconds.
- 2011‑06‑27:
JavaScript is dead. Long live JavaScript!
- 2011‑06‑26:
10,000 year clock.
- 2011‑06‑26:
The road to gay marriage in New York.
- 2011‑06‑26:
Lua 5.2 reference manual, annotated with changes from 5.1.
- 2011‑06‑25:
Cross-browser non-ASCII download file names.
- 2011‑06‑24:
Institute for the Future predicts effects of IT in 1982: right effects, wrong tech.
- 2011‑06‑24:
Kind of Screwed: fair use in action.
- 2011‑06‑24:
Top 10 most sinister PSYOPS mission patches.
- 2011‑06‑23:
Lytro light-field camera will take photos that can be refocussed during post-processing.
- 2011‑06‑23:
Graphics programming black book, by Michael Abrash.
- 2011‑06‑23:
Rateless codes and big downloads: a peer-to-peer system based on linear-time rateless erasure codes.
- 2011‑06‑23:
Digital fountain codes for forward error correction.
- 2011‑06‑23:
GitX (L): a fork of GitX.
- 2011‑06‑23:
GitX: a git GUI for Mac OS X.
- 2011‑06‑23:
Offline GitHub for Mac.
- 2011‑06‑23:
Leap-of-faith trust aka TOFU/POP for https.
- 2011‑06‑23:
Health and safety has little to do with timid risk aversion.
- 2011‑06‑23:
Tube Map in German.
- 2011‑06‑23:
Georgia's new anti-immigration law causes a farm labour crisis.
- 2011‑06‑22:
Fighting for the public domain in front of the Supreme Court of the United States.
- 2011‑06‑22:
Yahoo!s list of things to do to speed up your web site.
- 2011‑06‑21:
How Google notifies you of "search customization".
- 2011‑06‑21:
Escape your search engine Filter Bubble!
- 2011‑06‑21:
Broken Koans and other Zen debris.
- 2011‑06‑21:
Zen Koans.
- 2011‑06‑21:
Facing up to insolvent infrastructure and debt-ridden services.
- 2011‑06‑18:
jsmad: pure JavaScript mp3 decoder.
- 2011‑06‑17:
DNSSEC authenticated HTTPS in Google Chrome.
- 2011‑06‑17:
How magnets work.
- 2011‑06‑17:
Why you might say to MySQL, "I am a dummy."
- 2011‑06‑17:
DNSvis diagram of DNSSEC trust and delegation chains for dotat.at.
- 2011‑06‑16:
ORM is an anti-pattern.
- 2011‑06‑16:
Designing good multiple-choice questions.
- 2011‑06‑15:
The sleepsort algorithm: an O(n) sort implemented in bash.
- 2011‑06‑15:
Samuel L Jackson reads a bedtime story: "go the fuck to sleep".
- 2011‑06‑15:
An abridged history of the Internet.
- 2011‑06‑15:
Are auto-login links in email a good idea?
- 2011‑06‑14:
The Gosu programming l.anguage
- 2011‑06‑14:
Scala: static checking that feels dynamic.
- 2011‑06‑14:
Matt Groening's promo cartoons for Apple.
- 2011‑06‑14:
Reverse DNS considerations for IPv6.
- 2011‑06‑14:
Common scenarios in which Exchange may lose or confuse calendar data.
- 2011‑06‑14:
Python idioms and efficiency.
- 2011‑06‑14:
How to write a spelling corrector.
- 2011‑06‑13:
Andy Baio interviews the creator of telehack.
- 2011‑06‑13:
How to increase procurement costs: use economies of scale rather than competition.
- 2011‑06‑13:
What is "loatheware"?
- 2011‑06‑13:
Terry Pratchett starts the process to take his own life.
- 2011‑06‑13:
Pink stinks: a campaign to challenge the culture of pink which invades every aspect of girls' lives.
- 2011‑06‑13:
6rd: IPv6 rapid deployment.
- 2011‑06‑13:
Cisco on their success with IPv6 in France.
- 2011‑06‑13:
From dust to edge: making a blade starting from ore.
- 2011‑06‑13:
The Reduceron: high-level symbolic computing on an FPGA.
- 2011‑06‑10:
A Haskell combinator library for the design of full-size railway track layouts.
- 2011‑06‑10:
Patients are not consumers.
- 2011‑06‑10:
90 gaffes from Prince Philip in the Mirror.
- 2011‑06‑10:
90 gaffes from Prince Philip in the Independent.
- 2011‑06‑10:
Internet access in th USA is a disaster.
- 2011‑06‑10:
Normalize CSS: an alternative to CSS resets.
- 2011‑06‑09:
Wait, what does your startup do?
- 2011‑06‑09:
Bacon Ipsum.
- 2011‑06‑08:
DENIC says .de has the most 2LDs signed with DNSSEC.
- 2011‑06‑08:
Two stage filtering for email over IPv6.
- 2011‑06‑08:
The Radio 4 Today Programme's fighty interviews are boring and poisonous.
- 2011‑06‑08:
Oxford Electric Bell: a scientific instrument running for 170 years.
- 2011‑06‑07:
Ten physical gestures that have been patented.
- 2011‑06‑07:
How the Tube Map affects journey planning decisions.
- 2011‑06‑07:
Alan Kay asks about significant new inventions in computing since 1980.
- 2011‑06‑07:
Sample of DNS server IPv4 and IPv6 addresses querying maps.vix.com.
- 2011‑06‑07:
Microsoft AD DNS fails to keep SOA serial numbers in sync, which breaks zone transfers to slaves.
- 2011‑06‑07:
Cambridge Geek Night 11: Monday 13th June, 19:00 at the Union.
- 2011‑06‑07:
Lua enters TIOBE programming language top ten.
- 2011‑06‑07:
Library of the future: box up the books in shipping containers and lend out their contents over the web.
- 2011‑06‑07:
Dark silicon and the end of multicore scaling.
- 2011‑06‑07:
Telehack: huge interactive retrocomputing archive.
- 2011‑06‑06:
National Heritage map of England.
- 2011‑06‑06:
Experimental observations of dual-stack IPv4+IPv6 services.
- 2011‑06‑06:
Spamhaus IPv6 block list strategy.
- 2011‑06‑06:
The Energy Limit Model: Industrialism is no longer able to outrun energy costs.
- 2011‑06‑06:
Translations of common mathematical understatements.
- 2011‑06‑06:
The Economist's Johnson blog with more on cultural misunderstandings.
- 2011‑06‑06:
Languagelog on European understanding of British understatement.
- 2011‑06‑05:
A collection of programming and management laws.
- 2011‑06‑05:
How I failed, failed, and finally succeeded at learning how to program computers.
- 2011‑06‑04:
A benchmarking case study of C++, Java, Scala, and Golang.
- 2011‑06‑03:
netmap: memory mapping of network devices to drive 10gigE at line rate with FreeBSD.
- 2011‑06‑03:
Microsoft's unenthusiastic support for IPv6 day.
- 2011‑06‑03:
Sony gets massively hacked a dozen times.
- 2011‑06‑02:
IEEE Symposium on Security and Privacy votes to reject the IEEE copyright policy and adopt the USENIX policy instead.
- 2011‑06‑02:
The Santa Barbara county courthouse tower clock website (including a disturbance from Japan's earthquake in March).
- 2011‑06‑02:
Skype reverse engineered.
- 2011‑06‑02:
Requirements for handling leap seconds in NASA's common data format for space physics.
- 2011‑06‑02:
The case against the em dash.
- 2011‑06‑02:
Dissecting gzip and deflate.
- 2011‑06‑01:
The Phoenix compiler framework: Microsoft's answer to LLVM.
- 2011‑06‑01:
No, she went of her own accord.
- 2011‑05‑31:
Depixellating pixel art.
- 2011‑05‑31:
Convert between miles and kilometers using only addition.
- 2011‑05‑31:
Bypass Cisco RA Guard by fragmenting your spoofed router advertisements.
- 2011‑05‑31:
CBBC "Horrible Histories" spoofs Apple excellently.
- 2011‑05‑31:
Limits to Growth.
- 2011‑05‑31:
Rock star programmers.
- 2011‑05‑31:
Linux 3.0rc1 - at last a bit of sanity in version numbering.
- 2011‑05‑30:
Twenty reasons why revolution is kicking off everywhere.
- 2011‑05‑30:
Thermoacoustic hot air engine.
- 2011‑05‑30:
A refrigerator that runs without artificial energy input.
- 2011‑05‑29:
"Peak Civilization": the fall of the Roman Empire.
- 2011‑05‑28:
P.G. Wodehouse's American Psycho.
- 2011‑05‑28:
The GFDL is possibly one of the worst licenses ever.
- 2011‑05‑27:
Things in PHP which make you sad.
- 2011‑05‑27:
Phonotactic reconstruction of encrypted VOIP conversations - amazing traffic analysis exploit.
- 2011‑05‑27:
Polygonal map generation.
- 2011‑05‑27:
Haynes manual for the 60163 "Tornado" Peppercorn class A1 Pacific steam locomotive.
- 2011‑05‑27:
Roger Ebert on dim Sony 3D projectors.
- 2011‑05‑27:
Stop sign.
- 2011‑05‑26:
What papers should every computer scientist read?
- 2011‑05‑26:
Floating point formats.
- 2011‑05‑26:
route53d: gateway between standard DNS UPDATE / IXFR messages and Amazon's HTTP-based protocol.
- 2011‑05‑25:
Peak oil, Hubbert curves, thermodynamics, and limits to economic growth.
- 2011‑05‑25:
Branch descriptions in git.
- 2011‑05‑25:
IPv6 eye chart: which websites can you see?
- 2011‑05‑25:
Paul Francis's networking publications.
- 2011‑05‑24:
A treatise on font rasterisation.
- 2011‑05‑24:
The Ryan Giggs affair would have remained private if he had not taken out the injunction.
- 2011‑05‑24:
Never mind naming Ryan Giggs, the RBS and FSA are the real secrecy scandal.
- 2011‑05‑24:
How to deconstruct almost anything.
- 2011‑05‑24:
An algorithms textbook by Dasgupta & Papadimitriou & Vazirani.
- 2011‑05‑24:
ShaperProbe: a tool to detect traffic shaping by ISPs.
- 2011‑05‑24:
Lactase persistence, quasi-pastoralism, and the agricultural and industrial revolutions.
- 2011‑05‑24:
Should apples be regulated?
- 2011‑05‑24:
EU IPR policy is crippling the digital economy.
- 2011‑05‑24:
DENIC currently rolling out DNSSEC for the .de zone.
- 2011‑05‑24:
Mouse + VOIP phone. Try using your computer and phone at the same time...
- 2011‑05‑24:
The HTML keygen element generates a cryptographic key pair and submits the public key as part of an HTML form.
- 2011‑05‑23:
Semantic versioning: a sensible software release numbering scheme.
- 2011‑05‑23:
Linux version numbering to change to 2.8.x.y or 3.x.y?
- 2011‑05‑23:
Loopsofzen: a little puzzle game for IPv6 users only.
- 2011‑05‑23:
OMG IPv6 day! (the tl;dr version)
- 2011‑05‑23:
Test your IPv6 connectivity.
- 2011‑05‑23:
Richmond golf club temporary rules, 1940.
- 2011‑05‑23:
A thoughtful piece about privacy law vs. global media.
- 2011‑05‑23:
How the No to AV campaign won.
- 2011‑05‑23:
Yes to AV post-mortem self-flagellation.
- 2011‑05‑23:
RIBA pylon design competition.
- 2011‑05‑23:
A Toronto couple are trying to raise a genderless child.
- 2011‑05‑23:
MessagePack: like JSON but fast small and binary.
- 2011‑05‑23:
Repairing corrupted ZIP files by brute force scanning.
- 2011‑05‑23:
Scottish newspaper claims immunity from English superinjunction. Hilarity ensues.
- 2011‑05‑22:
It is not a crime for investment banks to stiff their clients.
- 2011‑05‑22:
Fighting the lower Mississippi river. (1987)
- 2011‑05‑21:
How a Schillings superinjunction ensures everyone will hear your secret.
- 2011‑05‑21:
Lambda the Ultimate discussion of proper tail call optimization.
- 2011‑05‑21:
Why object-oriented languages need proper tail call optimization.
- 2011‑05‑20:
Why we resist the idea that carbs are worse for you than fat.
- 2011‑05‑20:
Unix system programming in Objective Caml.
- 2011‑05‑20:
Run jslinux on node.js.
- 2011‑05‑20:
Kirkus Reviews gives a star to Rule 34 by Charlie Stross.
- 2011‑05‑19:
Wadler's criticism of SICP.
- 2011‑05‑19:
A criticism of SICP and a rationale for HtDP.
- 2011‑05‑19:
Amazon now selling more Kindle books than dead tree books.
- 2011‑05‑19:
Carlton Arms to re-open towards the end of July.
- 2011‑05‑19:
Decentralized Internet resource discovery revisited.
- 2011‑05‑18:
Nominet completes rollout of DNSSEC for its .uk 2LDs.
- 2011‑05‑18:
The influence of the embedding/extending API on the design of Lua.
- 2011‑05‑18:
The recursive internet architecture.
- 2011‑05‑18:
Assessing the security of the RINA clean-slate internet architecture.
- 2011‑05‑18:
The definitive Tube map.
- 2011‑05‑18:
Changes to the Internet architecture affect privacy.
- 2011‑05‑18:
The periodic table of biscuit urban legends.
- 2011‑05‑17:
Heaven: a fool's paradise.
- 2011‑05‑17:
"Tubular Bells" played on an awesome collection of classic synths. (YouTube)
- 2011‑05‑17:
Lost Type - pay what you like for fonts.
- 2011‑05‑17:
Urban vs online spaces, cosmopolitan vs parochial, and designing for serendipity and flâneur.
- 2011‑05‑17:
Serendipity: How the vogue word became vague.
- 2011‑05‑17:
The untold story of the search business model.
- 2011‑05‑17:
Dutch is essentially ...
- 2011‑05‑17:
A another brief bio of Fabrice Bellard.
- 2011‑05‑17:
Chief reviwer of NHS reforms says they are unworkable and will destroy essential services.
- 2011‑05‑17:
The state of Unicode fonts in 1998.
- 2011‑05‑17:
A somewhat fluffy bio of Fabrice Bellard.
- 2011‑05‑17:
The L programming language and system.
- 2011‑05‑17:
DNSSEC monitoring tools.
- 2011‑05‑17:
Unintentional goatse.
- 2011‑05‑17:
Programming language popularity.
- 2011‑05‑17:
JavaScript madness.
- 2011‑05‑17:
This PC emulator is written in Javascript. (Another stunning hack by Fabrice Bellard.)
- 2011‑05‑17:
Fair Trade revealed as a feel-good hoax.
- 2011‑05‑16:
Why Kate Griffin does not write about customer service.
- 2011‑05‑16:
Physics lolcats.
- 2011‑05‑16:
MISC: an experimental LISP-like language based on maps.
- 2011‑05‑16:
What the Spitfire can teach us about nurturing innovation and radical ideas.
- 2011‑05‑16:
Vint Cerf wants YOU to use IPv6.
- 2011‑05‑16:
How the secretary of state for health proposes to abolish the NHS in England.
- 2011‑05‑16:
validns - DNSSEC-aware zone file validator.
- 2011‑05‑16:
Scientific evidence and government dietary guidelines.
- 2011‑05‑15:
The worst algorithm in the world, or, how to calculate Fibonacci numbers.
- 2011‑05‑15:
Web comments need to be reinvented.
- 2011‑05‑15:
The dark side of C++.
- 2011‑05‑15:
Imagine a (virtual) world without guns.
- 2011‑05‑15:
Core totally demolished at Fukushima Daiichi No. 1.
- 2011‑05‑15:
How to make WiFi work at tech conferences.
- 2011‑05‑15:
A guide to undefined behaviour in C and C++.
- 2011‑05‑15:
Anti-competitive licensing requirements in the USA.
- 2011‑05‑15:
The "as-if infinitely ranged" integer model for avoiding overflow bugs.
- 2011‑05‑15:
What every C programmer should know about undefined behavior.
- 2011‑05‑15:
JSON is not a subset of JavaScript - lol Unicode.
- 2011‑05‑15:
Markov generators and reservoir sampling.
- 2011‑05‑15:
The suprising security model for NFC payments.
- 2011‑05‑14:
DNSSEC, and trusting Internet names.
- 2011‑05‑13:
Lexadecimal: meaningful colour numbers.
- 2011‑05‑13:
UK higher education policy should not look towards the Ivy League.
- 2011‑05‑13:
Symmetricom chip-scale atomic clock now for sale.
- 2011‑05‑12:
Anglo-EU translation guide.
- 2011‑05‑12:
The humiliation of the Yes to AV campaign.
- 2011‑05‑12:
What happens to Asian-American overachievers after graduation?
- 2011‑05‑11:
Realism in user interface design.
- 2011‑05‑11:
An electoral reform post mortem.
- 2011‑05‑11:
Build your own probability monads.
- 2011‑05‑11:
Home-made core memory for the Arduino.
- 2011‑05‑11:
The "Country Life" magazine list of 39 basic life skills.
- 2011‑05‑10:
The war on access to information.
- 2011‑05‑10:
Creative Commons and the enemies of creators' rights.
- 2011‑05‑10:
EU "cookies" directive: interactive guide to 25th May and what it means for you.
- 2011‑05‑10:
Exploit for Google Chrome (sandbox/ASLR/DEP bypass) - would Capsicum stop it?
- 2011‑05‑09:
Cool but obscure unix tools.
- 2011‑05‑09:
Oxford vs. Yale.
- 2011‑05‑09:
There's more to HTML escaping than &, <, >, and "
- 2011‑05‑09:
Irish jobs minister says current copyright law is bad for the economy.
- 2011‑05‑09:
Samoa to switch from East to West of the Date Line.
- 2011‑05‑08:
The CALM principle: distributed consistency as logical monotonicity.
- 2011‑05‑06:
An alternative vote, Cambridge fashion.
- 2011‑05‑05:
The Economist on the Fukushima nuclear reactor problems.
- 2011‑05‑05:
Blunkett admits No campaign lied about costs. #yes2av
- 2011‑05‑05:
Nominet announces that me.uk and co.uk are now signed with DNSSEC.
- 2011‑05‑05:
Intel's 22nm tri-gate transistors.
- 2011‑05‑05:
Results from Gravity Probe B confirm that Earth's spin twists space-time as predicted.
- 2011‑05‑05:
Motivated almost exclusively by rage.
- 2011‑05‑04:
A history of copy-on-write memory management.
- 2011‑05‑03:
A celebration of Joanna Russ, 1937-2011.
- 2011‑05‑03:
Antihydrogen trapped for 1000 seconds.
- 2011‑05‑02:
Reasons in favour of lazy evaluation.
- 2011‑05‑02:
LuaMacro2 - a lexical preprocessor for Lua.
- 2011‑05‑02:
The file(1) / libmagic home page.
- 2011‑05‑02:
BFI list of the 50 films you should see by the age of 14.
- 2011‑05‑02:
What Colour are your bits? "Paranoia" and Intellectual Property.
- 2011‑05‑02:
Measuring C compiler standards conformance in the early 1990s.
- 2011‑05‑01:
Atomic22 infiniti3D secure bike component fasteners.
- 2011‑05‑01:
TiGr: titanium ribbon bike lock.
- 2011‑05‑01:
Another patent used to kill innovation.
- 2011‑04‑30:
Summary of the Amazon EC2 and Amazon RDS outage.
- 2011‑04‑30:
Teletext 1970-2012: the life and death of a medium.
- 2011‑04‑28:
Is your cat confused about the referendum for fairer votes? (YouTube)
- 2011‑04‑28:
Power on/off symbology explained.
- 2011‑04‑28:
Redis and scripting (with Lua).
- 2011‑04‑28:
Hens say "yes!" to fairer votes.
- 2011‑04‑28:
Jim: a small implementation of Tcl.
- 2011‑04‑28:
Vote "yes" to fairer votes (and beer!)
- 2011‑04‑28:
Why you should extend Python rather than embedding it.
- 2011‑04‑28:
Yahoo! sells del.icio.us to YouTube founders.
- 2011‑04‑28:
That's What She Said: automatic double entendre identification.
- 2011‑04‑28:
The grim threat to British universities.
- 2011‑04‑27:
A perfectly crazy voting system.
- 2011‑04‑27:
Koninklijk Eise Eisinga Planetarium - the oldest planetarium.
- 2011‑04‑27:
The Chancellor's wife is in town today.
- 2011‑04‑26:
Why I just spent three days changing my passwords on over 300 web sites.
- 2011‑04‑26:
Digital policy in the coalition government.
- 2011‑04‑26:
Corruption, tax fraud, torture, and murder by Russian officials.
- 2011‑04‑26:
Anatomy of bloat in Mozilla's SVG code.
- 2011‑04‑26:
Fitzbillies to re-open under new management.
- 2011‑04‑26:
SecSpider: the DNSSEC monitoring project.
- 2011‑04‑25:
Dutch postal privatization.
- 2011‑04‑25:
Everyone is to blame for this continued expectation that magic distributed storage is possible.
- 2011‑04‑25:
An elegant computer desk.
- 2011‑04‑24:
Algorithmic pricing on the Amazon marketplace.
- 2011‑04‑23:
Immix garbage collection: fast collection, space efficiency, and mutator locality.
- 2011‑04‑23:
Smalltalk 80: bits of history, words of advice.
- 2011‑04‑23:
Google and Linux infringe linked list patent.
- 2011‑04‑23:
The bouncing torpedo.
- 2011‑04‑23:
The Black Team finds a bug in a tape driver.
- 2011‑04‑23:
Everything popular is wrong: making it in electronic music, despite democratization.
- 2011‑04‑22:
1D glasses.
- 2011‑04‑22:
2D glasses.
- 2011‑04‑22:
We should have got AV 93 years ago.
- 2011‑04‑21:
PCH DNS service architecture.
- 2011‑04‑21:
"Fun" with PHP arrays.
- 2011‑04‑21:
Apple's location data collection is mentioned in the terms of use you didn't read.
- 2011‑04‑21:
A better way to teach maths.
- 2011‑04‑21:
TCP/IP illustrated, volume 1: the protocols (2nd edition). By Richard Stevens and Kevin Fall.
- 2011‑04‑20:
Ugly memoization with unsafePerformIO.
- 2011‑04‑20:
Elegant memoization with functional memo tries.
- 2011‑04‑20:
An amazing surreptitious tour of London's disused underground mail railway.
- 2011‑04‑20:
Is the ACS:Law case the beginning of the end for "three strikes" copyright laws?
- 2011‑04‑20:
BT and TalkTalk lose their legal challenge to the Digital Economy Act anti-filesharing provisions.
- 2011‑04‑20:
How the Erlang generic server works.
- 2011‑04‑20:
Parallelism is not concurrency.
- 2011‑04‑20:
A monad for deterministic parallelism.
- 2011‑04‑20:
What is the status of multicore programming in Haskell?
- 2011‑04‑20:
Education as a commodity.
- 2011‑04‑19:
The Taxpayers' Alliance has bought yes2av.org and redirected it to no2av.org. Classy.
- 2011‑04‑19:
Mozilla should add Honest Achmed's root CA certificate.
- 2011‑04‑19:
Size of Google's and similar map tiles at different scales.
- 2011‑04‑19:
The science of why deniers refuse to believe science.
- 2011‑04‑19:
Trade IPv4.
- 2011‑04‑19:
Haskell for the cloud: Erlang-style distributed concurrency.
- 2011‑04‑19:
ARIN seems to agree that Nortel can treat its old IP space as property.
- 2011‑04‑19:
Intel agrees with Oracle that Itanium is obsolete.
- 2011‑04‑18:
10 best tricks to fool yourself to work.
- 2011‑04‑18:
In favour of juries being allowed to throw out bad patents.
- 2011‑04‑18:
What's at the back of your web page?
- 2011‑04‑18:
AV and dog shit.
- 2011‑04‑18:
LuaJIT performance on an ARM (interpreter only, no JIT yet).
- 2011‑04‑18:
Artificial almost-intelligence will trigger the spam apocalypse.
- 2011‑04‑18:
Woo! Cold fusion!
- 2011‑04‑18:
Extruding Conway's Game of Life.
- 2011‑04‑17:
Examples of robberies from data centres.
- 2011‑04‑17:
Photo tour of Facebook's new datacenter.
- 2011‑04‑17:
I2P anonymous network.
- 2011‑04‑17:
The Lisp curse.
- 2011‑04‑16:
CIEL: a universal execution engine for distributed data-flow computing.
- 2011‑04‑16:
TCP incast congestion collapse.
- 2011‑04‑15:
A stable bicycle without gyros or trail.
- 2011‑04‑15:
Cisco PIX firewall SMTP content filtering evasion vulnerability.
- 2011‑04‑15:
Data Protection and Cambridge University's Google Calendar service.
- 2011‑04‑15:
A closer look at the Level 3 + Global Crossing merger.
- 2011‑04‑15:
Sugar: the bitter truth. (YouTube)
- 2011‑04‑15:
Is sugar toxic?
- 2011‑04‑15:
Matt Sergeant has written a new SMTP server using node.js.
- 2011‑04‑14:
Asia/Pacific IPv4 exhaustion approaches.
- 2011‑04‑14:
Teaching binary arithmetic using the Socratic method.
- 2011‑04‑14:
UK Political Studies Association media briefing paper on the Alternative Vote.
- 2011‑04‑14:
"Kettling" of peaceful protestors by Metropolitan Police ruled illegal.
- 2011‑04‑14:
Electricity around the world.
- 2011‑04‑13:
Zooko's tetrahedron.
- 2011‑04‑13:
Zooko's triangle: names can be two of decentralized, secure, meaningful.
- 2011‑04‑13:
Hugh Grant, phone hacking, paparazzi, secret recordings, and the News of the World scandal.
- 2011‑04‑13:
Gazelle: a system for building fast reusable parsers.
- 2011‑04‑13:
Mac OS X hidden features and nice tips & tricks.
- 2011‑04‑13:
User-friendliness and fascism.
- 2011‑04‑12:
Justice is impossible if we cannot trust police forces to tell the truth.
- 2011‑04‑12:
Solaris has a MACHINE_THAT_GOES_PING.
- 2011‑04‑12:
LISP network element deployment considerations.
- 2011‑04‑12:
LISP (locator/Identifier separation protocol) beta network site status.
- 2011‑04‑12:
In praise of eggs.
- 2011‑04‑12:
The Olson timezone database (tzdata and tzcode). (New homepage since twinsun is down.)
- 2011‑04‑12:
AMSS: the AM radio data signalling system.
- 2011‑04‑12:
Specification of BBC phase-modulated data transmissions on Radio 4 long wave.
- 2011‑04‑12:
ShairPort: an open source AirTunes server with a copy of the necessary private key.
- 2011‑04‑12:
Hormel sues for "SPAM" trademark infringement.
- 2011‑04‑12:
Toddler app user interface guidelines.
- 2011‑04‑12:
Binary vs. UTF-8, and why it need not matter.
- 2011‑04‑11:
Programming in Standard ML by Robert Harper.
- 2011‑04‑11:
Circular "roundabout" observation bridge at Hiyoshi Springs.
- 2011‑04‑11:
Castle in the sky: the story of the Royal Greenwich Observatory at Herstmonceux.
- 2011‑04‑11:
The rise and fall of the Royal Greenwich Observatory.
- 2011‑04‑10:
Classification of the principal programming paradigms.
- 2011‑04‑10:
Programming paradigms for dummies: what every programmer should know.
- 2011‑04‑10:
lorempixum - categorized placeholder images.
- 2011‑04‑10:
Optimizing cache performance on a rapidly growing site.
- 2011‑04‑10:
An encyclopaedia of programming languages.
- 2011‑04‑10:
Relaxed memory models must be rigorous.
- 2011‑04‑09:
A watch with a gnomon.
- 2011‑04‑09:
Facebook's Open Compute Project server.
- 2011‑04‑09:
A collection of articles about game physics.
- 2011‑04‑09:
A unified framework for rigid body dynamics.
- 2011‑04‑09:
Physics engines for dummies.
- 2011‑04‑09:
Using coprime overlays to make non-repeating backgrounds.
- 2011‑04‑09:
Brian May use prime numbers in the sound design for "We Will Rock You".
- 2011‑04‑09:
In praise of "The C Programming Language".
- 2011‑04‑08:
Rob Pike's C style guide.
- 2011‑04‑08:
C Craft - waking from a programming nightmare.
- 2011‑04‑08:
PHK on leap seconds in ACM Queue.
- 2011‑04‑08:
Security problem excuse bingo.
- 2011‑04‑07:
When Harry Met Sally 2, starring Billy Crystal & Helen Mirren.
- 2011‑04‑07:
75-year-old copper thief finds a single point of failure in Armenia's Internet connectivity.
- 2011‑04‑06:
OpenSSL memory usage in node.js and Twisted Python.
- 2011‑04‑06:
Testing prime numbers using pcre.
- 2011‑04‑05:
Heap Layers: C++ templates for building high-performance allocators such as Hoard.
- 2011‑04‑05:
Guardian.co.uk is switching from Java to Scala.
- 2011‑04‑05:
"Yes to AV" bikes.
- 2011‑04‑04:
Dan Kaminsky on DJB and secure DNS.
- 2011‑04‑04:
A discussion about DES between Stanford CS researchers, NBS, and NSA, in 1976.
- 2011‑04‑04:
gTLD DNSSEC at Verisign. (March 2011)
- 2011‑04‑04:
Minority Report user interface available for real world use.
- 2011‑04‑04:
"Predator" algorithm for tracking unknown objects in unconstrained video streams.
- 2011‑04‑04:
Be prepared to accept security vulnerability reports.
- 2011‑04‑04:
Rules for readable web sites.
- 2011‑04‑04:
The continuing saga of the breast cancer gene patent case.
- 2011‑04‑02:
Zenburn colour scheme for vim.
- 2011‑04‑02:
Solarized - colour scheme for terminal programs.
- 2011‑04‑02:
Product design at GitHub.
- 2011‑04‑01:
Graph showing number of DNSSEC domains with secure delegations in .com, .net, and .edu.
- 2011‑04‑01:
Quantum random bit generator service (with mathematical CAPTCHA).
- 2011‑03‑31:
Linux distros move /var/run to /run to support programs starting early in bootup.
- 2011‑03‑31:
RSA Inc. was hacked by the Chinese?
- 2011‑03‑31:
Wired magazine interview with Paul Baran.
- 2011‑03‑30:
How to insult a computer scientist.
- 2011‑03‑30:
C++ member function pointers and fast delegates.
- 2011‑03‑30:
Canada's broad anti-poly law.
- 2011‑03‑30:
La Meridiana: a house built around a sundial. (stupid Flash photo gallery)
- 2011‑03‑29:
Hacker releases private key of fraudulent Comodo X.509 certificate.
- 2011‑03‑29:
A ballroom under a lake near Godalming...
- 2011‑03‑29:
Juggling quadrocopters. (YouTube)
- 2011‑03‑29:
INWG and the conception of the Internet: an eyewitness account.
- 2011‑03‑29:
DJB's CurveCP: a monolithic replacement for TCP+TLS, plus discussion of transport protocol design.
- 2011‑03‑29:
Mozilla follow-up on the Comodo X.509 certificate authority security breach.
- 2011‑03‑29:
Rima: a mathematical modelling toolset using Lua.
- 2011‑03‑29:
Twin babies have a conversation. Cute! (YouTube)
- 2011‑03‑28:
Niall Ferguson on military overstretch, fiscal deficit, and the collapse of empires.
- 2011‑03‑27:
National Executive Committee for space-based positioning, navigation, and timing on LightSquared and GPS.
- 2011‑03‑27:
Unladen Swallow (Python JIT) retrospective.
- 2011‑03‑27:
Bulletproof Node.js coding.
- 2011‑03‑27:
Cornell library rejects NDAs and will reveal journal prices.
- 2011‑03‑26:
f8 Facebook conference badges / booklets.
- 2011‑03‑26:
Field vs. Google: robots.txt and copyright.
- 2011‑03‑26:
Left-leaning red-black trees.
- 2011‑03‑26:
Hopscotch hash table.
- 2011‑03‑25:
The tale of a 15-year-old T/TCP bug in FreeBSD.
- 2011‑03‑25:
Symmetricom's chip-scale atomic clock.
- 2011‑03‑25:
Autotools Mythbuster.
- 2011‑03‑25:
Autotools Tutorial.
- 2011‑03‑25:
Why Fukushima made me stop worrying and love nuclear power.
- 2011‑03‑25:
Das Leben ist zu kurz für den falschen Job.
- 2011‑03‑25:
Ross Anderson asks, can we fix the security economics of federated authentication?
- 2011‑03‑24:
Bankrupt Nortel sells its IPv4 addresses to Microsoft for $7.5 million.
- 2011‑03‑23:
How glow.mozilla.org visualizes Firefox 4 downloads.
- 2011‑03‑23:
How to sync an iPhone with multiple computers.
- 2011‑03‑23:
Oracle ditches support for Itanium.
- 2011‑03‑23:
Peter Gutmann: "A mighty fortress is our PKI"
- 2011‑03‑23:
Japan Registry Service DNS server user-side evaluation.
- 2011‑03‑23:
Jacob Appelbaum detects Certificate Authority compromises and web browser collusion.
- 2011‑03‑23:
X.509 certificate revocation doesn't work.
- 2011‑03‑23:
Google snappy: a fast compressor/decompressor.
- 2011‑03‑22:
What is the bandwidth of a human ejaculation?
- 2011‑03‑22:
What Johann Hari has in common with Jamie Oliver's kids.
- 2011‑03‑22:
Over-provisioning an Intel X25-M SSD for greater performance and durability.
- 2011‑03‑22:
IPv6 consumer edge router interoperability.
- 2011‑03‑22:
How many times has a URL has been shared on various social networks.
- 2011‑03‑21:
How to fill in your census form without Lockheed Martin profiting.
- 2011‑03‑21:
John Hemming MP on secrecy orders made by the courts. Utterly scandalous.
- 2011‑03‑21:
Hyper-injunctions can stop you from talking to your MP.
- 2011‑03‑21:
Brian Krebs on the Rustock botnet takedown.
- 2011‑03‑19:
Subsurface liquefaction on reclaimed land in Tokyo caused by the Sendai earthquake.
- 2011‑03‑19:
Life and times of J root.
- 2011‑03‑19:
Analysis of anycast anomalies on the J root DNS server.
- 2011‑03‑18:
Query storm affecting .cl TLD.
- 2011‑03‑18:
Integer hash functions.
- 2011‑03‑18:
Non-cryptographic hash function zoo.
- 2011‑03‑18:
How Backblaze build cheap cloud storage.
- 2011‑03‑18:
A plea for baked weblogs.
- 2011‑03‑18:
Paul Vixie on blocking DNS - but when will an RPZ service be announced?
- 2011‑03‑17:
Fantastic Japanese "Jurassic Chocolate".
- 2011‑03‑17:
Safety of different energy sources measured in deaths per TWh.
- 2011‑03‑17:
MOD conducts regular GPS jamming exercises in the UK.
- 2011‑03‑17:
Abusing switch() to delay a loop test in C.
- 2011‑03‑16:
Are you protected by DNSSEC?
- 2011‑03‑16:
What is the definition of a "blue moon"?
- 2011‑03‑16:
Parsing: the solved problem that isn't.
- 2011‑03‑16:
Why is TeX still used? What are some good, modern alternatives?
- 2011‑03‑15:
List of exclamations used by Captain Haddock, before it was deleted by morons.
- 2011‑03‑15:
The case of the flat panel TV scream.
- 2011‑03‑15:
CV Dazzle: camouflage to hide from face detection software.
- 2011‑03‑15:
Print 1 to 1000 without loop or conditional statements.
- 2011‑03‑15:
Police ruin seized evidence after CPS drops charges.
- 2011‑03‑14:
A mind-blowing history of science fiction.
- 2011‑03‑14:
CERT C programming language secure coding standard.
- 2011‑03‑14:
C99 + TC1 + TC2 + TC3
- 2011‑03‑14:
Datum Inc. handbook of time code formats.
- 2011‑03‑14:
Hidden warning message found inside Samsung Galaxy tablet.
- 2011‑03‑14:
iPad 2 introduces new headphone jack.
- 2011‑03‑14:
DRM is so bad it isn't even wrong.
- 2011‑03‑13:
Toxic MP3s can 0wn your car.
- 2011‑03‑13:
Coalition to save our GPS from LightSquared.
- 2011‑03‑13:
Sundial buyer's guide.
- 2011‑03‑13:
nowjs creates a magic namespace "now" accessible by both server (node.js) and client.
- 2011‑03‑13:
The food bubble: How Wall Street starved millions and got away with it.
- 2011‑03‑13:
Why oil is so expensive today (it's not Libya).
- 2011‑03‑12:
iPad + ZAGGmate w/keyboard = the return of the Psion Netbook?
- 2011‑03‑12:
Japan quake caused day to get a wee bit shorter.
- 2011‑03‑11:
Washington Advanced Systems for Programming: Cecil, Vortex, etc.
- 2011‑03‑11:
Clozure Common Lisp.
- 2011‑03‑11:
Why Livejournal moved each user to a separate subdomain.
- 2011‑03‑11:
DNS prefetching on discussion sites with per-user subdomains.
- 2011‑03‑10:
Broadcom NIC remote code execution vulnerability.
- 2011‑03‑10:
Muppets alignment chart.
- 2011‑03‑10:
Will the MIT Media Lab's brilliant algorithmic logo lead to algorithmic trademarks?
- 2011‑03‑10:
TeX vs. GUI word processors.
- 2011‑03‑09:
Jim Reekes on "sosumi" and the other Mac OS system sounds.
- 2011‑03‑09:
You are not a Jedi.
- 2011‑03‑08:
HP BladeSystem VirtualConnect broken by the allocation of IP block 49.48.46.0/24.
- 2011‑03‑08:
MS Exchange 2010 skips every 50th message in a mailbox with more than 2046 messages.
- 2011‑03‑08:
Adobe Wallaby: convert Flash to HTML5.
- 2011‑03‑08:
Performance and evaluation of Lisp systems.
- 2011‑03‑08:
d3.js: amazing dynamic data-driven documents.
- 2011‑03‑08:
The solid facts on Christchurch liquefaction. (huge 1-page PDF)
- 2011‑03‑08:
SCOTUS to make a decision on copyright and the public domain.
- 2011‑03‑07:
Pictures of a Russian nuclear power plant.
- 2011‑03‑07:
Why Austalia's major cities are in decay.
- 2011‑03‑07:
Engaging a multi-generational workforce: practical advice for managers.
- 2011‑03‑06:
Agora: the Scheme of object-orientation.
- 2011‑03‑05:
Ecdysis: open-source nat64.
- 2011‑03‑05:
Anti-vaxxers use libel to suppress the truth about their evil acts.
- 2011‑03‑04:
The best magazine articles ever.
- 2011‑03‑04:
Linux's inconsistent system call credential checking.
- 2011‑03‑04:
Show me kittens.
- 2011‑03‑04:
Cambridge analogue television switch-off dates.
- 2011‑03‑04:
A list of radio positioning and surveying systems.
- 2011‑03‑04:
The crypto gardening guide and planting tips.
- 2011‑03‑04:
The blind man who taught himself to see.
- 2011‑03‑04:
Microsoft and Google jointly sue patent troll GeoTag Inc.
- 2011‑03‑04:
The Wikipedia FAQK.
- 2011‑03‑04:
The case against drop-down identities.
- 2011‑03‑04:
Why gender is a text field on Diaspora.
- 2011‑03‑04:
What you need to know about mobile Internet censorship.
- 2011‑03‑03:
Ingredients of the Arabian revolutions. (NY Times)
- 2011‑03‑03:
Draft C1X standard, with diff marks relative to C99.
- 2011‑03‑03:
O2 and Vodaphone are arbitrarily blocking "adult" web sites.
- 2011‑03‑03:
Cleaning up alkali metals with superheated steam.
- 2011‑03‑03:
Memory models: a case for rethinking parallel languages and hardware.
- 2011‑03‑02:
Knuth on academic publishing.
- 2011‑03‑02:
The ACM and the IEEE are shaking down computer science.
- 2011‑03‑02:
Why sodium produces a bigger bang than more reactive alkali metals.
- 2011‑03‑02:
The bipolar Lisp programmer.
- 2011‑03‑02:
Great books for programmers.
- 2011‑03‑01:
Pictures of Nyiragongo volcano.
- 2011‑03‑01:
CloudFlare anycast geoIP reverse proxy web accelerator service.
- 2011‑03‑01:
Pictures of kittens to use as placeholders in your web site designs.
- 2011‑03‑01:
Weightings for the 2014 Research Excellence Framework.
- 2011‑03‑01:
Playstation 3 imports seized for violating LG's BluRay patents.
- 2011‑03‑01:
Interesting photos from Google Street View.
- 2011‑03‑01:
Anyone want to buy the domain os.com?
- 2011‑03‑01:
Microsoft Windows development process.
- 2011‑03‑01:
The very rich indie writer.
- 2011‑02‑28:
"I don't want to be a teacher any more."
- 2011‑02‑28:
Every revolution is different: 1848 vs. 2011.
- 2011‑02‑28:
Geekhack forum for discerning keyboard users.
- 2011‑02‑28:
US DoC National Telecoms and Info. Administration notice of inquiry re. IANA and ICANN.
- 2011‑02‑28:
First come first served source address validation for locally-assigned IPv6 addresses.
- 2011‑02‑28:
A real-world MAC address spoofing incident.
- 2011‑02‑28:
mcpp: a portable C preprocessor with validation suite.
- 2011‑02‑27:
The flocking algorithm.
- 2011‑02‑25:
How to write a script that is understood by both the shell and by Lua.
- 2011‑02‑25:
Intel BIOS implementation test suite.
- 2011‑02‑25:
Alan Turing's papers saved for the nation.
- 2011‑02‑24:
Inside the mind of a police dog.
- 2011‑02‑24:
What Islamist terrorist threat?
- 2011‑02‑24:
FBI counterintelligence techniques for detecting liars.
- 2011‑02‑24:
Intel Thunderbolt (aka Light Peak) technology brief.
- 2011‑02‑24:
A list of bugs in qmail.
- 2011‑02‑23:
Understanding XCP equilibrium and fairness.
- 2011‑02‑23:
GPS and the legal traceability of time.
- 2011‑02‑23:
Precise time and frequency for military systems.
- 2011‑02‑23:
How to choose chart types.
- 2011‑02‑22:
TCP congestion control with a misbehaving receiver.
- 2011‑02‑22:
P99 - preprocessor macros and functions for C99.
- 2011‑02‑22:
How to detect an empty argument list given to a C99 variadic macro.
- 2011‑02‑22:
How to count the number of arguments given to a C99 variadic macro.
- 2011‑02‑22:
Money won't buy Yanks health insurance.
- 2011‑02‑22:
A critical review of "end-to-end arguments in system design".
- 2011‑02‑22:
Why flow completion time is the right metric for congestion control.
- 2011‑02‑21:
UK census office says you can call yourself a Jedi if you like.
- 2011‑02‑21:
AFNIC report on problems caused by DNSSEC bug in BIND.
- 2011‑02‑21:
C/Invoke connects high-level code to C libraries at runtime.
- 2011‑02‑20:
Using space-filling curves for multi-dimensional indexing.
- 2011‑02‑20:
Spatial indexing with quadtrees and Hilbert curves.
- 2011‑02‑20:
Visualizing genomic data with the Hilbert curve.
- 2011‑02‑20:
Mapping 3D RGB space to a plane using Hilbert curves.
- 2011‑02‑20:
Using space-filling curves to sort colour dictionaries.
- 2011‑02‑20:
Using space-filling curves to find good travelling salesman tours quickly.
- 2011‑02‑18:
JANET: the first 25 years.
- 2011‑02‑18:
Experience with Grapevine: the growth of a distributed system. (Xerox PARC, 1984)
- 2011‑02‑18:
Grapevine: an exercise in distributed computing. (Xerox PARC, 1982)
- 2011‑02‑18:
Unfriendly user interfaces are more efficient.
- 2011‑02‑17:
OK Go: This too shall pass (awesome Rube Goldberg version).
- 2011‑02‑17:
Bufferbloat.net.
- 2011‑02‑17:
Van Jacobson rants about queues.
- 2011‑02‑17:
So long, and no thanks for the externalities: the rational rejection of security advice by users.
- 2011‑02‑17:
Gyro-stabilized electric unicycle.
- 2011‑02‑17:
The Last Ringbearer: Middle Earth from Mordor's point of view.
- 2011‑02‑16:
Homeland Security shuts down 84,000 websites 'by mistake'.
- 2011‑02‑16:
Clay: a language for generic programming.
- 2011‑02‑16:
Save the Lion Yard loos!
- 2011‑02‑16:
Monosodium glutamate.
- 2011‑02‑16:
CCTF notes on UTC.
- 2011‑02‑16:
CCTF 18th meeting discusses redefinition of UTC (see section 8).
- 2011‑02‑15:
Time and frequency dissemination in the UK.
- 2011‑02‑15:
Research into interpreters by Anton Ertl and David Gregg.
- 2011‑02‑15:
Mike Pall on the difficulty of compiling interpreters.
- 2011‑02‑15:
Dirty secrets of search engine optimization.
- 2011‑02‑15:
Chat bots and Turing tests.
- 2011‑02‑15:
Nine traits of a veteran unix admin.
- 2011‑02‑15:
Map of global alcohol consumption.
- 2011‑02‑15:
Nokia Plan X.
- 2011‑02‑14:
Great oscilloscope display hacks.
- 2011‑02‑14:
Keep your government hands off my medicare!
- 2011‑02‑14:
Darwinian valentines.
- 2011‑02‑14:
XML <-> Unix text processing tools.
- 2011‑02‑14:
The British Government's continuing evil treatment of the Chagos islanders.
- 2011‑02‑14:
ZFS-Linux (from KQ Infotech).
- 2011‑02‑14:
ZFS on Linux (from LLNL).
- 2011‑02‑13:
Banning drugs does not reduce their availability.
- 2011‑02‑13:
QuickLZ: fast compression library for C, C# and Java.
- 2011‑02‑13:
New substring search algorithm.
- 2011‑02‑12:
Optimizing an Erlang Git daemon.
- 2011‑02‑11:
What to know before debating type systems.
- 2011‑02‑11:
Staying alive in cold water.
- 2011‑02‑11:
JavaScript obfuscated coercion rules.
- 2011‑02‑11:
Egypt changed its clocks four times in 2010!
- 2011‑02‑11:
Lawyers celebrate MPs' vote to deny prisoners their democratic rights.
- 2011‑02‑11:
Remnants of a disappearing user interface.
- 2011‑02‑11:
IBM Watson to play against human Jeopardy winners on TV.
- 2011‑02‑11:
How the FCC plans to let LightSquared wreck the GPS.
- 2011‑02‑10:
Special vs. general relativistic time dilation on the earth's surface.
- 2011‑02‑10:
An automated bot uploads pages to Deletionpedia as they are deleted from Wikipedia.
- 2011‑02‑10:
Why liquor store clerks often win the lotto.
- 2011‑02‑10:
Bach's Toccata and Fugue for floppy disk drives.
- 2011‑02‑09:
Loops in PKIX certificate chains.
- 2011‑02‑09:
Spotify is the second larges single source of revenue for record labels in Europe.
- 2011‑02‑09:
Breaking the Web with hash-bangs.
- 2011‑02‑09:
Links to large email service postmaster and feedback loop pages.
- 2011‑02‑09:
Prebake: an efficient build system.
- 2011‑02‑09:
Build system benchmarks.
- 2011‑02‑09:
Your version control and build systems don't scale.
- 2011‑02‑08:
I bike San Francisco.
- 2011‑02‑08:
The Manchester Egg.
- 2011‑02‑08:
Problems caused by unsigned int in C-like languages. (Google Groups)
- 2011‑02‑08:
BBC to delete historical content from their website.
- 2011‑02‑08:
BBC will develop a permanent online archive.
- 2011‑02‑08:
UTF-16 bad, UTF-8 good.
- 2011‑02‑08:
A guide to terrestrial coordinate systems in Great Britain.
- 2011‑02‑08:
Fitzbillies gone bust.
- 2011‑02‑07:
The new kilogramme is approaching.
- 2011‑02‑07:
The BBC does not like "electoral reform".
- 2011‑02‑07:
The United Kingdom explained with a Venn diagram.
- 2011‑02‑07:
ISC announcement about BIND's new DS record DNSSEC validation bug.
- 2011‑02‑07:
Open research issues in Internet congestion control.
- 2011‑02‑06:
Manifesto for half-arsed agile software development.
- 2011‑02‑06:
Understanding Git conceptually.
- 2011‑02‑06:
Git from the bottom up.
- 2011‑02‑06:
Photographs along the Regent's Canal.
- 2011‑02‑06:
The lost rivers of London.
- 2011‑02‑06:
J for C programmers.
- 2011‑02‑06:
J interpreter.
- 2011‑02‑05:
Unlicense yourself: set your code free.
- 2011‑02‑04:
ECJ to rule that sports broadcasting must be a single market?
- 2011‑02‑04:
Why rockets were an inevitable technological development.
- 2011‑02‑04:
The MIME guys: how two Internet gurus changed email forever.
- 2011‑02‑04:
Shipping forecast glossary.
- 2011‑02‑04:
Official USA time zone map.
- 2011‑02‑04:
Timezone boundaries in multi-zone countries.
- 2011‑02‑04:
Administrative divisions of countries.
- 2011‑02‑04:
Geographical boundaries of the timezones of the world.
- 2011‑02‑03:
All Icelandic literature to go online?
- 2011‑02‑03:
Pump-and-dump share spammer charged with fraud.
- 2011‑02‑03:
The natural colour system.
- 2011‑02‑03:
How colour vision actually works.
- 2011‑02‑03:
Spam is now Verified by Visa.
- 2011‑02‑03:
Immigration officer put wife on no-fly list.
- 2011‑02‑03:
Australian government becomes more friendly to open source.
- 2011‑02‑02:
Data-dense analysis of cycling habits in Dublin and four other cities.
- 2011‑02‑02:
Oneybike: funky folding recumbent penny-farthing.
- 2011‑02‑02:
Michael "Liar's Poker" Lewis on Ireland's economic crisis.
- 2011‑02‑02:
Problems with SERVFAILs from BIND after .net was signed by DNSSEC.
- 2011‑02‑02:
Gold rush for the last IPv4 addresses.
- 2011‑02‑02:
Egypt Internet connectivity graphs.
- 2011‑02‑02:
Awesome world record Rubik's cube solution, in slo-mo. (youtube)
- 2011‑02‑02:
Mailman does not parse RFC 822 headers correctly.
- 2011‑02‑02:
Homeland Security siezes domain name of Spanish business that had been declared legal in court.
- 2011‑02‑02:
A statistician cracks a scratch-card lottery.
- 2011‑02‑02:
Bikes of San Francisco.
- 2011‑02‑02:
Unixy JSON record stream manipulation tools.
- 2011‑02‑02:
Probable RIR IPv4 exhaustion dates.
- 2011‑02‑01:
Cisco's preliminary plans for DNSSEC validation in all their products.
- 2011‑02‑01:
Last five /8 blocks to be allocated on Thursday 2011-02-03.
- 2011‑02‑01:
Java hangs when converting 2.2250738585072012e-308.
- 2011‑02‑01:
Securing BGP routing with RPKI and ROAs.
- 2011‑02‑01:
T-mobile stealing other networks' addresses to use for their access networks.
- 2011‑02‑01:
Interesting graph of RIR IPv4 burn rate.
- 2011‑02‑01:
Comcast activates first users with IPv6 native dual stack over DOCSIS.
- 2011‑02‑01:
IPv4 exhausted: two /8s allocated to APNIC from IANA.
- 2011‑02‑01:
ATM skimmers that never touch the ATM.
- 2011‑01‑31:
Louis Essen writes about time scales. (Metrologia, 1968)
- 2011‑01‑31:
Recent developments regarding the future of leap seconds.
- 2011‑01‑31:
Best of Hacker News.
- 2011‑01‑31:
Pretty froggy stained glass sundial.
- 2011‑01‑31:
Free programming eBooks.
- 2011‑01‑30:
A collection of famous bugs and glitches.
- 2011‑01‑30:
Linear logic and permutation stacks: the Forth shall be first.
- 2011‑01‑30:
How organized crime is taking control of Google's search results.
- 2011‑01‑29:
Peter Naur's Anti-Philosophical Dictionary.
- 2011‑01‑28:
Why Python pickles are insecure.
- 2011‑01‑28:
Lambda the ultimate political party.
- 2011‑01‑28:
Ben Goldacre on what makes a newspaper worth paying for.
- 2011‑01‑25:
Professionals lament the demise of the 4:3 laptop.
- 2011‑01‑25:
Jettons or reckoning counters.
- 2011‑01‑25:
ACM considered harmful.
- 2011‑01‑25:
How to avoid long timeouts when connecting to a server over IPv4 + IPv6.
- 2011‑01‑25:
Cathode: vintage terminal emulator.
- 2011‑01‑25:
Why 3D doesn't work and never will.
- 2011‑01‑24:
The BBC and "the astrology controversy that has raged in science for literally almost none of the last couple of centuries".
- 2011‑01‑24:
Expect a PR splash when the last IPv4 /8s are allocated to the RIRs.
- 2011‑01‑24:
How Nigerian fraud harms Nigerians.
- 2011‑01‑23:
Commercially available chip-scale atomic clock.
- 2011‑01‑23:
IPv6 doom: the rogue RA bug.
- 2011‑01‑23:
The secret invention of public-key cryptography at GCHQ.
- 2011‑01‑20:
The truth wears off: is there something wrong with the scientific method?
- 2011‑01‑20:
Nicely modernized Dutch bike.
- 2011‑01‑20:
The Italian Hours / Babylonian Hours sundial at Selwyn College.
- 2011‑01‑20:
Nautical time and civil date: change the date at 180°? at midday or midnight?
- 2011‑01‑19:
Opportunity knocks; management fails to answer.
- 2011‑01‑19:
How the Berkeley Overmind won the 2010 StarCraft AI competition.
- 2011‑01‑19:
Eek! A Man!
- 2011‑01‑18:
What not to do when Spamhaus tells you your network is infested with criminals.
- 2011‑01‑18:
They call it "design patterns", don't they?
- 2011‑01‑18:
Stuxnet is way behind the virus state of the art.
- 2011‑01‑18:
VX Heavens - huge computer virus site.
- 2011‑01‑17:
DNSSEC comes to ac.uk starting on Wednesday 2011-01-19.
- 2011‑01‑17:
What it is like for a woman to pass as a man.
- 2011‑01‑17:
Glasgow Haskell compiler development moving from darcs to git.
- 2011‑01‑17:
A book printed with a chain of four desktop printers with different colors and technologies dated from 1880 to 1976.
- 2011‑01‑17:
Chomsky on postmodernism.
- 2011‑01‑17:
Major record labels pay $45m compensation for pirating music.
- 2011‑01‑17:
Networking in UK Academia in the early 1980s.
- 2011‑01‑17:
"I should have pushed Haskell 10% towards Fortran instead of pushing Fortran 90% towards Haskell" - Guy Steele on Fortress.
- 2011‑01‑17:
Hacker News discusses djb redo.
- 2011‑01‑15:
Luma - Lua macros inspired by Scheme and using LPEG and Cosmo.
- 2011‑01‑15:
Dogs don't understand basic concepts like moving house.
- 2011‑01‑15:
"Why wasn't I consulted?" - how websites become popular.
- 2011‑01‑15:
Why you should never ever put two spaces after a full stop.
- 2011‑01‑14:
Frequently made mistakes about the origin of Internet email.
- 2011‑01‑14:
Can Belgium win the world record for the time taken to form a government?
- 2011‑01‑14:
From punched cards to flat screens: a technical autobiography by Philip Hazel.
- 2011‑01‑13:
Iolaus: experimental darcs-alike git porcelain.
- 2011‑01‑13:
Best of reddit 2010.
- 2011‑01‑13:
A localization horror story - it could happen to you!
- 2011‑01‑13:
Ice formations from diurnal freeze-thaw cycles.
- 2011‑01‑12:
The MMR scare started with a money-making scam.
- 2011‑01‑12:
A review of hardware security modules.
- 2011‑01‑11:
Akin's laws of spacecraft design.
- 2011‑01‑11:
Canada only allows brown soft drinks to contain caffeine.
- 2011‑01‑10:
The Chinese eco-disaster, or, where not to build a dam.
- 2011‑01‑10:
What not to do with a US electronic communications subpoena.
- 2011‑01‑10:
Yahoo!locaust.
- 2011‑01‑10:
Uncomfortable lessons from the reaction to WikiLeaks.
- 2011‑01‑10:
Home Office suppressed embarrassing ID card report.
- 2011‑01‑10:
Epidemiology and public health significance of Norovirus.
- 2011‑01‑10:
The way the world works, and the god that sucks.
- 2011‑01‑10:
How economics works in the real world.
- 2011‑01‑09:
Semicolon wars! The proliferation of programming languages.
- 2011‑01‑07:
The decline of Google search quality.
- 2011‑01‑07:
Detailed comparison of syntax across several programming languages.
- 2011‑01‑07:
One year in one image.
- 2011‑01‑06:
PowerDNS now with DNSSEC.
- 2011‑01‑06:
Wakefield's anti-MMR paper was even more fraudulent than previously reported.
- 2011‑01‑06:
Justice Scalia says the 14th Amendment does not give women equal protection under the law.
- 2011‑01‑06:
What does it mean for Americans to support terrorists?
- 2011‑01‑06:
First Past the Post: a damning report on a system that 'fails the fairness test'.
- 2011‑01‑05:
Objects have failed: notes for a debate.
- 2011‑01‑05:
Firefox overtakes Internet Explorer in Europe.
- 2011‑01‑04:
PHP hangs on numeric value 2.2250738585072011e-308.
- 2011‑01‑04:
What if the FCC had regulated the Internet?
- 2011‑01‑04:
Straight men kissing more as homophobia disappears amongst young people.
- 2011‑01‑04:
jemalloc() improvements at Facebook.
- 2011‑01‑03:
How the oldest surviving sundial works.
- 2011‑01‑03:
Chinese military multi-tool.
- 2011‑01‑01:
Inside LuaJIT 1.
- 2010‑12‑31:
On good URL design.
- 2010‑12‑31:
Multi-line comments considered harmful.
- 2010‑12‑31:
Cassandra vs MongoDB vs CouchDB vs Redis vs Riak vs HBase.
- 2010‑12‑30:
Why do Americans say (or cry) uncle?
- 2010‑12‑30:
Touching your junk: an ontological complaint.
- 2010‑12‑28:
New papers about specialized databases at Google.
- 2010‑12‑27:
Is Erlang overhyped or underestimated?
- 2010‑12‑25:
Ask Ross Anderson to hush up banking insecurity? Priceless!
- 2010‑12‑25:
Inside the 1kb Javascript 3D Christmas tree.
- 2010‑12‑25:
How Ray Kurzweil says his predictions are faring.
- 2010‑12‑25:
What would you describe as a "Gloucesterfuck"?
- 2010‑12‑25:
It's the latency, stupid.
- 2010‑12‑24:
JavaScript antipatterns in Google Closure.
- 2010‑12‑24:
Homeland Security seized domains of sites providing official free song downloads.
- 2010‑12‑22:
The fees policy is more about universities than students.
- 2010‑12‑22:
More detailed analysis of race in Oxford's admissions process.
- 2010‑12‑22:
Students of England, the NUS has failed you.
- 2010‑12‑22:
Comic Sans criminal.
- 2010‑12‑21:
Slow start and congestion control for a snowbound Eurostar.
- 2010‑12‑21:
Breaking SSL on embedded devices with promiscuous private keys.
- 2010‑12‑21:
Jeff Varasano's NY pizza recipe.
- 2010‑12‑21:
Azul's pauseless garbage collector.
- 2010‑12‑19:
XSS vulnerability in Amazon "search inside".
- 2010‑12‑19:
Cash Cow Disease: the cognitive decline of Microsoft and Google.
- 2010‑12‑17:
DNS-operations mailing list thread containing a Who's Who in DNS.
- 2010‑12‑17:
Plan 28: building Babbage's analytical engine.
- 2010‑12‑17:
"Post hoax, ergo propter hoax" - a review of Sokal's book.
- 2010‑12‑16:
Insert coin ... be amazed. (youtube)
- 2010‑12‑16:
Patents do not protect small businesses because they cannot be enforced.
- 2010‑12‑16:
Git explained by analogy with higher-dimensional manifolds :-)
- 2010‑12‑16:
Former drugs minister calls for an end to prohibition, a bit late.
- 2010‑12‑16:
Dan Kaminsky explains his colourblindness app.
- 2010‑12‑16:
A better code of urban design for America.
- 2010‑12‑16:
Make snow chains for your bicycle from cable ties.
- 2010‑12‑15:
fabricate - a Python build tool with automatic dependency discovery.
- 2010‑12‑15:
Dan Kaminsky's anomalous colour vision fixer app for iPhones.
- 2010‑12‑15:
Why John Cage's 4'33" is no laughing matter.
- 2010‑12‑15:
The only build system that might someday replace make... ?
- 2010‑12‑15:
Bytecode verifier for Lua-5.2
- 2010‑12‑15:
Allegations that the FBI backdoored OpenBSD IPSEC.
- 2010‑12‑15:
Lua / C++ binding generators compared.
- 2010‑12‑14:
<input type=password> needs to grow up.
- 2010‑12‑14:
BSD For Linux Users.
- 2010‑12‑14:
Status of FreeBSD on Amazon EC2.
- 2010‑12‑13:
An Amazon Web Services news roundup, including a link to yours truly.
- 2010‑12‑13:
Visualizing sorting algorithms.
- 2010‑12‑13:
Original Tron is losing DVD sales while stuck in the Disney Vault.
- 2010‑12‑13:
Open Research Computation: An ordinary journal with extraordinary aims.
- 2010‑12‑12:
The day MAME saved my company.
- 2010‑12‑11:
Filming the LEGO Antikythera mechanism.
- 2010‑12‑11:
A LEGO version of the Antikythera mechanism.
- 2010‑12‑11:
Why apparently banal revelations can have very important political consequences.
- 2010‑12‑10:
The utter balls people write about Oxbridge.
- 2010‑12‑09:
Comcast's protocol-agnostic congestion management system.
- 2010‑12‑09:
The Royal Statistical Society Magazine on race and Oxbridge.
- 2010‑12‑09:
Clay Shirky on Wikileaks.
- 2010‑12‑09:
A free press [has] the duty to prevent...government from deceiving the people and sending them off to distant lands to die.
- 2010‑12‑08:
There is no such thing as a non-obvious invention.
- 2010‑12‑08:
The Wikileaks publications are caused by a failure to compartmentalize.
- 2010‑12‑07:
One ambassador's embarrassment is a tragedy; 15 000 civilian deaths is a statistic.
- 2010‑12‑07:
VeriSign launches cloud-based DNSSEC signing service. (Where are the docs?)
- 2010‑12‑07:
Making all data races manifest themselves.
- 2010‑12‑06:
Autonomous sycamore-seed single-blade mini helicopters.
- 2010‑12‑06:
Mary Beard visits the Cambridge University Library tower.
- 2010‑12‑06:
On the duality of operating system structures - events vs. threads.
- 2010‑12‑06:
Yacc is not dead.
- 2010‑12‑06:
Continuation-passing C: automatically rewriting thraded C into event-passing C.
- 2010‑12‑06:
The intellectual propeerty implications of low-cost 3D printing.
- 2010‑12‑05:
Ghosts of Unix Past: a historical search for design patterns.
- 2010‑12‑05:
When seekdir() didn't seek to the right position.
- 2010‑12‑05:
What the attacks on WikiLeaks tell us.
- 2010‑12‑04:
Explaining the Comcast / Level3 peering dispute.
- 2010‑12‑04:
Jim Gettys on buffer bloat. (TCP Vegas is the answer!)
- 2010‑12‑03:
The Fossil distributed software management system - version control + wiki + bug tracker.
- 2010‑12‑03:
The TH scripting language.
- 2010‑12‑03:
Git and Mercurial users should gang up against Subversion.
- 2010‑12‑03:
Unbelievably easy mince pie recipe.
- 2010‑12‑03:
Medical researcher rediscovers integration and gets 75 citations.
- 2010‑12‑03:
Understanding pac-man ghost behaviour.
- 2010‑12‑03:
Why Google Maps's city labels are more readable than the others'.
- 2010‑12‑02:
French libel law abuse: professor of public health sued for saying that cigarettes kill.
- 2010‑12‑01:
Obituary of Maurice Wilkes in the Guardian.
- 2010‑12‑01:
Obituary of Maurice Wilkes in the Independent.
- 2010‑12‑01:
Obituary of Maurice Wilkes in the Telegraph.
- 2010‑12‑01:
dpkg vs. ext4fs - safety vs performance.
- 2010‑12‑01:
Canon "original data" security kit is thoroughly cracked.
- 2010‑11‑30:
BBC obituary of Maurice Wilkes.
- 2010‑11‑30:
NetReg - CMU's network registration system.
- 2010‑11‑30:
Obituary of Benoït Mandelbrot in the Independent.
- 2010‑11‑30:
Obituary of Benoît Mandelbrot in the Telegraph.
- 2010‑11‑30:
Obituary of Benoït Mandelbrot in the Guardian.
- 2010‑11‑30:
Programmer competency matrix.
- 2010‑11‑30:
Carne Ross on Wikileaks / cablegate.
- 2010‑11‑29:
The Crash at Crush - the staged train wreck of 1896.
- 2010‑11‑29:
Pure and declarative syntax definition: paradise lost and regained.
- 2010‑11‑29:
Progress with libgit2.
- 2010‑11‑29:
Sir Maurice Wilkes, DFBCS FREng FRS, 1913 - 2010.
- 2010‑11‑29:
Copyright lawyers sue lawyer who helped copyright defendants.
- 2010‑11‑29:
Regular-expression derivatives re-examined.
- 2010‑11‑29:
Yacc is dead - parsing with derivatives.
- 2010‑11‑29:
24 ways - web design and development articles and tutorials for advent.
- 2010‑11‑28:
Jean-Baptiste Alphonse Karr: "plus ça change, plus c'est la même chose".
- 2010‑11‑28:
Lua interpreter compiled from C to JavaScript using Emscripten.
- 2010‑11‑28:
x86 optimization resources.
- 2010‑11‑28:
Land of Lisp / insect nation.
- 2010‑11‑28:
The art of the interpreter.
- 2010‑11‑28:
Learn You a Haskell for Great Good!
- 2010‑11‑28:
Die unerträgliche Lameness des Web 2.0 (English version).
- 2010‑11‑28:
How DST caused severe database performance problems.
- 2010‑11‑28:
Statistical fingertrees - Haskell code to dynamically combine and split means and variances.
- 2010‑11‑28:
Earliest known uses of some of the words of mathematics.
- 2010‑11‑28:
The triumph of types: Principia Mathematica's impact on computer science.
- 2010‑11‑27:
A 15-minute writing exercise closes the gender gap in physics at university.
- 2010‑11‑27:
FreeBSD network performance tuning.
- 2010‑11‑27:
US Immigration and Cusoms Enforcement siezes domain names involved in copyright infringement.
- 2010‑11‑27:
Review: How equal temperament ruined harmony.
- 2010‑11‑27:
High quality motion deblurring from a single image.
- 2010‑11‑27:
Why blurring sensitive text is a bad idea.
- 2010‑11‑27:
How to understand your hot and cold water system.
- 2010‑11‑26:
A GSM hacking blog.
- 2010‑11‑26:
0wnz0red by Cory Doctorow.
- 2010‑11‑26:
Steal this presentation.
- 2010‑11‑26:
You suck at PowerPoint!
- 2010‑11‑26:
How Objective C method dispatch works.
- 2010‑11‑26:
No, you can't have Matt Blaze's slides.
- 2010‑11‑26:
Having children abroad? Your country might not accept them as citizens.
- 2010‑11‑26:
A typographic anatomy lesson.
- 2010‑11‑26:
Police to get power to sieze UK domain names.
- 2010‑11‑26:
AeroPress coffee maker.
- 2010‑11‑25:
What things did scientists long believe which turned out to be wrong?
- 2010‑11‑23:
Give money to Bletchley Park to buy Alan Turing's papers for the nation.
- 2010‑11‑23:
Benchmarking the native Linux ZFS module.
- 2010‑11‑23:
That Alternative Vote ballot paper in full.
- 2010‑11‑23:
Are you holding back something that seems too obvious to share?
- 2010‑11‑23:
How complete is the RIPE routing registry.
- 2010‑11‑22:
Bicycles & tricycles: an elementary treatise on their design and construction. (1896)
- 2010‑11‑22:
Novell sold to Attachmate (who?)
- 2010‑11‑22:
Why π does not equal 4.
- 2010‑11‑22:
A collection of .gitignore templates.
- 2010‑11‑22:
LaTeX coffee stains.
- 2010‑11‑21:
Goodbye Ireland, it was nice knowing you.
- 2010‑11‑21:
IKEA hacker.
- 2010‑11‑20:
The government's badger culling policy encourages the spread of bovine TB.
- 2010‑11‑19:
WebKit security bug caused by unchecked NaN tagging.
- 2010‑11‑19:
NaN tagging in Mozilla JaegerMonkey.
- 2010‑11‑19:
Security and NaN tagging.
- 2010‑11‑19:
Alejandro Caro invented NaN tagging for Parallel Haskell in 1997.
- 2010‑11‑19:
Understanding the strict aliasing rule in C.
- 2010‑11‑19:
Keyboard buddy iPhone 4 case.
- 2010‑11‑19:
Periodic and chaotic iteration and the structure of the Mandelbrot set.
- 2010‑11‑19:
Renesys on China's 18 minute Internet traffic interception.
- 2010‑11‑18:
Constructive Eating - children's cutlery.
- 2010‑11‑18:
Bladon Jets: micro gas turbines.
- 2010‑11‑18:
Jaguar C-X75 concept hybrid electric / gas turbine car.
- 2010‑11‑18:
NaN tagged objects used by SuperCollider in 2002.
- 2010‑11‑16:
John Hubbard gives a tour of the Mandelbrot set.
- 2010‑11‑15:
David Madore's Mandelbrot movies and images.
- 2010‑11‑13:
An asymmetric umbrella that turns into the wind, not inside-out.
- 2010‑11‑13:
Schizophrenia seems to be caused by an endogenous retrovirus.
- 2010‑11‑12:
Evan Harris on #twitterjoketrial and #stoningcase.
- 2010‑11‑12:
Does the law treat killing a cyclist seriously enough?
- 2010‑11‑12:
Are we fast yet? Javascript benchmark graphs.
- 2010‑11‑11:
The Economist on the true size of Africa.
- 2010‑11‑11:
How to clean a decanter.
- 2010‑11‑11:
Slides for Dan Kaminsky's talk about his Phreebird easy DNSSEC software.
- 2010‑11‑11:
Dan Kaminsky to release easy DNSSEC-ifying proxy for authoritative servers.
- 2010‑11‑11:
Calculating base 2 logarithms quickly using floating point hardware.
- 2010‑11‑10:
Lost Book Sales.
- 2010‑11‑10:
Suggestions for short trips to abandoned bits of Britain.
- 2010‑11‑10:
Seven cycling mistakes and how to correct them.
- 2010‑11‑09:
The Times' paywall and newsletter economics.
- 2010‑11‑09:
Sailing downwind three times faster than the wind.
- 2010‑11‑09:
Feynman on magnets and ice and why? (Youtube)
- 2010‑11‑09:
Boeing 7*7 in a line for the first time.
- 2010‑11‑08:
Think of it as a graduate tax, not as tuition fees.
- 2010‑11‑08:
Graphs of the distribution of RIPE's IP address allocations over the last 20 years.
- 2010‑11‑08:
Why McDonald's hamburgers do not decay.
- 2010‑11‑08:
Common errors in English usage.
- 2010‑11‑07:
How to use the Ames lettering guide.
- 2010‑11‑07:
Raising the Internet MTU.
- 2010‑11‑06:
Moving beyond TCP/IP.
- 2010‑11‑05:
Life beyond distributed transactions: an apostate's opinion.
- 2010‑11‑05:
S4: a distributed stream computing platform from Yahoo! Labs.
- 2010‑11‑05:
Sudoku as a constraint problem - how to grade the difficulty of a puzzle.
- 2010‑11‑04:
Sinclair Research X-1 electric vehicle - the return of the C5!
- 2010‑11‑04:
Uninstall Flash to extend your battery life.
- 2010‑11‑04:
A stick-figure guide to AES.
- 2010‑11‑04:
Collection of spoof musical notation and silly scores.
- 2010‑11‑03:
Comparing DNS resolvers in the wild: Google vs. OpenDNS vs. your ISP.
- 2010‑11‑03:
The Earth considered as an oscillator and frequency standard.
- 2010‑11‑02:
Kidnapping, theft, and rape by cyber criminals.
- 2010‑11‑02:
Dreck in the halls - unseasonal clichés.
- 2010‑11‑02:
mdocml: a man-only replacement for groff.
- 2010‑11‑02:
Bell System Technical Journal: every edition 1922 - 1983 online.
- 2010‑11‑02:
Customizing the Mac OS X Cocoa Text system (brief overview).
- 2010‑11‑02:
Customizing the Mac OS X Cocoa Text system.
- 2010‑11‑02:
Higher-level keyboard rebinding for Cocoa apps on Mac OS X.
- 2010‑11‑02:
Installable keyboard layouts on Mac OS X.
- 2010‑11‑02:
Solar calendar leap rules.
- 2010‑10‑31:
The opening up of GSM.
- 2010‑10‑29:
DNSSEC deployment schedule for the .net and .com zones.
- 2010‑10‑29:
Daylight saving, electricity demand, and emissions - CE(S)T would reduce it by 0.27%.
- 2010‑10‑29:
RoSPA lobbying to move Britain to CE(S)T.
- 2010‑10‑29:
iPhone serial port hack.
- 2010‑10‑29:
CMPH - C Minimal Perfect Hashing Library.
- 2010‑10‑28:
Slot machines vs. voting machines.
- 2010‑10‑28:
Sharing desktops one window at a time, using VNC over XMPP.
- 2010‑10‑28:
Your desk job is slowly killing you.
- 2010‑10‑28:
Millimetres matter in an insect pie fight.
- 2010‑10‑27:
Dimensional analysis using C++ templates.
- 2010‑10‑27:
Spam, hacking, corruption, blackmail, kidnap, and rape.
- 2010‑10‑27:
How to make a hemispherum sundial.
- 2010‑10‑26:
DNSSEC or not?
- 2010‑10‑26:
The security of password expiration: a fast cracking algorithm and empirical analysis.
- 2010‑10‑26:
Characteristics of toxic organizations.
- 2010‑10‑26:
Explaining the coalition to Scandinavians.
- 2010‑10‑26:
An elementary proof of the undecidability of the halting problem - in verse.
- 2010‑10‑26:
Computer systems: a programmer's perspective (not a builder's).
- 2010‑10‑25:
Recommendation for a new Internet routing architecture.
- 2010‑10‑25:
Design goals for scalable Internet routing.
- 2010‑10‑25:
On the scalability of Internet routing.
- 2010‑10‑23:
Smoothly colouring the complement of the Mandelbrot set.
- 2010‑10‑22:
Qubes OS: security by isolation.
- 2010‑10‑22:
The NYT mag on language: "truthiness".
- 2010‑10‑21:
Making something hard to read means it is more likely to be remembered.
- 2010‑10‑21:
A new home for the Olson TZ database at IANA?
- 2010‑10‑21:
How Facebook decides whether to show your updates to your friends.
- 2010‑10‑21:
Head of Metropolitan Police Central e-Crime unit lied under oath.
- 2010‑10‑21:
Unsafe unfused plugs coming into the UK.
- 2010‑10‑20:
HTML mail: cute idea or abomination?
- 2010‑10‑20:
Create a paper sundial customized to a location you mark on Google Maps.
- 2010‑10‑20:
Australian school leaving exam grades are given as the percentile rank of the candidate's results.
- 2010‑10‑20:
Charlie Stross on credentialism and higher education restructuring.
- 2010‑10‑19:
When Dilbert came to Nokia.
- 2010‑10‑19:
Comcast rolls out DNSSEC.
- 2010‑10‑18:
Amazing Mandelbrot set tattoo.
- 2010‑10‑18:
xapply - another concurrent xargs replacement.
- 2010‑10‑18:
GNU Parallel - replacement for xargs with concurrent subprocesses.
- 2010‑10‑18:
The "ladies' night" strategy in two-sided markets.
- 2010‑10‑18:
Interesting privilege escalation vulnerability running setuid binaries with the glibc dynamic linker.
- 2010‑10‑18:
Cultural heritage of astronomical observatories.
- 2010‑10‑18:
Advice on composing a .sig from the NYT.
- 2010‑10‑18:
Emergency Navigation: improvised and no-instrument methods for the prudent mariner.
- 2010‑10‑18:
Solar warm air heating system using glass roof tiles.
- 2010‑10‑18:
What is wrong with extending the DOM.
- 2010‑10‑17:
MCE OptiBay - replace Mac DVD SuperDrive with a hard disk drive.
- 2010‑10‑17:
BlindType - clever touch phone typing autocorrection.
- 2010‑10‑16:
Homeopathetic Order Logic.
- 2010‑10‑14:
A brief history of ARM.
- 2010‑10‑14:
Tube Map Central.
- 2010‑10‑14:
The Axis of Awesome - Four Chord Song. (youtube) :-)
- 2010‑10‑14:
The Aten heliochronometer.
- 2010‑10‑14:
McDonalds say dried-out food doesn't get mouldy.
- 2010‑10‑14:
History of the Super Soaker.
- 2010‑10‑14:
Super Soaker inventor has designed a new kind of solar generator.
- 2010‑10‑14:
What a 12-year-old McDonalds hamburger looks like.
- 2010‑10‑14:
Blosc: loss-less compression faster than memcpy().
- 2010‑10‑14:
The Well Grounded Java Developer, covering Java 7.
- 2010‑10‑14:
Design principles behind Smalltalk.
- 2010‑10‑14:
Rubik's Sundial Cube.
- 2010‑10‑13:
ThinPlug - folding UK plug (unearthed).
- 2010‑10‑12:
Peter's Principle confirmed: meritocratic hierarchial organizations are built to fail.
- 2010‑10‑12:
Protocol Politics: a book about IPv6 deployment.
- 2010‑10‑12:
High speed logarithmic arithmetic processor.
- 2010‑10‑08:
OpenDNSSEC monitoring tools.
- 2010‑10‑08:
DNSSEC monitoring tools used by the .se TLD.
- 2010‑10‑07:
Eloquent JavaScript: a modern introduction to programming.
- 2010‑10‑06:
Irish government discovers that 7000 unused voting machines costing €50m are now worthless.
- 2010‑10‑06:
Top level domain DNSSEC deployment report.
- 2010‑10‑06:
Domain registrations under the .ly Libya TLD should be considered unsafe.
- 2010‑10‑06:
Comet: a distributed key-value store for active objects scripted in Lua.
- 2010‑10‑06:
Man fined $1B for sending Facebook spam.
- 2010‑10‑05:
Cyclist found not guilty of assault after being strangled by a taxi driver and stitched up by the police.
- 2010‑10‑05:
Cleverly scratched glasses give perfect vision for any eyesight.
- 2010‑10‑05:
Cross-site scripting by putting JavaScript in DNS records.
- 2010‑10‑01:
TTYtter: Perl command-line and interactive terminal-based Twitter client.
- 2010‑09‑30:
HDCP encryption/decryption code.
- 2010‑09‑30:
The world's longest disused guided busway.
- 2010‑09‑30:
How to configure Thunderbird to avoid Exchange's inability to handle Content-Disposition: inline.
- 2010‑09‑30:
Google's use of Haskell for virtual machine cluster load balancing.
- 2010‑09‑30:
Linux's "swap insanity" problem and the effects of the NUMA architecture.
- 2010‑09‑29:
FDA bureacratic interference seriously discourages the development of new antibiotics.
- 2010‑09‑29:
Five reasons to stop praising your child.
- 2010‑09‑29:
MathJax: beautiful maths in all browsers.
- 2010‑09‑29:
Russ Allbery's coding style notes (including docs and build system).
- 2010‑09‑28:
Quicksort is faster with two pivots.
- 2010‑09‑28:
Internet Failures: an emergent sea of complex systems and critical design errors?
- 2010‑09‑27:
ILNP - Identifier/Locator Network Protocol - another attempt to fix IPv6's scalability.
- 2010‑09‑27:
Lego Tower Bridge.
- 2010‑09‑26:
Is Gideon Levy the most hated man in Israel or just the most heroic?
- 2010‑09‑26:
Margaret Stanier's memorial unequal-hours sundial at Newnham.
- 2010‑09‑26:
The Spamhaus Whitelist.
- 2010‑09‑25:
Bonfire of the quangos - find out what they know before they shred everything!
- 2010‑09‑24:
Most software patents do not survive a lawsuit.
- 2010‑09‑24:
Incident report for the .uk DNSSEC screwup of 11 Sep.
- 2010‑09‑24:
ltwitter: Lua Twitter client.
- 2010‑09‑24:
iOS programming with Lua.
- 2010‑09‑24:
A digital media primer for geeks. (30 min. video)
- 2010‑09‑24:
Endlich: das xphone. (youtube) :-)
- 2010‑09‑24:
makespace - Cambridge "inventing shed" / hackspace.
- 2010‑09‑23:
Pinion P-1: a bottom-bracket bike gearbox.
- 2010‑09‑23:
BookBook: a MacBook case that looks like an old hardback.
- 2010‑09‑23:
evercookie - virtually irrevocable persistent cookies.
- 2010‑09‑22:
A path-finding algorithm for loop-free routing.
- 2010‑09‑22:
libconfig - configuration file library for C and C++.
- 2010‑09‑21:
AppTamer: Mac OS X GUI for SIGSTOP and renice.
- 2010‑09‑21:
Unibody MacBook chopping board.
- 2010‑09‑21:
Copilot: a Haskell DSL for writing embedded hard real time avionics code.
- 2010‑09‑21:
Perian: universal codec for QuickTime.
- 2010‑09‑21:
A Linux feature to get more info about dying processes. (/proc/sys/kernel/core_pattern)
- 2010‑09‑20:
Using an Apple Aluminium keyboard with Linux.
- 2010‑09‑20:
Using the Apple Bluetooth keyboard with the Nokia N800.
- 2010‑09‑20:
On-line tools to test your DNS setup.
- 2010‑09‑20:
The Twitter Joke trial - mindless authoritatianism in modern Britain.
- 2010‑09‑20:
iPhones for the blind.
- 2010‑09‑19:
Gene for short-sightedness discovered.
- 2010‑09‑19:
How to stifle the British press.
- 2010‑09‑19:
Visual transistor-level simulation of the 6502 microprocessor.
- 2010‑09‑19:
ICSI Netalyzr - connectivity debugging.
- 2010‑09‑19:
Network Performance Knowledge Base - Issues for Bulk Data Transfer over a WAN.
- 2010‑09‑17:
Machine learning spam filter based on the Google Prediction API.
- 2010‑09‑17:
A small fraction of selfish referees can drastically reduce the quality of published science.
- 2010‑09‑17:
What's cooking for FreeBSD 9?
- 2010‑09‑17:
Steve Jobs ninja stars revealed to be iPod prototypes.
- 2010‑09‑17:
Police sabotage News of the World investigation by intimidating whistle-blowers.
- 2010‑09‑17:
Using colour in information display graphics.
- 2010‑09‑16:
How to get SMS delivery reports on an iPhone.
- 2010‑09‑16:
SCSI debug driver for Linux - configurable block size and error generation.
- 2010‑09‑16:
Solomon Linda and "The Lion Sleeps Tonight".
- 2010‑09‑16:
John's Phone is the world's simplest cell phone.
- 2010‑09‑16:
earPod - iPhone earbud case.
- 2010‑09‑16:
miniWINDER - iPhone earbud case.
- 2010‑09‑16:
earBuddy - iPhone earbud case.
- 2010‑09‑16:
BudCase 2 - iPhone ear bud case.
- 2010‑09‑15:
Paedophile priests still supported by UK Catholic church.
- 2010‑09‑15:
Popular usernames and passwords. (word clouds)
- 2010‑09‑15:
Brilliant 3D light painting stop motion animation with iPads. (vimeo)
- 2010‑09‑14:
Musicians make more money in file-sharing age than before.
- 2010‑09‑14:
HDCP master key leaked?
- 2010‑09‑14:
Musopen - copyright-free classical music recordings.
- 2010‑09‑14:
Mac OS X hidden features and useful tricks.
- 2010‑09‑14:
"Thinking meat! You're asking me to believe in thinking meat!"
- 2010‑09‑14:
Experimental JIT-compiled version of LPEG.
- 2010‑09‑14:
Calm networking.
- 2010‑09‑13:
Official response from the USA to the ITU-R on the abolition of leap seconds. (docx)
- 2010‑09‑13:
AppleScript code to avoid top-posted replies in Mail.app.
- 2010‑09‑13:
Professor Brindley's famous lecture about the first effective remedy for erectile disfunction.
- 2010‑09‑13:
Alec Muffett thinks remote wipe is OK. (I think he is too sanguine.)
- 2010‑09‑13:
MS Exchange server admins can remotely wipe client devices!!
- 2010‑09‑12:
The man who makes your iPhone.
- 2010‑09‑11:
How iPhones detect wifi captive portals.
- 2010‑09‑11:
Fortifying Scheme macros.
- 2010‑09‑11:
Court upholds EULAs, threatening digital resale.
- 2010‑09‑11:
Topology-independent flat addressing makes sub-linear routing table sizes impossible.
- 2010‑09‑10:
Reverse traceroute.
- 2010‑09‑10:
Why parents can't do primary school maths any more.
- 2010‑09‑10:
Network Heretics on timezone identifiers.
- 2010‑09‑10:
MobilityFirst future internet architecture.
- 2010‑09‑10:
XIA: the expressive internet architecture.
- 2010‑09‑09:
Test your internet connection speed. Is your provider throttling certain apps?
- 2010‑09‑09:
Apple relaxes restrictions on development tools used to create iOS apps, provided the apps do not download any code.
- 2010‑09‑09:
Urs Hölzle: Brawny cores still beat wimpy cores, most of the time.
- 2010‑09‑09:
Why blue collar Americans switched from the Democrats to the Republicans.
- 2010‑09‑09:
Longyearbyen: the most northerly sundial.
- 2010‑09‑09:
On packet switches with infinite storage.
- 2010‑09‑08:
The annual workshop on duplicating, deconstructing, and debunking research in computer architecture.
- 2010‑09‑08:
Why we don't need more women in tech ... yet.
- 2010‑09‑08:
A retrospective on software transactional memory (wrt C#).
- 2010‑09‑07:
A classically-trained singing instructor reviews five metal singers.
- 2010‑09‑07:
Great microprocessors of the past and present.
- 2010‑09‑07:
Mediaeval helpdesk. (youtube)
- 2010‑09‑07:
Subtleties of search-and-replace in Emacs.
- 2010‑09‑07:
The "premature optimization is evil" myth.
- 2010‑09‑07:
Pictures of a morris dancing event in London.
- 2010‑09‑06:
SURFnet (Dutch academic network) DNSSEC survey.
- 2010‑09‑06:
Alan Turing and reaction-diffusion.
- 2010‑09‑06:
More parkour in Cambridge.
- 2010‑09‑06:
Parkour in Cambridge.
- 2010‑09‑06:
University of Cambridge corporate typography and design guidelines.
- 2010‑09‑06:
Rethinking the service model: scaling ethernet to a million nodes.
- 2010‑09‑06:
The Bernhardt precision sundial.
- 2010‑09‑06:
Dangermouse's esoteric programming languages and algorithms.
- 2010‑09‑04:
syslogintr: a syslog daemon configured with Lua.
- 2010‑09‑04:
Stephen Hawking denies God.
- 2010‑09‑04:
A nifty new jet engine design promises to improve combustion efficiency.
- 2010‑09‑04:
Most of the environmental impact of an electric car comes from its operation not from battery manufacture.
- 2010‑09‑04:
Cool tech drives the strong demand for Java skills.
- 2010‑09‑04:
Paul Allen's patent are not worth single penny - execution counts, not lawsuits.
- 2010‑09‑03:
Why is everyone always writing off Netflix?
- 2010‑09‑03:
Thomas Edison's plot to patent the movie industry to death.
- 2010‑09‑03:
SSL Certificate Authorities: the Internet's cryptography back door.
- 2010‑09‑03:
Edwina Currie was right about salmonella.
- 2010‑09‑03:
U.S. rejected chicken salmonella vaccination despite British success.
- 2010‑09‑02:
The third-world squat.
- 2010‑09‑02:
How defecation posture affects your health.
- 2010‑09‑02:
Why can you turn clothing inside-out?
- 2010‑09‑02:
How to lose data.
- 2010‑09‑02:
Productivity tips for academics.
- 2010‑09‑02:
Five myths about the female brain.
- 2010‑09‑02:
Netflix lets its staff take as much holiday as they want, whenever they want - and it works.
- 2010‑09‑02:
How Twitter does OAuth wrong, and how to compromise it.
- 2010‑09‑02:
Problems with ACID and scalability, and how to fix them without going NoSQL.
- 2010‑09‑02:
Fast cache for your text: accelerating exact pattern matching with feed-forward Bloom filters.
- 2010‑09‑02:
CPU clock rates stopped growing in 2003. (article text 2005; graph updated 2009)
- 2010‑09‑02:
Represent sets using products of primes.
- 2010‑09‑02:
A complete history of the Soviet Union from the point of view of the workers - or is it Tetris?.
- 2010‑09‑02:
Strength training for parkour.
- 2010‑09‑02:
Impressive parkour in Cambridge.
- 2010‑09‑02:
Ten easy ways to fail a PhD.
- 2010‑09‑02:
Ubercab aims to disrupt the taxi business.
- 2010‑09‑02:
The New York Times on the News of the World hacking voicemail for celebrity gossip.
- 2010‑09‑01:
UK Youth Parliament report on sex education.
- 2010‑09‑01:
Google Summer of Code project: dynamic NetBSD kernel extensions written in Lua.
- 2010‑09‑01:
Mail abuse reporting format spec finally published as RFC 5965.
- 2010‑09‑01:
Lord Tanlaw summarizes the UTC vs. GMT argument in UK law.
- 2010‑09‑01:
Charles Darwin terraformed Ascension Island.
- 2010‑09‑01:
The fake telephone tech support scam - supportonclick, systemrecure and logmein123.com.
- 2010‑09‑01:
Compile Haskell to synthesizable VHDL.
- 2010‑09‑01:
Who would gain from copyright restrictions on fashion?
- 2010‑09‑01:
Make Time Machine aware of your Mac's location.
- 2010‑08‑31:
Wrongfully accused of copyright infringement? File for harassment.
- 2010‑08‑31:
Shameful news industry sacrifices Wikileaks to get shield law.
- 2010‑08‑31:
Commercialization of IP in Canadian universities is barely better than break-even.
- 2010‑08‑31:
Man blows himself up trying to kill a spider.
- 2010‑08‑31:
Google's acquisition appetite.
- 2010‑08‑31:
On the typography and character set encoding of the apostrophe and quotation mark.
- 2010‑08‑31:
Magnetic coasters on a table inlaid with compasses.
- 2010‑08‑31:
Paul Allen becomes another ex-Microsoft patent troll.
- 2010‑08‑30:
Live Irish electricity consumption graph.
- 2010‑08‑30:
Computational necromancy: homebrew Cray-1A.
- 2010‑08‑28:
Subliminal advertising of Apple logo makes viewers more creative than IBM logo.
- 2010‑08‑27:
Touch application design for toddlers.
- 2010‑08‑27:
A fast Bresenham-type algorithm for drawing ellipses.
- 2010‑08‑25:
The war on children's playgrounds.
- 2010‑08‑25:
Swimming and freedom: can liberals and libertarians agree on regulations they both hate?
- 2010‑08‑25:
How Mono's new generational garbage collector rocks.
- 2010‑08‑25:
Notes on retooling libraries: "The coolest thing to do with your data will be thought of by someone else."
- 2010‑08‑25:
British Library makes catalogue data available for free to non-commercial users.
- 2010‑08‑25:
We don't need a github for data.
- 2010‑08‑25:
Is there anything good about men?
- 2010‑08‑25:
The story of the king and the calligrapher.
- 2010‑08‑25:
The strange case of solar flares and radioactive elements.
- 2010‑08‑25:
Introduction to parallel & distributed algorithms.
- 2010‑08‑25:
How anycast routing works for the ISC's F root DNS server.
- 2010‑08‑24:
Support for TCP is now a REQUIRED part of a full DNS protocol implementation.
- 2010‑08‑24:
The high cost of copyright - brilliant jazz recordings that cannot be sold.
- 2010‑08‑24:
The great university con: why giving degrees out willy-nilly doesn't actually help the economy.
- 2010‑08‑24:
PacketShader: a GPU-accelerated software router.
- 2010‑08‑24:
Tamale: Erlang-style pattern matching for Lua.
- 2010‑08‑24:
Why GNU grep is fast.
- 2010‑08‑24:
Gnu grep's treacherous optimization.
- 2010‑08‑24:
The self-tuning Boyer-Moore string search algorithm.
- 2010‑08‑23:
How one driver can eliminate stop-go traffic.
- 2010‑08‑23:
Looking back on the "free range kids" media storm.
- 2010‑08‑22:
The Internet transit market ant the gravitational pull to $0/Mbps.
- 2010‑08‑22:
Indian researcher arrested over anonymous source of voting machine.
- 2010‑08‑21:
Why 3G is a worthless marketing buzzword.
- 2010‑08‑21:
Lithium: robust distributed storage for virtual machines.
- 2010‑08‑20:
Center for automotive embedded systems security.
- 2010‑08‑20:
Jobs was right: Flash is bad on Android.
- 2010‑08‑19:
Incorrect perceptions of energy consumption and saving.
- 2010‑08‑18:
Fast incremental regular expression matching with monoids.
- 2010‑08‑18:
C programming language reference manual. (1975)
- 2010‑08‑18:
A Unix system implementation for the IBM S/370. (1984)
- 2010‑08‑18:
Porting Unix to a 36-bit ones complement machine.
- 2010‑08‑18:
Portability of C programs and the Unix system. (1978)
- 2010‑08‑18:
C programming language reference manual. (1974)
- 2010‑08‑16:
Inside Android's stripped-down libc.
- 2010‑08‑16:
Companies should not be able to sue (or threaten to sue) for libel.
- 2010‑08‑16:
Infants die of whooping cough while media stoke fear of vaccines.
- 2010‑08‑16:
Schengen attracts tourists to the continent; fiddly visas repel them from Britain.
- 2010‑08‑16:
Poor record keeping and pension fraud inflated number of Japanese centenarians.
- 2010‑08‑16:
Detailed and systematic comparison of system configuration management tools.
- 2010‑08‑16:
Five reasons why this is the only online SEO marketing blog entry you will ever need to read.
- 2010‑08‑16:
Jef Poskanzer's oauth_sign software.
- 2010‑08‑16:
The Ark Booktower at the Victoria & Albert museum.
- 2010‑08‑15:
Strangest programming language features.
- 2010‑08‑13:
The Swedish Chef makes pöpcørn :-)
- 2010‑08‑13:
Andrew Odlyzko on bubbles and gullibility.
- 2010‑08‑13:
HMRC throws a spanner in the wheels of the Cycle to Work scheme.
- 2010‑08‑13:
How to get Apple Mail to work well with GMail's weird IMAP implementation.
- 2010‑08‑13:
Nice profile of Hans Monderman and his shared streets.
- 2010‑08‑12:
Old Spice Man vs. Feminist Hulk.
- 2010‑08‑12:
Venting your anger does NOT reduce stress and prevent lashing out at friends and family.
- 2010‑08‑12:
Collisions in PDF digital signatures.
- 2010‑08‑11:
Why the Complementary and Natural Healthcare Council (Ofquack) cannot succeed.
- 2010‑08‑11:
Adobe fails at handling case-sensitive filesystems.
- 2010‑08‑11:
Political arguments over the Islamic calendar and the start of Ramadan.
- 2010‑08‑11:
A clearinghouse for news and analysis of Vinay Deolalikar's P != NP preprint.
- 2010‑08‑11:
Soundmatters foxL v2 portable speaker.
- 2010‑08‑11:
Jake Adelstein plays, reviews, and fact-checks "Yakuza 3" with real yakuza.
- 2010‑08‑11:
The first English dictionary of slang (1699) republished from a copy found in the Bodleian.
- 2010‑08‑11:
An infographic about infographics.
- 2010‑08‑10:
Apple: Link different.
- 2010‑08‑10:
Monsanto's soybean herbicide resistance patent cannot prevent EU sales of processed soybeans.
- 2010‑08‑10:
A decade of debate over UTC and the abolition of leap seconds.
- 2010‑08‑09:
Southampton FC bans unofficial photos to make money, so newspaper uses cartoons instead.
- 2010‑08‑09:
David Tennant fails at Scottish fashion.
- 2010‑08‑09:
Cambridge city centre speed limit reduced to 20mph.
- 2010‑08‑09:
Antonio Porreca rounds up informed opinion on Vinay Deolalikar's claimed proof of P ≠ NP.
- 2010‑08‑09:
Rubik's cube can be solved in 20 moves or fewer.
- 2010‑08‑09:
Hacker News on Vinay Deolalikar's draft proof of P ≠ NP.
- 2010‑08‑09:
P ≠ NP
- 2010‑08‑08:
The evolution of the double-edge safety razor blade.
- 2010‑08‑08:
The Moss shaving scuttle.
- 2010‑08‑08:
Deprecating the observer pattern in favour of reactive programming.
- 2010‑08‑08:
Monkeysphere - SSH and SSL authentication using the PGP web of trust.
- 2010‑08‑07:
The early history of HTML: 1990 to 1992.
- 2010‑08‑06:
Calculus made easy.
- 2010‑08‑06:
How to read mathematics.
- 2010‑08‑06:
What everyone should know about poo.
- 2010‑08‑05:
YAZVS - yet another zone validation script with DNSSEC support.
- 2010‑08‑05:
Type classes as objects and implicits (or, how to write Haskell in Scala).
- 2010‑08‑05:
Evan Harris on Mephedrone and making policy by moral panic.
- 2010‑08‑05:
A retrospective on SEDA (staged event-driven architecture).
- 2010‑08‑05:
Fred Brooks explains how to design anything.
- 2010‑08‑05:
Margin kerning and hanging punctuation in LaTeX.
- 2010‑08‑05:
The beauty of LaTeX.
- 2010‑08‑05:
Cheer yourself up with a happy password.
- 2010‑08‑05:
Improving the look of papers written in Microsoft Word.
- 2010‑08‑05:
Understanding and applying Operational Transformation.
- 2010‑08‑05:
Rubber handles all tasks related to the compilation of LaTeX documents.
- 2010‑08‑05:
Operational transformation - consistency maintenance and concurrency control for distributed groupware.
- 2010‑08‑03:
Oniguruma multi-encoding regex library.
- 2010‑08‑03:
Worst photo of Julian Huppert ever? (good interview, though)
- 2010‑08‑03:
Corning discovers display screen bonanza in super-strong glass invented in 1962.
- 2010‑08‑02:
Ultimate physical limits to computation.
- 2010‑07‑30:
ISC creates DNS blacklists for recursive DNS servers.
- 2010‑07‑30:
The longest photographic exposures ever.
- 2010‑07‑30:
Top 20 countries on the Internet - Nigeria is 10th!
- 2010‑07‑30:
Custom keyboard shortcuts do not work in Firefox on Mac OS X.
- 2010‑07‑29:
Node, scaling in the small vs in the large, events vs threads.
- 2010‑07‑28:
Frink: a programming language that understands units of measure.
- 2010‑07‑28:
Lua program analysis, in particular for editors.
- 2010‑07‑28:
How to meet interesting people in Cambridge.
- 2010‑07‑28:
SAS vs World Programming: landmark UK case about copyright law and cloned software.
- 2010‑07‑28:
The Guardian on Paul Kane being a root zone recovery key share holder.
- 2010‑07‑28:
Bookshelf porn.
- 2010‑07‑28:
"Metro" on Paul Kane being a root zone recovery key share holder.
- 2010‑07‑28:
Bath University's press release on Paul Kane being a root zone recovery key share holder.
- 2010‑07‑28:
CommunityDNS's press release on their CEO Paul Kane being a root zone recovery key share holder.
- 2010‑07‑27:
BlueSniff: Eve meets Alice and Bluetooth.
- 2010‑07‑27:
How secure is a Bluetooth keyboard against password sniffing?
- 2010‑07‑27:
The Times loses 90% of its readers after putting up its paywall.
- 2010‑07‑27:
Vulnerability found in WPA2.
- 2010‑07‑27:
HyperMac - external batteries for Apple gear.
- 2010‑07‑27:
Where should a new TLD get its registry and DNS services from?
- 2010‑07‑27:
The .uk TLD is 25 years old.
- 2010‑07‑27:
A study on the status of women faculty in science at MIT.
- 2010‑07‑27:
Great informative rant about women in technology.
- 2010‑07‑27:
Homemade scanning tunnelling electron microscope.
- 2010‑07‑26:
The New Yorker on WikiLeaks and the war.
- 2010‑07‑26:
Threaded blocking IO vs. async event-driven IO in Java.
- 2010‑07‑26:
Managing data storage at the south pole.
- 2010‑07‑26:
Celera's human genome trade secrets reduced research on affected genes by 30% despite their subsequent public domain release.
- 2010‑07‑26:
The Gimli Glider - what happens when a Boeing 767 runs out of fuel in mid-flight.
- 2010‑07‑26:
Autojump: a `cd` command that learns.
- 2010‑07‑26:
Tips and tricks for the Mac OS X command line.
- 2010‑07‑25:
"Open smartphone" is a lie.
- 2010‑07‑25:
George Monbiot on the CPS's decision not to prosecute for the death of Ian Tomlinson.
- 2010‑07‑25:
Jack of Kent on the CPS's decision not to prosecute for the death of Ian Tomlinson.
- 2010‑07‑25:
Whitehall still trying to cover up Labour government's misdeeds.
- 2010‑07‑25:
Cannabis and tobacco smoke are not equally carcinogenic.
- 2010‑07‑24:
Tangent Labs discovers that threatening to sue is the best way to make a name for shit web design.
- 2010‑07‑24:
The language we use affects the way we think.
- 2010‑07‑24:
You have no free will but you are responsible for your actions.
- 2010‑07‑24:
437 people harmed by homeopathy.
- 2010‑07‑23:
Objective measurements of the behaviour of drivers overtaking bicycles.
- 2010‑07‑23:
Cambridge Geek Night 4 - Tue 3rd Aug, 19:00 at the Union.
- 2010‑07‑23:
Speed cameras and accident statistics.
- 2010‑07‑23:
Wayward Alzheimer's patients foiled by fake bus stop.
- 2010‑07‑23:
Lesser-known but cool data structures.
- 2010‑07‑23:
Character amnesia - the increasing romanization of Chinese.
- 2010‑07‑23:
sshuttle - transparent proxy / vpn over ssh.
- 2010‑07‑23:
NY Times "opinionator" blog on the Dunning-Kruger effect - "incompetent and unaware of it".
- 2010‑07‑22:
World's first molten salt concentrating solar power plant.
- 2010‑07‑22:
A second look at SCons performance.
- 2010‑07‑22:
Low vaccination rates lead to deaths from whooping cough in California.
- 2010‑07‑22:
Israeli police torture Palestinians to improve their management stats.
- 2010‑07‑21:
Examining the structure of TCP/IP headers with Lego.
- 2010‑07‑21:
Abolishing university fees in Ireland did not improve access by students from poorer backgrounds.
- 2010‑07‑21:
Firefox 4 tabs-on-top fails to save vertical space. Why couldn't they copy the Safari 4 beta properly?
- 2010‑07‑21:
Columbus discovered the Americas and venereal syphilis.
- 2010‑07‑21:
The growing number of prosecutions in the USA for videoing the police.
- 2010‑07‑21:
A Newport state of mind. (hilarious!)
- 2010‑07‑20:
Will it Metablend? Recursively?
- 2010‑07‑20:
A Java implementation of the Lua Language.
- 2010‑07‑20:
Treventus ScanRobot automatic book scanner.
- 2010‑07‑20:
Source code for MacPaint and QuickDraw (1984) - Computer History Museum.
- 2010‑07‑20:
Three scripts to check your technical writing style.
- 2010‑07‑19:
Pure-food worshippers put their health at risk - especially when they drink unpasteurized milk.
- 2010‑07‑19:
Periodic table of visualization methods. (love the popups)
- 2010‑07‑19:
How the iPhone broke AT&T's network.
- 2010‑07‑19:
Stéphane Bortzmeyer on root DNSSEC, auto-translated from French (including a link to YT).
- 2010‑07‑19:
BookLiberator: a set of free software and hardware to digitize books.
- 2010‑07‑19:
Sexism hurts men too.
- 2010‑07‑19:
Periodic table of irrational nonsense.
- 2010‑07‑19:
Your Facebook friends had better be real friends or you may lose access to your account.
- 2010‑07‑19:
Iljitsch van Beijnum on DNSSEC in Ars Technica (including a link to YT).
- 2010‑07‑18:
Kimbolton Fireworks.
- 2010‑07‑18:
Gamma correction failure in picture scaling.
- 2010‑07‑18:
CoffeeScript - alternate syntax for JavaScript.
- 2010‑07‑18:
Vibration-powered generator - an internal recharger for remote controls.
- 2010‑07‑17:
Amazing automated underground car park in Budapest.
- 2010‑07‑16:
Jakob Schlyter's DNSSEC trust anchor tool.
- 2010‑07‑16:
anchors2keys - convert IANA XML trust anchors to BIND trusted-keys format.
- 2010‑07‑16:
DNSSEC validator add-on for Firefox.
- 2010‑07‑16:
DNSviz: a DNS visualization tool.
- 2010‑07‑16:
.SE's DNS checker (also with DNSSEC support).
- 2010‑07‑16:
Verisign's DNSSEC debugger.
- 2010‑07‑16:
Root zone DNSSEC trust anchors.
- 2010‑07‑16:
The Daily Mail moral underground map.
- 2010‑07‑15:
Vince Cable's speech on higher education.
- 2010‑07‑15:
Dumbster: a simple fake SMTP server for testing applications that send email.
- 2010‑07‑15:
Hidden features of Python.
- 2010‑07‑14:
Gender imbalance in various university subjects.
- 2010‑07‑14:
Basic mailing list management guidelines for preventing abuse. (Nov 2000)
- 2010‑07‑14:
Classic papers in OOP, including "Typestate: a programming language concept for enhancing software reliability."
- 2010‑07‑14:
Fifteen more creative staircases.
- 2010‑07‑14:
Nine creative staircases.
- 2010‑07‑14:
An alternative to the war on drugs.
- 2010‑07‑14:
The cache behaviour of large lazy functional programs on stock hardware.
- 2010‑07‑14:
Glasgow Haskell Compiler performance variation with differing gc tuning parameters.
- 2010‑07‑14:
Despair at the state of the art in build systems.
- 2010‑07‑14:
Hacker News Daily - the top ten stories each day.
- 2010‑07‑14:
Godbusters - "Don't cross the beams!"
- 2010‑07‑13:
'We Need Roots' - Englishness and the new folk revival.
- 2010‑07‑13:
Brazil forbids the use of DRM where that hinders fair use.
- 2010‑07‑13:
The Liberal Moment, by Nick Clegg. "The time has come for a new alignment of progressive politics..."
- 2010‑07‑13:
Typography for visually-impaired people.
- 2010‑07‑13:
Typefaces for dyslexia.
- 2010‑07‑12:
What happens when Twitter gets consumed by the Great Old Ones?
- 2010‑07‑12:
This week the root zone will switch to full DNSSEC production deployment.
- 2010‑07‑12:
Accurate garbage collection in an uncooperative environment.
- 2010‑07‑12:
Bitcoin: peer-to-peer electronic cash without a trusted third party.
- 2010‑07‑12:
The Liberal Democrat journey to a Lib-Con coalition - and where next? by Richard Grayson.
- 2010‑07‑12:
Artifactory, "the world's most advanced repository manager".
- 2010‑07‑11:
Are teenagers hooked on porn?
- 2010‑07‑10:
Why we hate HR.
- 2010‑07‑10:
George Hart's rapid prototyping models.
- 2010‑07‑09:
RedLaser barcode scanner for iPhone.
- 2010‑07‑09:
How to control web browser quirks/standards modes.
- 2010‑07‑09:
Jack of Kent on Hackney Council's bizarre treatment of the Conservative mayoral candidate.
- 2010‑07‑09:
Graydon Hoare - the Rust programming language.
- 2010‑07‑08:
UK urban exploration forums.
- 2010‑07‑08:
The proton is 3x10^-17 metres smaller than previously thought.
- 2010‑07‑08:
Petition to save the Silver Star unit.
- 2010‑07‑08:
The "Silver Star" maternal medicine unit at the John Radcliffe hospital in Oxford.
- 2010‑07‑08:
BT and TalkTalk challenge Digital Economy Act.
- 2010‑07‑07:
Drowning does not look like drowning.
- 2010‑07‑07:
Pro Git - complete book on line.
- 2010‑07‑07:
How can a website cost £35m? Easily.
- 2010‑07‑07:
The "num-utils" are a set of programs for dealing with numbers from the Unix command line.
- 2010‑07‑07:
"moreutils" is a growing collection of the unix tools that nobody thought to write long ago when unix was young.
- 2010‑07‑07:
Middle-aged men taking Viagra & Cialis three times more likely to have an STD than those not taking the drugs.
- 2010‑07‑07:
1&1 disables SpinProfiles lobbying watch web site for no good reason.
- 2010‑07‑07:
Counter-terrorism chief says government policy promotes terrorism.
- 2010‑07‑07:
Home birth scaremongering.
- 2010‑07‑06:
The length of the year is complicated.
- 2010‑07‑06:
How can you improve upon Debian's packaging system?
- 2010‑07‑06:
LBW: run unmodified Linux applications on Windows.
- 2010‑07‑06:
How could abundance be convincingly portrayed in the world of atoms as well as bits?
- 2010‑07‑05:
Extracts from "iPhone Four" by George Orwell.
- 2010‑07‑05:
Hackney Council threatens local paper with legal action over embarrassing recording.
- 2010‑07‑05:
A relational version of the zoneinfo database.
- 2010‑07‑05:
The Tea Party and the new right-wing Christian feminism.
- 2010‑07‑05:
Apple's app store is filled with "App farms" being used to steal.
- 2010‑07‑04:
Overclocking SSL.
- 2010‑07‑03:
The state of open source text rendering.
- 2010‑07‑03:
Andy Grove gripes about offshored tech jobs.
- 2010‑07‑03:
Genetic test predicts who will have a long life.
- 2010‑07‑03:
Speculators might not have caused commodity price rises.
- 2010‑07‑03:
The Better String Library.
- 2010‑07‑03:
Peer-to-peer edge caches should be free - the economics of content delivery.
- 2010‑07‑02:
How Goldman Sachs caused starvation by creating the 2006-2008 food price bubble.
- 2010‑07‑02:
Ratzinger failed to act as Roman Catholic abuse scandal grew.
- 2010‑07‑02:
Pirate Party to run The Pirate Bay from inside the Swedish parliament and get immunity from prosecution.
- 2010‑07‑02:
Christian science textbook says "Electricity is a mystery."
- 2010‑07‑02:
The local government open spending data that isn't.
- 2010‑07‑02:
UK government attitude to the morality of torture.
- 2010‑07‑01:
I never knew an AT-AT could be so cute. (YouTube)
- 2010‑07‑01:
Better food improves a school's results.
- 2010‑07‑01:
Deputy Prime Minister crowdsources the great repeal bill.
- 2010‑06‑30:
Self-administered eye test using a mobile phone app and a lens.
- 2010‑06‑30:
ECHR confirms that section 44 stop-and-search powers are illegal.
- 2010‑06‑30:
ECJ rules on reconciling data protection with freedom of information.
- 2010‑06‑30:
Web sites that ban deep links: YOU ARE ALL CLOWNS!
- 2010‑06‑30:
The mathematics of pathological tennis.
- 2010‑06‑30:
New US banknotes are almost colourful!
- 2010‑06‑30:
There are 99 infected legit websites for each infected porn site.
- 2010‑06‑30:
How Google promotes its internal Mac OS training sessions.
- 2010‑06‑30:
The continuing decline in UK energy production.
- 2010‑06‑30:
Companies can't reject complainants who ticked a box saying they agreed to an unfair contract.
- 2010‑06‑29:
SURFnet DNSSEC blog.
- 2010‑06‑29:
Google IPv6 Implementors Conference - agenda and slide decks.
- 2010‑06‑29:
"Print" on your Mac to send a document to iBooks on your iOS4 device.
- 2010‑06‑29:
The presence of giant billion dollar companies suggests a market inefficiency of some sort.
- 2010‑06‑29:
Sort vs Hash: Fast join implementations on multicore CPUs.
- 2010‑06‑29:
Children could be put at greater risk by ContactPoint, not protected by it.
- 2010‑06‑29:
An antenna + RF engineer on the iPhone 4 reception problems.
- 2010‑06‑28:
Why τ = 2π is a better circle constant.
- 2010‑06‑26:
Cutting through the confusion about Israel vs Palestine.
- 2010‑06‑25:
PathScale aims to beat CUDA and OpenCL with their reverse engineered GPU compiler.
- 2010‑06‑24:
Authoritarian politics in the USA.
- 2010‑06‑24:
Replies to legal claims mis-addressed to Railtrack Ltd (not Railtrack PLC). (heh)
- 2010‑06‑22:
Cambridge University Library API.
- 2010‑06‑22:
1 bit symphony.
- 2010‑06‑22:
Science fiction air show.
- 2010‑06‑22:
Your computer system almost certainly handles names incorrectly.
- 2010‑06‑21:
Saharan solar power will be imported to the EU in 5 years' time.
- 2010‑06‑21:
Information technology's environmental benefits vastly outweigh the environmental cost of its electricity usage.
- 2010‑06‑21:
Reverse-engineering the ZX Spectrum.
- 2010‑06‑21:
yagg - grammar-driven string generator / reverse parser.
- 2010‑06‑21:
Thinkgeek fools the National Pork Board (and offers a tasty discount to celebrate).
- 2010‑06‑21:
A cartoon guide to legal immigration to the USA.
- 2010‑06‑21:
A theory of typed hygienic macros.
- 2010‑06‑21:
How the fashion industry has managed to survive without copyright.
- 2010‑06‑20:
Live map of trains on the London Underground.
- 2010‑06‑18:
Deaths caused by unreasonable dedication to homeopathy.
- 2010‑06‑18:
Estonia gets approval to join the Eurozone.
- 2010‑06‑18:
"Numerous deaths have occurred after chiropractic manipulations. The risks by far outweigh its benefit."
- 2010‑06‑18:
Why the AT&T iPad ICCID + email address exposure is worse than it seems at first.
- 2010‑06‑18:
Facebook's 512 bit DKIM RSA key should be crackable.
- 2010‑06‑18:
Hints on programming language design. (C.A.R. Hoare, 1973)
- 2010‑06‑18:
"Significant Objects" - good stories make insignificant trinkets more valuable.
- 2010‑06‑18:
Google Chrome obsoletes Adobe's PDF reader plugin.
- 2010‑06‑17:
A review of administrative tools for DNSSEC (spring 2010 version).
- 2010‑06‑17:
Students flood Sidney Sussex College so that they can punt at their May Ball.
- 2010‑06‑17:
MEPs not welcome in the House of Commons but are in the House of Lords. (!)
- 2010‑06‑17:
Stop the avalanche of low-quality research? (interesting comments)
- 2010‑06‑17:
Why Peter Bregman returned his iPad - "being bored is a precious thing".
- 2010‑06‑16:
Will Apple be crippled because Objective C is too low-level?
- 2010‑06‑16:
Rebooting the computer science academic publication process.
- 2010‑06‑16:
What to desire from the scientific publisher of the future?
- 2010‑06‑16:
How to measure the speed of light using your microwave oven.
- 2010‑06‑16:
USB mass storage business card.
- 2010‑06‑16:
Thousands of patents declared state secrets in UK and USA.
- 2010‑06‑15:
What makes a "rock star" sysadmin?
- 2010‑06‑15:
The Economist's "Johnson" blog on the use and abuse of language.
- 2010‑06‑15:
A discussion about the unpopularity of parallel languages.
- 2010‑06‑14:
FOI request gets an answer where a parliamentary question does not!
- 2010‑06‑14:
twttr sketch, July 2006.
- 2010‑06‑14:
Academic publishers sue universities to control digital fair use.
- 2010‑06‑14:
PHK on how you are getting server performance wrong.
- 2010‑06‑14:
A report on the economics of copyright and digitization from the UK strategic advisory board for intellectual property policy.
- 2010‑06‑14:
File sharing only hurts bad or mediocre films.
- 2010‑06‑14:
Political judgments and the pre-budget economic forecast.
- 2010‑06‑14:
Open source licences are all very well, but you should also run your project in an open manner.
- 2010‑06‑14:
Peer review was designed to cope with scarcity; it has been obsoleted by abundance, so drop it.
- 2010‑06‑14:
Ars Technica on Ofcom's survey of attitudes to bad language on television.
- 2010‑06‑14:
Seq no more: better evaluation strategies for parallel Haskell.
- 2010‑06‑14:
Scalable event handling for the Glasgow Haskell Compiler run-time system.
- 2010‑06‑14:
The myth of radio spectrum scarcity.
- 2010‑06‑14:
Increasingly practical computation on encrypted data without decryption.
- 2010‑06‑14:
Differing meanings of "spastic" in UK and US.
- 2010‑06‑14:
Online dictionary of playground slang.
- 2010‑06‑14:
Submarine cable map.
- 2010‑06‑14:
The behind-the-scenes logistics of Kenya's mobile phone banking miracle.
- 2010‑06‑14:
Once upon a time in Afghanistan...
- 2010‑06‑14:
They Might Be Giants gig in the Babbage Lecture Theatre (of all places).
- 2010‑06‑14:
Patients are less likely to die of planned vascular surgery in bigger hospitals.
- 2010‑06‑13:
Bot-in-the-middle social engineering on IRC.
- 2010‑06‑12:
Graphic novels are literature too.
- 2010‑06‑12:
UK smoking ban reduces heart attacks by 100 per month.
- 2010‑06‑12:
Puntcon, 25 July 2010.
- 2010‑06‑11:
Sport journalism is simple enough that computers can do it.
- 2010‑06‑11:
Capsicum: practical capabilities for Unix.
- 2010‑06‑11:
Inside iPhone 4 "FaceTime" video conferencing.
- 2010‑06‑11:
Apple iOS developer agreement updated to permit embedded interpreters such as Lua.
- 2010‑06‑11:
The media are suffering from the change from scarcity to surfeit.
- 2010‑06‑10:
Pornography does not encourage sex crimes.
- 2010‑06‑10:
True Knowledge - the Internet answer engine.
- 2010‑06‑10:
Risk management failures and the earthquake game.
- 2010‑06‑10:
The Jedi census phenomenon.
- 2010‑06‑10:
The copyright wars come to "Glee".
- 2010‑06‑10:
Information Commissioner rules that Freedom of Information trumps copyright.
- 2010‑06‑09:
Five hundred Wi-Fi networks in one room?!
- 2010‑06‑08:
Raj Persaud on the psychology of the suicidal killing spree.
- 2010‑06‑08:
What drives Israel?
- 2010‑06‑08:
A classification of computer science research.
- 2010‑06‑07:
Google's thoughts about how to save the news business.
- 2010‑06‑07:
Economic consequences of British copyright and German freedom in publishing around 1800.
- 2010‑06‑07:
PLT Scheme is changing its name to "Racket".
- 2010‑06‑07:
Transport for London poster about CCTV has totalitarian style as well as substance.
- 2010‑06‑07:
Travelling downwind faster than the wind in a purely wind-powered vehicle.
- 2010‑06‑06:
Keeping ID cards by the back door?
- 2010‑06‑06:
How to make perfect thin and crispy french fries.
- 2010‑06‑05:
Justice Stevens' decisions for free expression on the net eroded by p2p fight.
- 2010‑06‑04:
Government web sites to use open source software whenever possible.
- 2010‑06‑04:
Grazing on Midsummer Common.
- 2010‑06‑04:
Welcome to bug 323, where all x87 floating point errors in gcc come to die!
- 2010‑06‑04:
Lago Fucino looks like a massive rendering error in Google Maps.
- 2010‑06‑04:
The pitfalls of verifying floating point computations.
- 2010‑06‑04:
The $3000 shirt.
- 2010‑06‑04:
The Dalvik VM JIT compiler.
- 2010‑06‑04:
I'm done explaining to people why fanfic is okay.
- 2010‑06‑03:
Mississippi improves healthcare by copying Iran.
- 2010‑06‑03:
Some esoteric but useful Linux commands.
- 2010‑06‑03:
A New Yorker profile of Julian Assange and WikiLeaks.
- 2010‑06‑03:
Government advice for publishing itemised local authority expenditure.
- 2010‑06‑03:
This is the age of political conflict between the generations.
- 2010‑06‑02:
Australia's CSIRO hopes to get $1bn from its WiFi patents.
- 2010‑06‑02:
The saga of the Euston puddle.
- 2010‑06‑02:
Flotillas and wars of public opinion.
- 2010‑06‑02:
bup - git-based incremental backup software.
- 2010‑06‑02:
Almost 80% support propotional representation and almost 75% want a majority government.
- 2010‑06‑02:
Stopped by the police? Here's what to do...
- 2010‑06‑02:
Keeping calm in the face of technical problems.
- 2010‑06‑02:
Wikileaks was launched with documents intercepted from Tor.
- 2010‑06‑01:
get_iplayer - perl script for downloading BBC programmes.
- 2010‑05‑31:
David Cameron's letter to government departments on opening up data.
- 2010‑05‑31:
China bans the use of evidence obtained under torture. (America and Britain should too.)
- 2010‑05‑31:
How long is the optimal copyright term?
- 2010‑05‑31:
How big would the public domain be without copyright term extensions?
- 2010‑05‑31:
Francis Maude outlines the coalition's plans for government data publication.
- 2010‑05‑31:
Summary of development plans for Ubuntu 10.10.
- 2010‑05‑31:
Big media has trouble collecting Pirate Bay fines.
- 2010‑05‑31:
Microsoft quietly patches some security vulnerabilities without identifying them.
- 2010‑05‑31:
PortLand source code released - a data centre networking protocol.
- 2010‑05‑31:
The resurgence of parallel computing research after a quarter century of neglect.
- 2010‑05‑31:
Stimulus surprise: companies retrench when government spends.
- 2010‑05‑31:
The Innovator's Dilemma: insights from the hard disk drive industry.
- 2010‑05‑27:
Track the progress of the libel reform bill here.
- 2010‑05‑27:
Caroline Lucas uses her maiden speech to attack Trafigura.
- 2010‑05‑27:
The Independent loves Caroline Lucas.
- 2010‑05‑27:
The royal appetite for secrecy can only invite scandal.
- 2010‑05‑27:
The only weapons we have [in programming] are simplicity and convention.
- 2010‑05‑27:
Documentation and code for manipulating Microsoft Outlook .pst files.
- 2010‑05‑27:
Trafigura goes on trial next week in Amsterdam - will the UK media dare to report it?
- 2010‑05‑27:
Compilers and Compiler Generators, by P.D. Terry.
- 2010‑05‑27:
Compiler Construction, by Niklaus Wirth.
- 2010‑05‑27:
Julian Huppert's Early Day Motion on repeal of the nasty bits of the Digital Economy Act.
- 2010‑05‑27:
Julian Huppert's maiden speech.
- 2010‑05‑26:
Head and neck injury risks in heavy metal. (BMJ)
- 2010‑05‑26:
Dyson Air Multiplier fans and balloons. (YouTube)
- 2010‑05‑26:
Johann Hari on Heavy Metal Muslims and Country and Western lefties.
- 2010‑05‑25:
The Real Time Club - the oldest IT dining club.
- 2010‑05‑25:
UNIX Tips for Mac OS X.
- 2010‑05‑25:
DJB on DNSSEC.
- 2010‑05‑25:
A programmers' wedding cake.
- 2010‑05‑25:
Google will not be able to index stories behind The Times' paywall.
- 2010‑05‑25:
Announcing the iPad XL - the power to run flash!
- 2010‑05‑24:
Patent claim halts stem cell research into childhood brain diseases.
- 2010‑05‑24:
4K sector drives and Linux.
- 2010‑05‑24:
Apple will soon be worth more than Microsoft.
- 2010‑05‑24:
Julian Todd complains about funding for open democracy in the UK.
- 2010‑05‑24:
Busting frame busting: a study of clickjacking vulnerabilities at popular sites.
- 2010‑05‑24:
Daily Mail shows no respect for copyright in pictures.
- 2010‑05‑24:
Michael Geist's fair copyright proposals for Canada.
- 2010‑05‑24:
Anthony Lester QC, architect of the Human Rights Act, introduces libel reform bill in the House of Lords.
- 2010‑05‑24:
Practical examples of siphons at work.
- 2010‑05‑24:
How bells are rung in Bologna.
- 2010‑05‑24:
Graphs of DNS RFC relationships.
- 2010‑05‑24:
English judge complains at length about bad ECJ trademark ruling.
- 2010‑05‑23:
Iteratees step-by-step.
- 2010‑05‑23:
Brian Deer on the end of the Wakefield MMR enquiry.
- 2010‑05‑23:
giffgaff - The people-powered PAYG mobile phone network.
- 2010‑05‑22:
Why Verisign is leaving the X.509 business.
- 2010‑05‑22:
Rumours of safety arguments between BP and Schlumberger on the Deepwater Horizon.
- 2010‑05‑22:
Why to use the term "preferential voting" when campaigning for electoral reform.
- 2010‑05‑22:
Bottom-up innovation will save us says Matt Ridley. (Unless IP squashes it?)
- 2010‑05‑22:
David Davies MP thinks torture is a good thing.
- 2010‑05‑22:
How the coalition deal was negotiated.
- 2010‑05‑21:
Creating a Solaris IPS repository and adding your first package.
- 2010‑05‑21:
"Email and bacon! This car has everything ..."
- 2010‑05‑21:
Chocolate filled with Marmite!?!
- 2010‑05‑21:
A Windows 3.1 clone running in your browser.
- 2010‑05‑21:
Lightspark: Flash player for Linux accelerated with LLVM and GLSL.
- 2010‑05‑21:
Cameron/Clegg (7)
- 2010‑05‑21:
Superficially improving Google Reader.
- 2010‑05‑21:
Wenlock and Mandeville welcome you to London 2012.
- 2010‑05‑20:
Living in denial: Why sensible people reject the truth.
- 2010‑05‑20:
A look at Lua 5.2.0-work3.
- 2010‑05‑20:
Richard Feynman on judging (text)books by their covers.
- 2010‑05‑20:
In order to complain to the TPS about phone spam, you must let them give the spammer your postal and email addresses.
- 2010‑05‑20:
Australian customs officers can now search incoming travellers' laptops and mobile phones for pornography.
- 2010‑05‑19:
You can do something about street harassment.
- 2010‑05‑19:
How to prevent browser history sniffing.
- 2010‑05‑19:
Mapping the demographics of American English with Twitter.
- 2010‑05‑19:
The Associated Press's most popular stories are the fact-checking nonsense-debunking ones.
- 2010‑05‑19:
AAAS Science Magazine interview with Julian Huppert MP.
- 2010‑05‑19:
Verisign to concentrate on DNS registry business after selling X.509 business to Symantec.
- 2010‑05‑19:
Symantec to buy Verisign's X.509 business.
- 2010‑05‑19:
How to sniff the contents of a web browser's history.
- 2010‑05‑19:
Warning signs in experimental design and interpretation.
- 2010‑05‑19:
List of Guantanamo Bay detainees accused of possessing terrorist Casio watches.
- 2010‑05‑19:
A great interview with Ben Goldacre about his philosophy.
- 2010‑05‑19:
Interviews with Evan Harris and Julian Huppert.
- 2010‑05‑19:
Harmful drinks in America - astonishing quantities of sugar.
- 2010‑05‑19:
Writing systems and calligraphy of the world.
- 2010‑05‑19:
Craig Murray debunks the coalition's first islamophobic terror scare.
- 2010‑05‑19:
Experimental security analysis of a modern automobile.
- 2010‑05‑19:
Lesbian Iranian film-maker denied asylum in Britain.
- 2010‑05‑18:
Heather Brooke on CCTV.
- 2010‑05‑18:
Monsanto's GM cotton and the increasing suicide rate amongst Indian farmers.
- 2010‑05‑18:
Resistance to anti-piracy law by Swedish ISPs makes it harder to tackle serious criminals.
- 2010‑05‑18:
The Reed Research Reactor is the only nuclear reactor operated primarily by undergraduates.
- 2010‑05‑18:
DNSSEC in the root zone delayed two weeks.
- 2010‑05‑18:
Proportion of women parliamentary candidates in each party.
- 2010‑05‑18:
Kent police and the CPS think a private online chat is an obscene publication.
- 2010‑05‑18:
Civil service chiefs made formal protests at Labour's excessive spending in their final months.
- 2010‑05‑18:
Testing salted coffee with Tim Wendelboe.
- 2010‑05‑18:
The lack of IP law enforcement in Spain - an entrenched culture of sharing.
- 2010‑05‑18:
Mil-Spec chocolate chip cookies.
- 2010‑05‑18:
Lynne Featherstone supports John Bercow as Speaker.
- 2010‑05‑18:
On Liberal Conservatism.
- 2010‑05‑17:
Electoral dysfunction: why democracy is always unfair.
- 2010‑05‑17:
The Right Tool - a survey to find out how programmers pick languages.
- 2010‑05‑17:
James K. Galbraith: Why the 'experts' failed to see how financial fraud collapsed the economy.
- 2010‑05‑17:
The Glasgow Haskell Compiler LLVM back-end.
- 2010‑05‑17:
Liam Byrne's handover letter to David Laws says Labour spent all the money, as if it were a joke.
- 2010‑05‑17:
Forget about Goldman Sachs: the entire economy is built on fraud.
- 2010‑05‑17:
Labour's record on civil liberties alienated its core supporters and drove voters to the Liberal Democrats.
- 2010‑05‑17:
Skeptic Top Trumps.
- 2010‑05‑17:
Will Aaron Sorkin's Zuckerberg biopic damage Facebook's reputation even more?
- 2010‑05‑17:
Cambridge's response to the Browne review of higher education funding and student finance.
- 2010‑05‑17:
Cameron/Clegg (6)
- 2010‑05‑17:
Australia retaliates against Wikileaks founder Julian Assange.
- 2010‑05‑17:
IP as censorship: a growing library of banned books.
- 2010‑05‑17:
Jack o' Kent was a folk hero in the borderland of Herefordshire and Monmouthshire.
- 2010‑05‑17:
How (not) to lobby a parliamentary candidate.
- 2010‑05‑16:
The Orwell Prize blog shortlist.
- 2010‑05‑16:
The electoral politics of the LibDem-Conservative coalition, according to Pippa Norris.
- 2010‑05‑16:
Doc Searls on Steve Jobs, 1997 - right on the mark.
- 2010‑05‑16:
Greed all about it - Radio 4 Friday play about Murdoch's move to Wapping.
- 2010‑05‑16:
Tories ditched policies as fast as they listed them: 'Cameron wanted to bury party Right,' say Lib Dems.
- 2010‑05‑16:
Labour hid 'scorched earth' debts worth billions.
- 2010‑05‑16:
BMA votes to end NHS funding for homoeopathy.
- 2010‑05‑16:
Henry Porter says the voices of liberty have triumphed and Britain is better for it
- 2010‑05‑16:
Leaked memo reveals what Whitehall really thinks of its new masters.
- 2010‑05‑15:
Typographical problems with the iPad.
- 2010‑05‑15:
Why Peter Serafinowicz steals movies ... even ones he is in.
- 2010‑05‑15:
How to design a popular programming language.
- 2010‑05‑14:
Tell the Electoral Commission about any problems you had with voting.
- 2010‑05‑14:
Some pages from Willard Cope Brinton's 1939 book Graphic Presentation.
- 2010‑05‑14:
Will the civil service scupper the Freedom Bill?
- 2010‑05‑14:
Apple responds to Adobe's "We ♥ Apple" advertisement.
- 2010‑05‑14:
Stop slutting up our girls.
- 2010‑05‑14:
UK Government Twitter strategy.
- 2010‑05‑13:
Philip Hammond, Secretary of State for Transport, promises to "end the war on motorists".
- 2010‑05‑13:
Cameron/Clegg (5)
- 2010‑05‑13:
"Psychic" Joe Power and the two-man mob.
- 2010‑05‑13:
Cameron/Clegg (4) [only slightly slashy]
- 2010‑05‑13:
Police threaten and handcuff man in his home because of his silly Cameron poster.
- 2010‑05‑12:
Cameron/Glegg (3)
- 2010‑05‑12:
Henry Porter on the coalition's plans for civil liberties.
- 2010‑05‑12:
Cameron/Clegg (2)
- 2010‑05‑12:
ComRes says flakier voters failed to turn up and vote LibDem as expected.
- 2010‑05‑12:
Channel 4 compares Tory and LibDem policies before and after the coalition.
- 2010‑05‑12:
Open WiFi banned in Germany.
- 2010‑05‑12:
The Spectator's view of the coalition.
- 2010‑05‑12:
The impact of the fiscal stimulus on economic growth.
- 2010‑05‑12:
Liberty responds to the Con/LibDem coalition agreement.
- 2010‑05‑12:
Conservative / Liberal Democrat coalition agreements.
- 2010‑05‑12:
HMG will act on 10:10 campaign to cut CO2 emissions by 10% within a year.
- 2010‑05‑12:
Ultrasound reveals breastfeeding mechanics.
- 2010‑05‑12:
Cameron/Clegg.
- 2010‑05‑11:
Eight websites you need to stop building.
- 2010‑05‑11:
High Court rules that software liability disclaimers are unfair and unenforcable.
- 2010‑05‑11:
Ten tips for coping with lots of rough nights.
- 2010‑05‑11:
UK party policy Venn diagram.
- 2010‑05‑11:
Yale delays switch to GMail owing to data ownership concerns.
- 2010‑05‑11:
UC Davis scraps GMail pilot because of privacy concerns.
- 2010‑05‑10:
Heather Brooke on the lack of accountability and oversight of UK election officials.
- 2010‑05‑10:
Losing the fight against AIDS in Africa.
- 2010‑05‑10:
Inspired by XKCD...
- 2010‑05‑10:
Welcome to the post-meritocratic age - the increasing proportion of MPs from independent schools.
- 2010‑05‑10:
The origin of HTML's blink tag.
- 2010‑05‑10:
Tories and LibDems want to cancel the one-sided extradition treaty with the USA.
- 2010‑05‑10:
Unprecedented rain in the high arctic in April.
- 2010‑05‑09:
Britain's experience of electoral systems, published by the Electoral Reform Society, Apr. 2007.
- 2010‑05‑09:
The experience of new voting systems in the United Kingdom since 1997, presented to Parliament by the Justice Secretary, Jan. 2008.
- 2010‑05‑09:
Report of the independent commission on the voting system, presented to Parliament by the Home Secretary, Oct. 1998.
- 2010‑05‑09:
Where no woman has gone before - a map of women in parliament.
- 2010‑05‑09:
Tories re-nationalise the London Underground.
- 2010‑05‑09:
Clegg and Cameron explain the state of the negotiations to their parties.
- 2010‑05‑09:
The 14-year-old voter tells his story. (ace!)
- 2010‑05‑09:
HengeDocks - a well-designed docking station for unibody MacBooks.
- 2010‑05‑09:
SecondBar and BetterTouchTool - Mac OS X user interface tweaks.
- 2010‑05‑09:
An in-depth tutorial on Perl autovivification.
- 2010‑05‑06:
Portillo tells Ed Balls how to lose.
- 2010‑05‑06:
Robert Mugabe supports the Conservative party.
- 2010‑05‑06:
What happened to the Wall Street Journal when Rupert Murdoch took over.
- 2010‑05‑06:
HP printer cartridges are region-coded - WTF!
- 2010‑05‑05:
A new record for Apple - iPad fastest product to reach $1 billion revenue?
- 2010‑05‑05:
Johann Hari takes you on a tour of Cameron Land.
- 2010‑05‑05:
The people's flag is palest pink: it's not as red as people think.
- 2010‑05‑05:
The WhoShouldYouVoteFor.com election night party kit.
- 2010‑05‑05:
A personal account of the smallpox outbreak in Bradford in 1962.
- 2010‑05‑05:
The Tory plan for a hung parliament.
- 2010‑05‑05:
The Soviet solution: nuke the gushing oil well.
- 2010‑05‑04:
The Single Transferable Vote in action in the Republic of Ireland.
- 2010‑05‑04:
Some details of LuaJIT's intermediate representation.
- 2010‑05‑04:
The IBM film Powers of Ten.
- 2010‑05‑04:
The scale of the universe - Powers of Ten as a flash app.
- 2010‑05‑04:
Cameron does not understand proportional representation.
- 2010‑05‑04:
File-sharers are content industry's best customers.
- 2010‑05‑04:
FiveThirtyEight predicts Lib/Lab coalition would not have a majority - neither would the Tories.
- 2010‑05‑04:
BNP uses ballot paper aliases to fool voters.
- 2010‑05‑04:
What's in a name? - Pirate Party UK.
- 2010‑05‑04:
Anti-brothel law puts prostitutes at risk. (ps. no relation!)
- 2010‑05‑04:
Cameron to celebrate victory with Bullingdon-style trashing of UK.
- 2010‑05‑04:
The utter failure of the Pruitt-Igoe housing project.
- 2010‑05‑03:
Fear let the Labour Party abandon everything it stood for.
- 2010‑05‑03:
MPEG-LA creates patent holding company to sue its own patent contributors. WTF.
- 2010‑05‑03:
A better graph of support for Labour+Conservative vs LibDem bs others over the last 25 years.
- 2010‑05‑03:
Automatic permanent background SSH tunnels - howto for unix, mac, windows.
- 2010‑05‑03:
Julian Huppert says why he is against the Digital Economy Act.
- 2010‑05‑03:
How to establish a pub's Mank Rating.
- 2010‑05‑03:
Young adults ask, why isn't our parents' generation paying for us?
- 2010‑05‑03:
Hung parliament guaranteed by Labour and Conservative both declining over more than 20 years.
- 2010‑05‑02:
"When blowflies fight over a pile of elephant shit, their pecking order is a more elegant protocol than ICCCM."
- 2010‑05‑02:
If only Arizona were the real problem - the Tea Party takeover of the Republican Party.
- 2010‑05‑02:
Is Clegg throwing away his best cards?
- 2010‑05‑02:
Why even strict vegans should consider eating oysters by the boatload.
- 2010‑05‑02:
You owe licence fees to the MPEG-LA for anything you film with a video camera.
- 2010‑05‑02:
The scary evangelical Christian tendency in the Conservative party.
- 2010‑05‑02:
Quack in a Box: a game of medical malpractice.
- 2010‑05‑01:
Michael Specter's TED talk on the danger of science denialism.
- 2010‑05‑01:
Evan Harris argues against the Tories' extra pocket money for married couples.
- 2010‑05‑01:
Full body scanners are a useless waste of money, says Israeli airport security expert.
- 2010‑05‑01:
Wind power is starting to reduce the price of electricity.
- 2010‑05‑01:
Tim Harford on electoral reform and Arrow's theorem.
- 2010‑05‑01:
Political parties should be banned from handling postal vote applications.
- 2010‑05‑01:
The public electoral register is a good defence against electoral fraud.
- 2010‑05‑01:
A new init(8) called systemd.
- 2010‑04‑30:
The Telegraph says long copyright terms are bad for business.
- 2010‑04‑29:
An HTTP proxy server in 20 lines of node.js code.
- 2010‑04‑29:
FiveThirtyEight's advanced swingometer.
- 2010‑04‑28:
Mix tape amnesty.
- 2010‑04‑28:
What do you get if you teach toddlers to take pictures?
- 2010‑04‑28:
Guardian/ICM poll of marginal seats has LibDems in the lead.
- 2010‑04‑28:
Monsanto applies for a patent on pork.
- 2010‑04‑28:
Roman Catholic Church supports even non-Catholic abusers in US court.
- 2010‑04‑28:
Strategy's golden rule: what your fiercest rival does badly, do incredibly well.
- 2010‑04‑28:
Tony Juniper, Green Party parliamentary candidate for Cambridge (snigger).
- 2010‑04‑27:
Microsoft Research Cambridge moving from University West Cambridge site to CB1 station redevelopment.
- 2010‑04‑27:
XFS will be supported by Red Hat Enterprise Linux 6.
- 2010‑04‑27:
A 15,552,000 second exposure of the Clifton suspension bridge taken with a pinhole camera.
- 2010‑04‑27:
The Institute for Fiscal Studies is generally positive about the LibDem manifesto.
- 2010‑04‑27:
Wikipedia trumps Britannica.
- 2010‑04‑27:
Toxic assets emerged from a shadow economy.
- 2010‑04‑27:
Journalists and publishers worry about opaque and arbitrary Apple app store content rules.
- 2010‑04‑27:
Problems with CAP, and its relation to Yahoo's little known NoSQL system.
- 2010‑04‑27:
Murdoch Tory campaign is James's baby, not Rupert's?
- 2010‑04‑27:
Avatar cinema attendance increases after DVD release.
- 2010‑04‑27:
Twitter removes tweet after DMCA complaint - WTF in so many ways.
- 2010‑04‑26:
What is David Cameron thinking?
- 2010‑04‑26:
Jack Straw engages in illegal electoral treating - again!
- 2010‑04‑26:
Choose your own UK government budget cuts.
- 2010‑04‑26:
Beginning of the end of the floppy disk.
- 2010‑04‑25:
Old media, new media, and the election.
- 2010‑04‑25:
Microsoft is being very quiet about its vast and rapidly increasing quantity of debt.
- 2010‑04‑25:
Why doesn't the Labour party respect copyright?
- 2010‑04‑24:
BBC Newsnight's Michael Crick on YouGov's biased polling.
- 2010‑04‑23:
The Byzantine solution to Afghanistan.
- 2010‑04‑23:
How the Guardian decides who to support in the election.
- 2010‑04‑23:
Party name twitter trend chart.
- 2010‑04‑23:
Party leader 24h twitter trend chart.
- 2010‑04‑23:
How the unexpected rise of a third contender broke the cosy two-party system.
- 2010‑04‑23:
The Independent fisks the Tory press.
- 2010‑04‑22:
The forces that block British democracy are becoming visible in this election.
- 2010‑04‑22:
Anti-Clegg stories planted in the Tory press by Conservative central office, says the BBC.
- 2010‑04‑22:
Google Trends view of Brown, Cameron, and Clegg.
- 2010‑04‑22:
David Owen explains how to replace Trident with something much cheaper.
- 2010‑04‑22:
JK Rowling's single mothers' manifesto.
- 2010‑04‑22:
The Conservatives and Rupert Murdoch are gunning for the BBC.
- 2010‑04‑22:
David Camerwrong presents a new vision for Britain.
- 2010‑04‑22:
GitHub now supports git's smart HTTP protocol.
- 2010‑04‑22:
The Guardian considers whether Rupert Murdoch will lose Britain.
- 2010‑04‑22:
Surge in voter registrations makes election outcome even more volatile.
- 2010‑04‑22:
Don't believe the twitter echo chamber.
- 2010‑04‑22:
Do Daily Mail journalists cry themselves to sleep?
- 2010‑04‑22:
It's all #nickcleggsfault.
- 2010‑04‑22:
Ken Clarke agrees with LibDems Trident policy.
- 2010‑04‑22:
Daily-Mail-o-matic: automatic headline generator - Nick Clegg special edition!
- 2010‑04‑22:
Will Rupert Murdoch lose Britain?.
- 2010‑04‑22:
How to build a cybernuke.
- 2010‑04‑22:
Fuck yeah! Nick Clegg! :-)
- 2010‑04‑21:
Guess which newspaper is most annoyed by the LibDem surge...
- 2010‑04‑21:
Blowing up HTML5 video and mapping it into 3D space.
- 2010‑04‑21:
Geek the vote.
- 2010‑04‑21:
A vote for the LibDems is a vote against Rupert Murdoch.
- 2010‑04‑21:
Copyfight in Ireland in the 6th and 21st centuries.
- 2010‑04‑20:
How a hung parliament would work.
- 2010‑04‑20:
How powerful is your vote compared to the UK average?
- 2010‑04‑20:
UK polling report.
- 2010‑04‑20:
Forecast UK: predicting the next general election.
- 2010‑04‑20:
Electoral Calculus: general election prediction.
- 2010‑04‑20:
How to vote if you want a hung parliament (and electoral reform)!
- 2010‑04‑20:
Nice places to visit near Heathrow when there are NO PLANES.
- 2010‑04‑20:
YouGov asks, could the LIbDems win outright?
- 2010‑04‑19:
Amazing feats of error recovery by LLVM clang.
- 2010‑04‑19:
Clay Shirky on the collapse of complex business models.
- 2010‑04‑18:
An introduction to modern OpenGL.
- 2010‑04‑18:
Finnish F-18 engine check reveals effects of volcanic dust. (with pictures)
- 2010‑04‑16:
How not to print a document from an iPad.
- 2010‑04‑16:
Patent Absurdity: how software patents broke the system.
- 2010‑04‑16:
Political cartoon app rejected from app store because it "ridicules public figures".
- 2010‑04‑15:
Apple removes Scratch programming language for children from the app store.
- 2010‑04‑15:
The Guardian restores Simon Singh's article over which he was sued by the chiropractors for libel.
- 2010‑04‑15:
What if the very theory behind patents is wrong?
- 2010‑04‑15:
Laurie Taylor's experiences of a Roman Catholic boys' boarding school.
- 2010‑04‑15:
How to print a document from an iPad.
- 2010‑04‑15:
When record labels screw the musicians they claim to be supporting.
- 2010‑04‑15:
US military says peak oil is coming in about two years.
- 2010‑04‑15:
Chiropractors drop libel case against Simon Singh.
- 2010‑04‑14:
Small wheels for adult cycles.
- 2010‑04‑14:
Representing type information in dynamically typed languages.
- 2010‑04‑14:
Common mistakes when attempting to design a RESTful protocol.
- 2010‑04‑13:
This is not a spiral.
- 2010‑04‑12:
Internet security is a failure.
- 2010‑04‑12:
Technical drawings for the first prototype of the clock of the long now.
- 2010‑04‑12:
This week is the 300th anniversary of copyright law in England.
- 2010‑04‑09:
Pixels. (video)
- 2010‑04‑09:
Tetris hell.
- 2010‑04‑09:
Labour and Conservatives accused of copyright infringement.
- 2010‑04‑09:
Patent lawsuit may allow competitors to copy a revolutionary food for treating malnourished children.
- 2010‑04‑09:
Traffic in the IP address range 1.0.0.0/8.
- 2010‑04‑09:
C: The Complete Nonsense: why you should not read Herb Schildt's books.
- 2010‑04‑08:
TalkTalk will refuse any demand to disconnect its customers despite the Digital Economy Act.
- 2010‑04‑08:
They work for the BPI.
- 2010‑04‑07:
Memory management threads: exploiting fine-grained parallelism in C/C++ dynamic memory management.
- 2010‑04‑07:
I made it to 2010 and all I got from the sf books of my youth was the lousy dystopian government.
- 2010‑04‑07:
The Internet backchannel to live discussions, and the "oh shit" moment when the previously oblivious discover what is happening.
- 2010‑04‑06:
The microwave mortuary: dead electronics.
- 2010‑04‑05:
A visual git reference.
- 2010‑04‑05:
Sharing code between projects with git subtree.
- 2010‑04‑05:
A successful git branching model and workflow.
- 2010‑04‑03:
Have you ever tried to sell a diamond? How the De Beers cartel keeps prices high.
- 2010‑04‑01:
Robin Milner's obituary in the Guardian. (Much better than the Times!)
- 2010‑04‑01:
Robin Milner's obituary on the Computer Lab web site.
- 2010‑04‑01:
Insanely deep fractal zoom.
- 2010‑04‑01:
Simon Singh wins his appeal against chiropractic accusations of libel.
- 2010‑04‑01:
It's not a bug, it's a feature!
- 2010‑04‑01:
Spoon feeding lazy journalists: Open Europe: the Eurosceptic group that controls British coverage of the EU.
- 2010‑03‑31:
Where Tcl and Tk went wrong.
- 2010‑03‑31:
Robin Milner's obituary in the Times. (Horribly garbled.)
- 2010‑03‑30:
Labservative - for more of the same. (We've had 65 years to get it right, so what's another 5?)
- 2010‑03‑30:
Python generators vs. coroutines.
- 2010‑03‑30:
Random recipe generator :-)
- 2010‑03‑28:
Dealing with font problems on Linux.
- 2010‑03‑26:
Klein bottle opener.
- 2010‑03‑25:
SOCIALISM in medicine is BAD because the government can't do anything right.
- 2010‑03‑25:
Gerald Blanchard, master thief.
- 2010‑03‑25:
Inside a global spyware ring.
- 2010‑03‑24:
Great Firewall of China spoofing responses to DNS queries from outside China to nameservers hosted inside China.
- 2010‑03‑24:
UK winning war against child poverty.
- 2010‑03‑24:
Radio 4's You and Yours misleads its audience and prefers ill-informed debate rather than knowledgable guests.
- 2010‑03‑24:
Emily Rosa (aged 11) published a paper in JAMA that demolished "therapeutic touch".
- 2010‑03‑23:
Lua-ev: Lus interface to libev event loop library.
- 2010‑03‑23:
How the internet came to be, by Vint Cerf, as told to Bernard Aboba.
- 2010‑03‑23:
Scrap peer review and beware of "top journals", says Richard Smith (of PLoS) in the BMJ.
- 2010‑03‑23:
The League of Movable Type - a collection of open source fonts.
- 2010‑03‑23:
Yet another uptime counter wrap bug. (Sun StorageTek diak arrays)
- 2010‑03‑22:
How to identify an undiscriminating skeptic.
- 2010‑03‑20:
LuaJIT interactive performance comparison chart.
- 2010‑03‑18:
Don't just do something, stand there! Constant reform has the public sector in shambles.
- 2010‑03‑18:
Hollywood, please stop the teal and orange madness!
- 2010‑03‑17:
Pseudo - an improved replacement for fakeroot.
- 2010‑03‑17:
Folding plug wins design award.
- 2010‑03‑17:
New Scientist's spam infographic.
- 2010‑03‑17:
The Barrelfish operating system - your computer is already a distributed system; why isn't your OS?
- 2010‑03‑16:
Sean Quinlan on Google GFS and BigTable - even Google suffers scalability problems :-)
- 2010‑03‑16:
ISC AFTR: IPv4 / IPv6 transition protocol "Dual Stack Lite" reference implementation.
- 2010‑03‑15:
Dear GNU Autohell, could you please die?
- 2010‑03‑15:
Stop the autoconf insanity!
- 2010‑03‑15:
Escape from GNU Autohell!
- 2010‑03‑14:
The Calendar Zone -- Bringing Order to Calendrical Chaos!
- 2010‑03‑14:
Partial evaluation, interpreters, compilers, and compiler-generators.
- 2010‑03‑12:
PIR.org to start accepting signed DNSSEC delegations in .org in June.
- 2010‑03‑11:
.ARPA TLD to be signed by 2010-03-18.
- 2010‑03‑11:
The unspoken British constitution.
- 2010‑03‑11:
The 100 most expensive petrochemical accidents.
- 2010‑03‑10:
Opt-out form for the NHS national health records database.
- 2010‑03‑10:
A working implementation of Codd's self-replicating cellular automaton - bonkers and amazing.
- 2010‑03‑10:
2012 is the centenary of Alan Turing, marathon runner and computer scientist.
- 2010‑03‑10:
The Aegis software configuration management system.
- 2010‑03‑09:
Stack Overflow's best programming jokes.
- 2010‑03‑09:
Cambridgeshire County Council enumerates the guided busway screwups that their contractor refuses to fix.
- 2010‑03‑09:
Reddit discusses LuaJIT with its author Mike Pall.
- 2010‑03‑09:
Does a Lava Lamp work in a high-gravity environment such as Jupiter?
- 2010‑03‑08:
The first rule of formal logic club is ...
- 2010‑03‑08:
Strobeshnik: a clock hacked together from a hard disk drive.
- 2010‑03‑08:
Scott and scurvy - how, in the second half of the nineteenth century, the cure for scurvy was lost.
- 2010‑03‑07:
YikeBike folding elecric bicycle.
- 2010‑03‑07:
Jonathan Rees's security kernel based on the Lambda Calculus.
- 2010‑03‑05:
Ignition! An informal history of liquid rocket propellants.
- 2010‑03‑05:
Liberal atheists are not actually much more intelligent than the others.
- 2010‑03‑05:
There really is a liberal atheist intelligentsia.
- 2010‑03‑05:
Paul Vixie says DNScurve doesn't solve any important problems, whereas DNSSEC does.
- 2010‑03‑04:
Apple drops the iPhone patent bomb on HTC.
- 2010‑03‑04:
Yorkshireman prosecuted for joking on Twitter about bombs.
- 2010‑03‑04:
Kiosk mode on Mac OS X Snow Leopard.
- 2010‑03‑04:
Guide to creating kiosks on Mac OS X - plus demo app for tweaking the user interface.
- 2010‑03‑04:
How to auto-hide the menu bar and dock on a per-app basis on Mac OS X.
- 2010‑03‑03:
Nicholas Weaver reviews DNScurve and concludes it is catastrophically bad.
- 2010‑03‑03:
Why DRM doesn't work.
- 2010‑03‑03:
DNSSEC deployment is on track, says Verisign.
- 2010‑03‑03:
What is the worst class/variable/function name you have ever encountered?
- 2010‑03‑03:
DENIC now allows 2LDs to register DS records in their DNSSEC testbed.
- 2010‑03‑03:
UK libel law is being used to suppress inconvenient scientific results.
- 2010‑03‑02:
Koreans use sausages to control their iPhones in cold weather, because gloved hands don't work.
- 2010‑03‑02:
Quick reference sheet: your rights if you get stopped by the police in the UK.
- 2010‑03‑02:
A neutral collaboration point for everyone involved in "Teaching Open Source".
- 2010‑03‑02:
One in four chiropractors under investigation for false advertising because they sued Simon Singh for calling them "bogus".
- 2010‑03‑02:
The Cambridge tartan.
- 2010‑03‑02:
Packrat parsers can support left recursion.
- 2010‑03‑01:
Apple's successor to the iPad.
- 2010‑03‑01:
Addressing the outmoded swapping and paging strategy in Mac OS X.
- 2010‑03‑01:
Inside the iPad A4 chip.
- 2010‑03‑01:
ENISA's guide to deploying DNSSEC.
- 2010‑03‑01:
California wages war against the great evil that is flavoured vodka.
- 2010‑02‑27:
The Munich taxicab experiment - risk compensation and anti-lock brakes.
- 2010‑02‑25:
Using, not losing, your head regarding cycle helmets.
- 2010‑02‑25:
Like, Python. (heh)
- 2010‑02‑25:
FastMail's clever webmail session handling.
- 2010‑02‑25:
The film companies keep telling you pirated DVDs are worse, hoping you won't find out they are better.
- 2010‑02‑24:
Taking pictures of your own children is paedophilia according to the Bridges Shopping Centre in Sunderland.
- 2010‑02‑24:
What is a big salary?
- 2010‑02‑24:
Stéphane Bortzmeyer on the OpenDNS / DNScurve absurdity.
- 2010‑02‑23:
Comcast announces their DNSSEC deployment timeline and customer trials.
- 2010‑02‑23:
OpenDNS adopts DNScurve - WTF? no-one else will.
- 2010‑02‑23:
Bjørn Lomborg is a liar and a fraud.
- 2010‑02‑23:
You can be arrested for photography because it is suspicious and anti-social, say the police.
- 2010‑02‑23:
Radio 4 - Analysis - Failing better - excellent programme about evidence-based policy.
- 2010‑02‑22:
Design and implementation of mobile client support in SSH.
- 2010‑02‑22:
tmux: OpenBSD's replacement for GNU screen.
- 2010‑02‑22:
DNSSEC HOWTO
- 2010‑02‑22:
USA penalises other countries for supporting open source procurement.
- 2010‑02‑21:
The Medieval Unicode Font Initiative.
- 2010‑02‑21:
ConScript Unicode Registry - code point allocations for artificial scripts in the Unicode private use area.
- 2010‑02‑21:
Meta-programming in Lua.
- 2010‑02‑19:
How to configure BIND to automatically sign dynamic-update zones for DNSSEC.
- 2010‑02‑18:
Nice picture from a Sinclair C5 meet in Cambridge this week.
- 2010‑02‑18:
RFC 5782: DNS blacklists and whitelists.
- 2010‑02‑18:
Wall Street's bail-out hustle - how they returned to profitability so fast.
- 2010‑02‑18:
Cambridge buses no longer so confident about when the misguided busway will open.
- 2010‑02‑18:
Petition against imprisonment of children seeking asylum in the UK.
- 2010‑02‑18:
Measuring the gravitational red-shift predicted by general relativity using a caesium atom interferometer.
- 2010‑02‑16:
Bertrand Meyer on IEEE 754's non-reflexive equality predicate.
- 2010‑02‑16:
Layar: mobile augmented reality browser.
- 2010‑02‑16:
Migrating Haskell code from the uvector to vector library.
- 2010‑02‑16:
BBC Radio 4 Saturday Play 20 Feb 2010: Murder in Samarkand.
- 2010‑02‑15:
Reworking Python's global interpreter lock.
- 2010‑02‑15:
SpamAssassin ticket for adding support for the Spamhaus DBL.
- 2010‑02‑15:
The Spamhaus domain block list - to be launched on 1st March 2010.
- 2010‑02‑15:
How to configure secure NTP.
- 2010‑02‑15:
How Python's global interpreter lock hurts performance worse than you expect.
- 2010‑02‑12:
Notes on the resolution and other details of the human eye.
- 2010‑02‑11:
Chip and PIN is broken, says the Cambridge computer lab security group.
- 2010‑02‑11:
Sign the petition for UK libel law reform!
- 2010‑02‑11:
Changes to .com/.net/.edu name servers in preparation for DNSSEC.
- 2010‑02‑10:
SolidDNS secondary nameserver service supporting DNSSEC and IPv6.
- 2010‑02‑10:
Pothole gardens.
- 2010‑02‑10:
Monitoring the performance of the 100-year-old clock in the Great Court of Trinity College, Cambridge.
- 2010‑02‑10:
Roll over and die? Problems with key rollover in DNSSEC.
- 2010‑02‑10:
Tracing the meta level: PyPy's tracing JIT compiler.
- 2010‑02‑10:
The Journal of Craptology.
- 2010‑02‑10:
Romantic cryptography - if XKCD were an academic paper...?
- 2010‑02‑09:
How climate change skeptics propagated lies about the UEA CRU emails.
- 2010‑02‑08:
Peppersmith natural chewing gum.
- 2010‑02‑08:
Static detection of race conditions in Erlang.
- 2010‑02‑06:
A principled, complete, and efficient representation of C++.
- 2010‑02‑05:
Measuring DNS transfer sizes: first results.
- 2010‑02‑03:
What Second Life can teach you about scaling Web apps.
- 2010‑02‑03:
Problems allocating from polluted IPv4 address space.
- 2010‑02‑03:
Pollution in the last few unallocated blocks of IPv4 address space.
- 2010‑02‑03:
Bert's bad idea BOF.
- 2010‑02‑03:
Improving TCP security with robust cookies.
- 2010‑02‑02:
A discussion about implementing the Game of Life in Haskell.
- 2010‑02‑02:
Facebook announces the open source release of their PHP to C++ compiler, HipHop.
- 2010‑02‑02:
Quasiquoting for Haskell.
- 2010‑02‑02:
Parsifal validating XML parser written in C.
- 2010‑02‑02:
Clare Short says Tony Blair lied and misled parliament in the build-up to the Iraq war.
- 2010‑02‑02:
Evolution of adaptive behaviour in robots by means of Darwinian selection.
- 2010‑02‑02:
Boolean grammars.
- 2010‑02‑01:
LGBT History Month in Cambridgeshire - council buildings are flying the rainbow flag.
- 2010‑01‑30:
Initial .uk DNSSEC rollout to happen in March.
- 2010‑01‑29:
Old-world vs new-world computers.
- 2010‑01‑28:
Google says unicode nears 50% of the web.
- 2010‑01‑28:
How Google Chrome protects itself from browser extension vulnerabilities.
- 2010‑01‑28:
How to fail a PhD.
- 2010‑01‑28:
Honey, I Shrunk Steve Jobs!
- 2010‑01‑28:
Panopticlick: how unique and trackable is your browser?
- 2010‑01‑28:
Markus Kuhn's One-Time Passwords.
- 2010‑01‑28:
Steve Gibson's Perfect Paper Passwords.
- 2010‑01‑28:
Cambridgeshire Architecture Gazette, the newsletter of the Cambridge Association of Architects.
- 2010‑01‑27:
DNS-OARC stats covering the L.root-servers.net DURZ switch-on.
- 2010‑01‑27:
L.root-servers.net statistics.
- 2010‑01‑27:
Web4U.cz has nearly 15,000 DNSSEC delegations from the .cz TLD.
- 2010‑01‑26:
British newspapers make things up and publish them as if they were true.
- 2010‑01‑26:
North-West Cambridge development plans.
- 2010‑01‑26:
Bryan Cantrill does not like transactional memory.
- 2010‑01‑26:
P2P copyright enforcement can be blatantly incorrect and maliciously gamed.
- 2010‑01‑26:
IKEA LackRack 19" table / server housing.
- 2010‑01‑25:
More details about root zone DNSSEC deployment, including precise transition times.
- 2010‑01‑25:
The Public Domain Manifesto.
- 2010‑01‑22:
Top Google search result for each Unicode character.
- 2010‑01‑22:
Number 10 responds to postcode database petition with a lengthy content-free brush-off.
- 2010‑01‑22:
The Fantom programming language.
- 2010‑01‑21:
A million-user comet application with Mochiweb.
- 2010‑01‑21:
Stair Porn.
- 2010‑01‑21:
Runtime object devirtualization: improving JIT compiler performance by inlining virtual function calls and memory accesses.
- 2010‑01‑21:
French anti-piracy organisation Hadopi uses a pirated font in its logo.
- 2010‑01‑21:
Systems of units of measurement defined such that certain universal physical constants are normalized to 1.
- 2010‑01‑21:
The electric unicycle.
- 2010‑01‑21:
LuaJIT 2.0 reaches sponsorship goal for x68-64 port.
- 2010‑01‑21:
Man buried by Haiti earthquake survives using iPhone for first aid advice.
- 2010‑01‑20:
Church of England parish finder and map.
- 2010‑01‑20:
The era of black boxes.
- 2010‑01‑20:
Let Over Lambda - a "hardcore" book about macro programming in Common Lisp.
- 2010‑01‑20:
"Matters Computational" - a book containing a lot of bitwise hacks amongst other things.
- 2010‑01‑18:
Nancy Reagan celebrates christmas with Mr T.
- 2010‑01‑18:
How not to hinder Haiti.
- 2010‑01‑18:
Nick Clegg's speech on science and politics to the Royal Society.
- 2010‑01‑18:
The Cambridge Evening News asks which party you will vote for in the general election.
- 2010‑01‑17:
Collective hallucinations and inefficient markets: the British railway mania of the 1840s.
- 2010‑01‑15:
Virbl virus senders blacklist now lists IPv6 addresses.
- 2010‑01‑14:
Root zone DNSSEC status update, 2010-01-14.
- 2010‑01‑14:
Cambridge traffic regulation orders.
- 2010‑01‑14:
Toppling a bogus-diploma empire of fraudulent "universities".
- 2010‑01‑14:
AOL's postmaster team laid off en masse.
- 2010‑01‑12:
UK "anti-terror" arbitrary stop and search law ruled illegal by European Court of Human Rights.
- 2010‑01‑12:
Who is your liberal voice of the year?
- 2010‑01‑11:
Capsicum: capability-secure sandboxing for FreeBSD.
- 2010‑01‑08:
Google's book scanning technology revealed.
- 2010‑01‑08:
Mercator Ocean maps and forecasts of ocean currents and temperatures, etc.
- 2010‑01‑07:
Fitzwilliam College Cambridge offers place to 14-year-old.
- 2010‑01‑07:
Johann Hari on the last years of summer ice in the Arctic.
- 2010‑01‑07:
Gulf Stream temporarily stopped warming Northern Europe last week.
- 2010‑01‑07:
Amazing satellite image of snow across Britain on 7th January 2010.
- 2010‑01‑06:
Details of Microsoft Outlook 2007 auto account setup (in the absence of autodiscover support from the server).
- 2010‑01‑06:
Unison claims to be "the best usenet browser".
- 2010‑01‑06:
Cambridge to be testing ground for ID cards.
- 2010‑01‑05:
Fabrice Bellard broke the world record for computing the digits of pi on 31 Dec 2009.
- 2010‑01‑02:
The basic laws of human stupidity.
- 2009‑12‑30:
Brian Krebs has a new web site to replace the Washington Post "Security Fix" blog.
- 2009‑12‑29:
A Lua binding for Tokyo Tyrant.
- 2009‑12‑26:
The C Programming Language by B.W.Kernighan & D.M.Richie & H.P.Lovecraft.
- 2009‑12‑23:
Stranded passengers rescued from snow by steam train.
- 2009‑12‑23:
Disable Space switching on Command-Tab in Mac OS X 10.5.2.
- 2009‑12‑23:
Video reveals twists and turns of genital warfare in ducks.
- 2009‑12‑23:
Apple's loss of ZFS.
- 2009‑12‑23:
The status of the P vs. NP problem.
- 2009‑12‑22:
"Overtime", a Laundry story by Charlie Stross.
- 2009‑12‑22:
No. 10 petition to ban use of 084xxx and 087xxx numbers in the public sector.
- 2009‑12‑22:
A review of administrative tools for DNSSEC.
- 2009‑12‑21:
Government to ban the NHS from using premium rate phone numbers.
- 2009‑12‑20:
Crowdsourced document analysis and MP expenses.
- 2009‑12‑20:
Khoros: a Lua operating system.
- 2009‑12‑19:
Has AT&T Wireless data congestion been self-inflicted?
- 2009‑12‑17:
Object/relational mapping is the Vietnam war of computer science.
- 2009‑12‑17:
James Randi, global warming, Bertrand Russell, and the nature of scepticism.
- 2009‑12‑16:
Nominet deletes 1200 .co.uk domains that the police say are used by criminal counterfeiters.
- 2009‑12‑16:
Current status of DNSSEC in various TLDs.
- 2009‑12‑16:
Root-DNSSEC.org - information about DNSSEC for the root zone.
- 2009‑12‑14:
.US TLD now signed with DNSSEC.
- 2009‑12‑14:
A validator for iCalendar.
- 2009‑12‑12:
Mathematical software and me: a very personal recollection by William Stein.
- 2009‑12‑11:
Advice on the values to choose for DNSSEC configuration parameters.
- 2009‑12‑11:
A silly shipping forecast. (YouTube)
- 2009‑12‑10:
Preparing k.root-servers.net for a signed root zone.
- 2009‑12‑10:
Can the grid cope with an all-electric car fleet?
- 2009‑12‑10:
Police say being on the DNA database will harm your career, even if innocent.
- 2009‑12‑09:
An infrastructure service anti-pattern.
- 2009‑12‑08:
SIDN prepares to introduce DNSSEC for .nl zone.
- 2009‑12‑08:
The Register's units of measurement (2)
- 2009‑12‑08:
The Register's units of measurement (1)
- 2009‑12‑08:
List of humorous units of measurement.
- 2009‑12‑08:
The essence of XML is this: the problem it solves is not hard, and it does not solve the problem well.
- 2009‑12‑08:
The Security Skeptic on ICANN's model for high security zone verification.
- 2009‑12‑08:
The incompatible food triad.
- 2009‑12‑08:
Mathematically correct breakfast: Möbius sliced linked bagel.
- 2009‑12‑07:
Super-injunctions can prevent papers from reporting on parliament.
- 2009‑12‑07:
The pernicious rise of the CRB Stasi - Manor Community College in Cambridge bans all un-checked visitors.
- 2009‑12‑07:
Canadian recording industry is target of $60 billion copyright infringement lawsuit.
- 2009‑12‑07:
List of unusual units of measurement.
- 2009‑12‑07:
Cambridge T-shirts.
- 2009‑12‑06:
Fox News insists on being able to knowingly broadcast false news reports.
- 2009‑12‑05:
Live music in pubs tied up in red tape?
- 2009‑12‑04:
Home Office suppresses drugs policy research despite FOIA.
- 2009‑12‑03:
Anti-Grain Geometry - high quality 2D rendering engine for C++.
- 2009‑11‑30:
Hazel Atkinson anodized aluminium jewellery (flash).
- 2009‑11‑30:
Primodise - high resolution full colour images anodized into aluminium.
- 2009‑11‑26:
James Hague on sufficiently smart compilers.
- 2009‑11‑26:
The PI 14 pseudoacoustic infector.
- 2009‑11‑26:
How science is shackled by intellectual property.
- 2009‑11‑25:
Official repository for Erlang/OTP is now on github.
- 2009‑11‑24:
How to make Homo Economicus and Homo Irrationalis disappear.
- 2009‑11‑24:
Exploit shellcode that looks like English text.
- 2009‑11‑24:
The "Mandelbulb" fractal.
- 2009‑11‑24:
The British parliament is sick and decaying, says Graham Allen MP.
- 2009‑11‑24:
The first person to be jailed in the UK for witholding encryption keys.
- 2009‑11‑23:
Valerie Aurora describes the Featherstitch filesystem.
- 2009‑11‑23:
Children's clothes and gender.
- 2009‑11‑23:
Inflation-adjusted value of British coins and notes, 1900-2008.
- 2009‑11‑23:
IE addons gallery - search providers. (Note the prominent omission!)
- 2009‑11‑23:
News Corp wants to pay Microsoft to tell them how to use robots.txt.
- 2009‑11‑23:
Carl Gutekunst provides data from Postini on the unverifiability of most MX server TLS certificates.
- 2009‑11‑20:
The IETF's position on stupid email disclaimers.
- 2009‑11‑20:
Telnic is worried about the UK government's plans to regulate DNS registries.
- 2009‑11‑20:
Motorola Droid autofocus bug related to signed 32bit millisecond counter.
- 2009‑11‑19:
Golang vs. Algol 68.
- 2009‑11‑18:
Nginx HTTP push module - comet for the people.
- 2009‑11‑18:
Understanding scam victims: seven principles for systems security.
- 2009‑11‑18:
An interview with John Gottman - couples therapy and marriage.
- 2009‑11‑18:
Exploding high-pressure steam engines and computer software.
- 2009‑11‑18:
Pigeon: Impossible.
- 2009‑11‑17:
VT220 glyphs.
- 2009‑11‑17:
The physical basis of the leap second.
- 2009‑11‑17:
Securityfix article about donotreply.com.
- 2009‑11‑14:
Programming languages, operating systems, despair and anger.
- 2009‑11‑13:
A20 gate compatibility problems.
- 2009‑11‑12:
Jesus Weir Cambridge micro-hydro electricity generation report.
- 2009‑11‑12:
Splay trees.
- 2009‑11‑12:
Scapegoat trees.
- 2009‑11‑11:
Johann Hari says we should end drugs prohibition.
- 2009‑11‑11:
The Go programming language, from the Plan 9 team at Google.
- 2009‑11‑10:
Google tech talk on inertial electrostatic confinement fusion.
- 2009‑11‑09:
Guy Snape's bread secrets.
- 2009‑11‑09:
Multi-touch visualizer for unibody MacBooks.
- 2009‑11‑07:
List of cats with fraudulent diplomas.
- 2009‑11‑06:
Joda Time - Java date and time API.
- 2009‑11‑06:
PNUTS: Yahoo!s hosted data serving platform.
- 2009‑11‑05:
David Howarth MP to stand down at the next election.
- 2009‑11‑04:
The complete guide to publishing PGP keys in the DNS.
- 2009‑11‑04:
What would happen if you gently lowered the moon to a kissing contact with the earth?
- 2009‑11‑04:
Fully countering "Trusting Trust" by diverse double-compiling.
- 2009‑11‑03:
Brewer's CAP theorem.
- 2009‑11‑03:
Luasync - a Lua libevent binding.
- 2009‑11‑03:
A Lua libevent binding designed to be a drop-in replacement for copas.
- 2009‑11‑03:
Another Lua libevent binding.
- 2009‑11‑03:
Notable implementation features of LuaJIT 2.
- 2009‑11‑02:
LuaJIT 2.0.0-beta1 has been released.
- 2009‑10‑31:
Quickmap version of the London Underground map.
- 2009‑10‑31:
Google's disruptive "less than free" business model.
- 2009‑10‑29:
Online resources for Cambridgeshire library users.
- 2009‑10‑27:
The rel=vcs-* microformat (for links from web pages to source repositories).
- 2009‑10‑27:
Scientologists convicted of fraud in France.
- 2009‑10‑22:
Defending your cred against sexist (or otherwise biased) audiences.
- 2009‑10‑22:
Redis: replicated data structure server.
- 2009‑10‑22:
Alan Perlis's epigrams in programming.
- 2009‑10‑20:
How Moody's sold its ratings and misled investors.
- 2009‑10‑19:
Number 10 responds to postcode database petition with a lengthy content-free brush-off.
- 2009‑10‑19:
How the Wall Street banks are making a billion dollars a month.
- 2009‑10‑18:
14 is the most likely age for a sex offender in the USA.
- 2009‑10‑16:
The Taylor bell foundry in Loughborough rescued from bankruptcy.
- 2009‑10‑16:
PetPorte RFID microchip controlled cat flap.
- 2009‑10‑16:
Carter-Ruck still trying to stop Parliament talking about the Minton Report on Trafigura's pollution.
- 2009‑10‑15:
Mike Pall's reading guide to the Lua source code.
- 2009‑10‑15:
It is possible to booby-trap financial derivatives in a way that is intractable for a buyer to discover.
- 2009‑10‑14:
Simon Singh gets leave to appeal Mr Justice Eady's decision in the chiropractic libel case.
- 2009‑10‑14:
An obituary of Peter Carter-Ruck.
- 2009‑10‑13:
A comparative study of costs in defamation proceedings across Europe.
- 2009‑10‑13:
Why web development is hard.
- 2009‑10‑13:
English Heritage blamed for throttling the belfry renewal business.
- 2009‑10‑13:
The Telegraph on Taylor's of Loughborough, bellfounders.
- 2009‑10‑13:
Warning: Time Machine may unexpectedly delete your backups.
- 2009‑10‑13:
Guardian / Carter-Ruck / Trafigura link round-up.
- 2009‑10‑13:
The Minton report on Trafigura's dumping of toxic waste in the Ivory Coast.
- 2009‑10‑13:
The Spectator on the Guardian / Carter-Ruck / Trafigura pollution cover-up injunction scandal.
- 2009‑10‑13:
The Dyson air amplifier: a fan without blades.
- 2009‑10‑13:
Dr Martens shoe for £100 with guaranteed replacements and repairs for the rest of your life.
- 2009‑10‑12:
Guardian gagged from reporting parliament, in contravention of the 1688 Bill of Rights.
- 2009‑10‑12:
How safe is Gardasil? (the HPV vaccine used in the USA)
- 2009‑10‑12:
Dan Gillmor's 22 new rules of news.
- 2009‑10‑12:
My local bus service cut by 50%
- 2009‑10‑09:
Microsoft's time server code completely ignores leap seconds.
- 2009‑10‑09:
Frank's compulsive guide to postal addresses: effective addressing for international mail from the USA.
- 2009‑10‑09:
Government slaps Ofsted for trying to treat informal childcare arrangements like professional services.
- 2009‑10‑08:
DRAM errors in the wild: a large-scale field study by Google.
- 2009‑10‑08:
Number 10 petition for a free postcode database.
- 2009‑10‑06:
DNSSEC for the root zone - roll-out between December 2009 and July 2010.
- 2009‑10‑06:
Exchange 2003 suppress out-of-office replies to mailing lists.
- 2009‑10‑05:
Objective Lua.
- 2009‑10‑05:
Obfuscated Lua.
- 2009‑10‑05:
Alpine's busy-waiting spinners.
- 2009‑10‑02:
iPhone Wax: develop native UIKit apps in Lua.
- 2009‑10‑02:
The Spamhaus CSS (Composite Snow-Shoe) blacklist.
- 2009‑09‑30:
Windows DNS servers do not implement RFC 1982 SOA serial number arithmetic.
- 2009‑09‑30:
Google catches up with what Lotus Notes did 20 years ago.
- 2009‑09‑29:
A bit about the maths behind RAID Z3.
- 2009‑09‑29:
UK social trends report, 2009 edition.
- 2009‑09‑29:
Details of Reddit's markdown javascript escaping hole.
- 2009‑09‑29:
Number 10 petition on reciprocal childcare.
- 2009‑09‑28:
Xpra - persistent remote applications for X.
- 2009‑09‑28:
NIC.AT's position paper on DNSSEC.
- 2009‑09‑28:
The US healthcare debate: Jonathan Haidt on how our moral roots skew our reasoning.
- 2009‑09‑28:
The no-nannying state.
- 2009‑09‑27:
Flavours of programming.
- 2009‑09‑25:
Gitolite: shared git repository hosting with access control.
- 2009‑09‑25:
The framing of al-Megrahi.
- 2009‑09‑25:
Cambridge architecture post 1945.
- 2009‑09‑25:
Say No to 0870 application approved for iPhone store.
- 2009‑09‑24:
Online dating advice: what exactly to say in a first message. (data from OKCupid)
- 2009‑09‑24:
Best US->UK travel adaptor ever.
- 2009‑09‑23:
What is a good first programming language?
- 2009‑09‑23:
FreeBSD gitorious mirror.
- 2009‑09‑23:
Complexity attacks on stateful firewalls.
- 2009‑09‑21:
What is the right way to raise children?
- 2009‑09‑21:
The report from ICANN's study into scaling the DNS root.
- 2009‑09‑20:
The unspoken truth about managing geeks.
- 2009‑09‑20:
New Scientist science fiction special.
- 2009‑09‑18:
Attacks on Unix/Linux package managers.
- 2009‑09‑18:
NetPGP - a pgp implementation that comes with NetBSD.
- 2009‑09‑18:
BSD licensed OpenPGP implementation.
- 2009‑09‑18:
Ars Technica on Apple's Grand Central Dispatch.
- 2009‑09‑17:
Disabled people and terminology in the social model of disability.
- 2009‑09‑15:
User community for the Windows subsystem for Unix applications, aka Interix.
- 2009‑09‑09:
DAFT: disk-geometry-aware filesystem traversal.
- 2009‑09‑07:
Prof. David Mackay appointed Chief Scientific Advisor in the Department for Energy and Climate Change.
- 2009‑09‑03:
New Dr Evil, er, I mean, F-Secure logo.
- 2009‑09‑02:
A history of marriage.
- 2009‑09‑02:
Emmanuel College Cambridge is willing to perform gay marriages.
- 2009‑09‑01:
Bananajour: a Ruby program to share git repositories on your LAN using DNS-SD.
- 2009‑08‑27:
SD is a distributed bug tracker, built on Prophet, a lightweight database designed for distributed and disconnected operation.
- 2009‑08‑16:
David Mazières' rant on C++'s operator new.
- 2009‑08‑14:
iPhone 3GS has slower floating point than the 3G.
- 2009‑08‑13:
Computer vision algorithms for grabbing Sudoku puzzles with an iPhone.
- 2009‑08‑12:
Jon Warbrick's blog.
- 2009‑08‑07:
Nice visualizations of the computer languages benchmark game.
- 2009‑08‑06:
The eradication of null dereferencing in Eiffel.
- 2009‑08‑06:
DJB on the vulnerabilities in his dnscache.
- 2009‑08‑06:
Rapid poisoning of djbdns dnscache.
- 2009‑08‑04:
Tactical Corsets bring female operators MILSPEC features like MOLLE modular pouch attachment webbing and self-adjustable quick-release buckles in a load-bearing carrier designed to support the female form.
- 2009‑08‑04:
The many ways in which Exchange+Outlook's "recall message" feature does not work.
- 2009‑08‑04:
The perils of outsourcing your city mini-guides to the cheapest bidder.
- 2009‑08‑04:
Trinity College, Cambridge in talks to buy Millennium Dome.
- 2009‑08‑04:
Advice on designing scientific posters.
- 2009‑08‑03:
A discussion of data quality improvements for LibraryThing.
- 2009‑08‑03:
Objects as modules in Newspeak.
- 2009‑07‑31:
Skype may be shut down because of a licensing dispute.
- 2009‑07‑28:
Junio Hamano's implementation of Linus's "Newton-Raphson" idea.
- 2009‑07‑28:
Linus Torvalds suggests using Newton-Raphson to search uniformly-distributed data faster.
- 2009‑07‑28:
GPP is a general-purpose preprocessor.
- 2009‑07‑28:
The Birthday Calendar: a modest proposal for calendar reform.
- 2009‑07‑28:
A practical solution for scripting language compilers.
- 2009‑07‑24:
Nirvana vs Rick Astley - Never Gonna Give Your Teen Spirit Up.
- 2009‑07‑23:
Using the Newton-Raphson method to make a binary search faster on uniformly distributed data.
- 2009‑07‑23:
Variants of the Almquist Shell.
- 2009‑07‑20:
Best practices in automated systems administration and infrastructure architecture.
- 2009‑07‑19:
Prospects for an engineering discipline of software.
- 2009‑07‑16:
Maps of the UK in the 1940s, plus postcode data gathering.
- 2009‑07‑15:
Sprint outsources its network, the core of its business, to Ericsson - nothing left but billing and customer service?
- 2009‑07‑14:
Tony Sale, founder of the Bletchley Park museum.
- 2009‑07‑14:
Remote code execution vulnerability in ISC dhclient - don't use DHCP on an untrusted network until you have upgraded!
- 2009‑07‑14:
Guinness World Records fail at trademark protection.
- 2009‑07‑14:
Andrew Tridgell on the history of Samba.
- 2009‑07‑14:
Loss of root certificate authority private keys has serious consequences for German electronic health card.
- 2009‑07‑14:
Google's Microsoft moment.
- 2009‑07‑14:
The not-so-hidden politics of class online.
- 2009‑07‑14:
112-bit prime elliptic curve discrete logarithm problem (ECDLP) solved using cluster of 200 PS/3 game consoles.
- 2009‑07‑14:
Debugging a weather station rain sensor.
- 2009‑07‑14:
Pupil banned from cycling to school.
- 2009‑07‑13:
SMX: server macro expansion language.
- 2009‑07‑10:
Photography advice from the Metropolitan Police.
- 2009‑07‑10:
PubSubHubbub draft protocol spec.
- 2009‑07‑10:
What English would look like if it were purged of its non-Germanic words and used German-style compounds instead of borrowings to express new concepts.
- 2009‑07‑10:
H-Store: a next generation OLTP DBMS.
- 2009‑07‑10:
"Creating the innocent killer: Ender's Game, intention, and morality" - John Kessel's more moderate examination of the story.
- 2009‑07‑10:
Orson Scott Card has always been an asshat - some background to Radford's essay about Ender and Hitler.
- 2009‑07‑10:
Ender and Hitler: sympathy for the superman.
- 2009‑07‑10:
Microsoft Gazelle: the web browser as operating system. (I wonder how close Google Chrome gets to this research model.)
- 2009‑07‑10:
VL2: a scalable and flexible data center network.
- 2009‑07‑10:
PortLand: a scalable fault-tolerant layer 2 data center network fabric.
- 2009‑07‑09:
How to cure your asthma or hayfever using hookworm - a practical guide. (WTF?)
- 2009‑07‑08:
A guide to the rights of photographers in the UK. (v.2)
- 2009‑07‑08:
CADR - automated DNS registry delegation updates using DNSSEC.
- 2009‑07‑08:
UK 3G mobile broadband coverage maps.
- 2009‑07‑07:
Transforming RFC 2629 formatted XML through XSLT.
- 2009‑07‑07:
A review of "The Tyrannicide Brief: the story of the man who sent Charles I to the scaffold".
- 2009‑07‑07:
Mental models, consistency, and programming aptitude.
- 2009‑07‑07:
Decentralized Deduplication in SAN cluster file systems.
- 2009‑07‑07:
Arianna Huffington: obsessiveness is the greatest strength of online news.
- 2009‑07‑06:
Groovy wouldn't exist if its author had had Scala instead.
- 2009‑07‑06:
Diagrams of HGV blind spots.
- 2009‑07‑03:
Brompton World Championship 2009 - a bike race with a collar-and-tie dress code.
- 2009‑07‑03:
Elsevier fails to block release of its licensing deal with Washington State University.
- 2009‑07‑03:
Debunking Canadian health care myths.
- 2009‑07‑03:
Think again about Asia's rise.
- 2009‑07‑03:
Excellent case study of an online banking exploit based on spam, malware, and dupes.
- 2009‑07‑02:
The Management Myth - on the uselessness of MBAs.
- 2009‑07‑02:
Thoughtcrime Experiments - an open source anthology.
- 2009‑07‑02:
Heather Brooke's statement given to the parliamentary review of the expenses scandal.
- 2009‑07‑01:
A review of the Polymath1 experiment in open collaborative mathematics.
- 2009‑07‑01:
Is scientific publishing about to be disrupted?
- 2009‑07‑01:
European Commission persuades mobile phone manufacturers to standardize on micro-USB for connecting chargers.
- 2009‑07‑01:
Correlation between mass extinctions and the Earth's oscillation between galactic north and south.
- 2009‑07‑01:
The Pumpabike commercially-available human-powered hydrofoil. (horrid flash site)
- 2009‑07‑01:
The Cetan II human-powered hydrofoil, aiming to beat the water speed record.
- 2009‑07‑01:
The "Decavitator" human-powered hydrofoil, holder of the water speed record.
- 2009‑07‑01:
IBM uses water to cool a supercomputer to 60 celcius.
- 2009‑06‑30:
Oxmail activity graphs.
- 2009‑06‑30:
The computer of 2010 as predicted by Forbes in 2000 - hopeless.
- 2009‑06‑30:
CCured is a source-to-source translator for C. It analyzes the C program to determine the smallest number of run-time checks that must be inserted in the program to prevent all memory safety violations.
- 2009‑06‑29:
Hosting git repositories the easy and secure way.
- 2009‑06‑29:
A basic guide to in-ear-canalphones.
- 2009‑06‑28:
Evan Weaver's primer on distributed systems.
- 2009‑06‑28:
Evolving Twitter's architecture.
- 2009‑06‑28:
The toaster project: trying to build a toaster, from scratch, beginning by mining the raw materials.
- 2009‑06‑28:
How Linux supports more devices than any other OS, ever.
- 2009‑06‑28:
Spam and virus filter providers cannot be sued by blocked senders in the USA, says federal appeals court.
- 2009‑06‑28:
Help vampires: a spotter's guide.
- 2009‑06‑26:
The English Patient: A man gets lost in the Philadelphia health system "What is this, fucking Kafka?" and lives to tell about it.
- 2009‑06‑26:
CSS Play - pure CSS dynamic layout demos.
- 2009‑06‑24:
Problems with shared access to calendars in Microsoft Exchange.
- 2009‑06‑24:
Brilliant folding power plug.
- 2009‑06‑21:
Table of UK universities' environmental performance.
- 2009‑06‑19:
Heather Brooke on "blackwash".
- 2009‑06‑19:
$1.9 million fine for downloading 24 songs worth 99c each.
- 2009‑06‑19:
Rental Rights: getting a fair deal for tenants.
- 2009‑06‑19:
Telegraph publishes unredacted versions of MP's expenses claims, for comparison with the heavily blacked-out ones published by Parliament.
- 2009‑06‑18:
File sharing and copyright.
- 2009‑06‑17:
Harvard study finds weaker copyright protection has benefited society.
- 2009‑06‑17:
Greener desktop computing at OUCS.
- 2009‑06‑17:
20 of the world's most beautiful libraries.
- 2009‑06‑17:
Hot Library Smut
- 2009‑06‑17:
Atlas Obscura: wondrous, curious, and bizarre locations around the world.
- 2009‑06‑17:
Washington is unable to call all the shots, says the Shanghai co-operation organization.
- 2009‑06‑16:
The Wellcome Library's pragmatic orphan works policy.
- 2009‑06‑16:
A review of "Against Intellectual Monopoly".
- 2009‑06‑15:
SoftHSM: a software implementation of the PKCS#11 hardware security module interface.
- 2009‑06‑15:
Up to 30% of Medicare spending is wasted on needless care.
- 2009‑06‑15:
Mornington Crescent - deluxe edition!
- 2009‑06‑15:
Police delays prevented prosecution for death of a cyclist.
- 2009‑06‑15:
Student statement on the right to research.
- 2009‑06‑14:
A brief history of distributed consensus and transactions.
- 2009‑06‑14:
The FT covers MAAWG and gets rather excited about a "secret war" on "cyber-criminals".
- 2009‑06‑14:
YouTube encodings compared to Ogg Theora/Vorbis.
- 2009‑06‑14:
An exhibition about the Putney Debates of 1647, at St Mary's Church near Putney Bridge.
- 2009‑06‑14:
Zombie operating systems and ASP.NET MVC - the same bug as in the story of mailx's aux.c source file.
- 2009‑06‑12:
Copyright in science is holding us back; Ignore it.
- 2009‑06‑12:
Two videos on intelligent traffic design.
- 2009‑06‑12:
Is Mr Justice Eady a friend of a free Press? There are good reasons to believe that he isn't.
- 2009‑06‑10:
The WHO cocaine report the US didn't want you to see.
- 2009‑06‑10:
The Economist on Simon Singh and the British Chiropractic Association.
- 2009‑06‑10:
Chiropractors take down their websites for fear of prosecution for false advertising.
- 2009‑06‑10:
Metropolitan Police accused of waterboarding suspects.
- 2009‑06‑09:
"Teach the controversy" t-shirts.
- 2009‑06‑09:
Some of the technology behind Apple's Grand Central Dispatch.
- 2009‑06‑09:
Pro-sw-patent lobby admits that the European patent litigation agreement aims to create software patents by the back door.
- 2009‑06‑09:
What kind of people voted for the BNP?
- 2009‑06‑09:
I think there's something wrong with your computer...
- 2009‑06‑09:
John Lanchester writes about the financial crisis.
- 2009‑06‑09:
Compaq's Personal Jukebox: the proto-iPod.
- 2009‑06‑09:
62% of personal bankruptcies in US due to medical costs. 78% of them had insurance.
- 2009‑06‑09:
What the government doesn't understand about the Internet, and what to do about it.
- 2009‑06‑09:
Cool "app wall" display at WWDC.
- 2009‑06‑09:
New laws in the USA defend free speech against harmful UK libel trials.
- 2009‑06‑08:
The Compensation Recovery Unit - recovers some social security costs from insurance providers.
- 2009‑06‑08:
The history of ClariNet.com.
- 2009‑06‑08:
Instruction manual to operate and maintain Charles Babbage's 2nd Difference Engine.
- 2009‑06‑08:
Clarence Saunders, inventor of the self-service grocer's shop.
- 2009‑06‑08:
Googlers talk about how they manage search quality.
- 2009‑06‑08:
Swedish Pirate Party wins seat in EU parliament.
- 2009‑06‑06:
Tom Swifties from Schott's Vocab Blog.
- 2009‑06‑05:
US government gives DNS root key to Verisign.
- 2009‑06‑05:
The impending demise of the university - going the way of the newspaper.
- 2009‑06‑05:
Prospect Magazine says Tiananmen Square is irrelevant to young Chinese because they now have the freedom and prosperity they wanted.
- 2009‑06‑05:
The maths gender gap is not innate.
- 2009‑06‑04:
Typing the letters A-E-S into your code? You're doing it wrong!
- 2009‑06‑04:
Linux Mag on NILFS2: a new implementation of a log-structured filesystem for Linux.
- 2009‑06‑04:
Sign up to support Simon Singh's libel defence against the chiropractic quacks.
- 2009‑06‑03:
Unskilled and unaware of it: how difficulties in recognizing one's own incompetence lead to inflated self-assessments.
- 2009‑06‑03:
Roald Dahl's daughter died of measels aged seven.
- 2009‑06‑03:
Yay, UCL goes 100% open access - pity the FT repeats lies from the secret science lobby.
- 2009‑06‑03:
US Supreme Court to hear appeal of "Bilski" - likely to restrict patents further?
- 2009‑06‑02:
Why "robots.txt" and "favicon.ico" are bad ideas and should not be emulated.
- 2009‑06‑02:
Why you should also not vove for UKIP.
- 2009‑06‑02:
Why you should not vote for the Green party.
- 2009‑06‑02:
LWN on the Debian flamewar over Okular's support for PDF copy restrictions.
- 2009‑06‑02:
Prospect Magazine publishes two thirds of my letter in response to last month's "Email Tax" article.
- 2009‑06‑01:
A woman talks about how havng sex with women is good for her self-esteem.
- 2009‑06‑01:
Going to the dogs - Theodore Dalrymple criticizes the liberal consensus.
- 2009‑06‑01:
Piracy is the next-generation media platform.
- 2009‑05‑31:
Where fantasy and sf authors write.
- 2009‑05‑31:
The audio output mess on Linux.
- 2009‑05‑30:
Apple Unicode private use characters.
- 2009‑05‑30:
Teach your children to argue.
- 2009‑05‑28:
Wine on Windows - Wine has better compatibility with old Windows apps than Windows.
- 2009‑05‑28:
Lessons on evidence-resistent theories from the vaccine-autism wars.
- 2009‑05‑28:
Teaching Copyright the EFF way.
- 2009‑05‑27:
Consistent overhead byte stuffing - efficient binary escaping.
- 2009‑05‑27:
Using static and shared libraries across platforms.
- 2009‑05‑26:
#ifdef considered harmful.
- 2009‑05‑26:
An algebraic approach to file synchronization.
- 2009‑05‑26:
Judge investigating accusations of bias in Pirate Bay case removed because of bias!
- 2009‑05‑25:
Google Maps query parameters.
- 2009‑05‑24:
Safari 4 hidden settings.
- 2009‑05‑24:
Paxos made live - Google's implementation experience.
- 2009‑05‑24:
Referendum 2010 - campaign for proportional representation.
- 2009‑05‑22:
Unison file synchronizer.
- 2009‑05‑21:
Rules for time travellers.
- 2009‑05‑21:
ACLU challenges Myriad Genetics' patents on breast cancer genes.
- 2009‑05‑21:
Lawrence Lessig rips Mark Helprin to shreds.
- 2009‑05‑20:
Role models for adolescent boys.
- 2009‑05‑20:
DNS TLD trust dependency graphs.
- 2009‑05‑20:
Google builds Street View trikes to map UK footpaths.
- 2009‑05‑19:
The safer the seat, the more likely the MP is to be involved in the expenses scandal.
- 2009‑05‑19:
David A. Wheeler argues Unix pathnames should have a restricted character set.
- 2009‑05‑19:
Sophos Klingon anti-virus.
- 2009‑05‑19:
MS "fixes" architectural error in Exchange by throwing away X- headers.
- 2009‑05‑19:
Helena Kennedy prescribes some medicine for a sick democracy.
- 2009‑05‑19:
In Pursuit of Elegance: Guy Kawasaki interviews Matthew May.
- 2009‑05‑19:
The Cobra programming language.
- 2009‑05‑18:
Ordnance Survey disables Google Earth viewer for no clear reason.
- 2009‑05‑18:
On designing and deploying Internet-scale services.
- 2009‑05‑17:
The datacenter as a computer: an introduction to the design of warehouse-scale machines.
- 2009‑05‑17:
A really good discussion about the links between analytic philosophy and the theory of computing.
- 2009‑05‑17:
Time for proportional representation in Westminster?
- 2009‑05‑17:
Five pieces of jun that turned out to be valuable artefacts.
- 2009‑05‑15:
Yet Another Build System - a Python-based build system with automatic dependency detection.
- 2009‑05‑15:
A generic program memoizer.
- 2009‑05‑15:
MySociety says MPs expenses are the best example yet of why FOI is a good law.
- 2009‑05‑15:
Ross Anderson, David Mackay, and others elected fellows of the Royal Society.
- 2009‑05‑15:
How Porsche hacked the financial system and made a killing.
- 2009‑05‑15:
How hard the MPs tried to keep their dirty secrets.
- 2009‑05‑13:
HADOPI for print.
- 2009‑05‑12:
Vesta: a configuration management system from DEC SRC.
- 2009‑05‑12:
Killer driver escapes jail - cyclist to blame.
- 2009‑05‑12:
List of Roman place names in Britain.
- 2009‑05‑11:
The Oxbridge limericks game.
- 2009‑05‑11:
git-central: scripts and hooks for use with a centralized git repository.
- 2009‑05‑11:
Brilliant video - war of words?
- 2009‑05‑11:
Gitosis - shared git repository sandbox.
- 2009‑05‑11:
J.G-C's research resources for "The Geek Atlas", including why Wikipedia is better than Britannica.
- 2009‑05‑10:
NYT TiernyLab discusses attention and concentration.
- 2009‑05‑10:
Why can't we concentrate? A review of "Rapt: attention and the focused life" by Winifred Gallagher.
- 2009‑05‑10:
MPs and the Guardian wake up to G20 agents provocateurs, a month after Craig Murray.
- 2009‑05‑09:
UK IPO approves patent for scriptable components on a mobile phone. Good grief.
- 2009‑05‑08:
A video of son and father writing the alphabet - cute calligraphy.
- 2009‑05‑08:
Web designer sacked by TF1 for opposing HADOPI.
- 2009‑05‑08:
Naked Wines helps to put wine producers in closer contact with their ultimate customers.
- 2009‑05‑08:
A brief, incomplete, and mostly wrong history of programming languages.
- 2009‑05‑07:
Gareth Peirce writes about torture, secrecy and the British state.
- 2009‑05‑07:
Most home news in UK papers is churnalism - recycled PR and wire copy.
- 2009‑05‑06:
On the disconnect between theory and reality in the study of the connectivity of the Internet.
- 2009‑05‑06:
Drug decriminalization is a success in Portugal.
- 2009‑05‑06:
David Colquhoun explains that bacon doesn't cause cancer.
- 2009‑05‑05:
Prospect Magazine publishes a sadly ignorant proposal for an email tax.
- 2009‑05‑05:
Can we afford technological salvation? The increasing energy intensity of manufacturing and IT.
- 2009‑05‑05:
The effectiveness of various contraceptives.
- 2009‑05‑05:
This government has been the most right-wing since the second world war.
- 2009‑05‑01:
Christians more likely to support torture.
- 2009‑05‑01:
Good ways to glue this to that.
- 2009‑05‑01:
Low-salt diets do not help to prevent heart disease or high blood pressure.
- 2009‑05‑01:
Cowboy cost savings for boiler installation.
- 2009‑04‑29:
Homebrew on an oceanographic research vessel using a filter coffee machine.
- 2009‑04‑29:
The flip ship - bonkers!
- 2009‑04‑29:
Parliament hears about UK government support of torture.
- 2009‑04‑29:
UK Passport Service now vetoing changes of name!
- 2009‑04‑29:
Cache-oblivious search trees.
- 2009‑04‑28:
Using git for what it is not intended.
- 2009‑04‑28:
Peter Serafinowicz on swine flu.
- 2009‑04‑28:
Hilarious bug: "OpenOffice cannot print on Tuesdays".
- 2009‑04‑28:
README file for the DNSSEC-tools SSHFP host key validation patch for OpenSSH.
- 2009‑04‑28:
Uncopyright: feel free to steal my content
- 2009‑04‑28:
Readability - a bookmarklet for stripping down web pages.
- 2009‑04‑27:
Defining multiple environments with puppet for development/testing/production.
- 2009‑04‑27:
Using a svn branch for testing puppet configurations.
- 2009‑04‑27:
The MacGyver multitool - the only tool you'll ever need!
- 2009‑04‑26:
Fast string encoding implementations - base64, hex, etc.
- 2009‑04‑26:
Google Maps typography.
- 2009‑04‑26:
The Pirate Google - a replacement for The Pirate Bay using a custom Google search.
- 2009‑04‑26:
"Notebook" - a brilliant recursive animation featuring magical paper.
- 2009‑04‑25:
Is the supremacy of object-oriented programming over?
- 2009‑04‑25:
Derailing for Dummies: making discrimination easier!
- 2009‑04‑25:
Being an offshore programmer in the oil industry.
- 2009‑04‑24:
Compare Google Maps and OpenStreetMap using a semi-transparent overlay - cool!
- 2009‑04‑24:
The origins of the BITC programming language.
- 2009‑04‑24:
Scenic or not? Rate the UK's pretty places.
- 2009‑04‑24:
Leo - a versatile data management platform. (outline/graph editor?)
- 2009‑04‑24:
The Last Straw Man - how the UK is becoming a police state.
- 2009‑04‑23:
CycleStreets - cycling route planner for the UK based on OpenStreetMap, produced by the Cambridge Cycling Campaign.
- 2009‑04‑23:
Cambridge to join Eduroam in the summer - brilliantly easy international WiFi roaming.
- 2009‑04‑23:
Small-scale benchmark of a few key/value stores - Tokyo Cabinet wins.
- 2009‑04‑22:
How to display the date in the menu bar on Mac OS X.
- 2009‑04‑22:
Taga - a neat convertible trike / pushchair.
- 2009‑04‑22:
ISC starts development work on BIND 10.
- 2009‑04‑21:
Bogus patent infringement claims against JMRI open source model railway software.
- 2009‑04‑21:
Piracy is progressive taxation, and other online distribution lessons from Tim O'Reilly.
- 2009‑04‑21:
How celebrity chefs changed the way we eat.
- 2009‑04‑21:
Notes on distributed key-value stores - Tokyo Cabinet wins.
- 2009‑04‑21:
Amazing urban bike tricks - cycle parkour!
- 2009‑04‑21:
A history of bootlegs on Radio 4 - how illegal recording made a new market for music. (Available to listen until the 26th.)
- 2009‑04‑21:
Pirates buy more music.
- 2009‑04‑21:
Themes in contemporary analytic philosophy as reflected in the work of Monty Python.
- 2009‑04‑20:
Shami Chakrabarti speaking in Cambridge on Friday.
- 2009‑04‑19:
High-precision arithmetic libraries, including double-double and quad-double implementations.
- 2009‑04‑13:
La Charronnière - my Mum's gites.
- 2009‑04‑11:
The increasing frequency of black swan events - caused by greater efficiency and interdependence.
- 2009‑04‑11:
Microsoft's increasingly aggressive patent enforcement policy.
- 2009‑04‑11:
Inhalable chocolate aerosol - sounds like something Heston Blumemthal would do.
- 2009‑04‑11:
A diagram of the many businesses that sprang from Star Wars.
- 2009‑04‑11:
Creative Commons CC0 1.0 copyright waiver.
- 2009‑04‑10:
A scientific approach to soft boiled eggs.
- 2009‑04‑10:
Jenny McCarthy Body Count - disease and death in the US preventable by vaccination.
- 2009‑04‑09:
Cory Doctorow loves David MacKay's book "Sustainable Energy Without the Hot Air"
- 2009‑04‑09:
Russian depopulation.
- 2009‑04‑09:
Test cases for the Content-Disposition header and RFC 2231 / 2047 encoding in HTTP.
- 2009‑04‑08:
Slack: configuration management based on rsync.
- 2009‑04‑07:
Computer science should be taught using more interesting and motivating examples.
- 2009‑04‑07:
The best way to rob a bank is to own one.
- 2009‑04‑07:
10% of CA-certified code is malware, and this malware is more effective than average.
- 2009‑04‑07:
The IETF is an unusual example of a Habermasian discourse - a rulemaking proces that legitimates its own outcomes.
- 2009‑04‑07:
DNS root to be signed by the end of the year?
- 2009‑04‑07:
Akamai Application Accelerator caveats.
- 2009‑04‑07:
Union for the Co-ordination of Transmission of Electricity - the European trans-national grid.
- 2009‑04‑07:
CSS is awesome - a mug for web developers.
- 2009‑04‑07:
The dark side of Dubai.
- 2009‑04‑07:
Steve Crocker explains how the Internet got its RFCs.
- 2009‑04‑02:
CalConnect reflections and recommendations arising from the 2007 US DST change.
- 2009‑04‑02:
Keep /etc in git or other DVCSs - etckeeper.
- 2009‑04‑02:
What's the use of Twitter?
- 2009‑04‑01:
Wrong Tomorrow - keeping track of predictions from pundits.
- 2009‑04‑01:
Museum of Bad Art. (hilarious!)
- 2009‑04‑01:
The man that wrote the software that turned mortgages into bonds.
- 2009‑04‑01:
Continuous deployment in five easy steps.
- 2009‑04‑01:
No, he can't - scathing article about Obama.
- 2009‑04‑01:
Add command-line editing to arbitrary programs: rlwrap.
- 2009‑03‑31:
Add command-line editing to arbitrary programs: with-readline.
- 2009‑03‑31:
Reducing XSS by way of automatic context-aware escaping in template systems.
- 2009‑03‑31:
Gibak: A better backup system built on Git.
- 2009‑03‑31:
Why www is required for web servers under ox.ac.uk.
- 2009‑03‑31:
Uighurs use unofficial timezone 2 hours behind Beijing.
- 2009‑03‑31:
Clojure: functional programming for the JVM.
- 2009‑03‑31:
Encarta to be discontinued.
- 2009‑03‑30:
Anatole Kaletsky blames the crisis on politicians' love for the bogus axioms of academic economics.
- 2009‑03‑30:
Two Cultures: 50 years on - a Royal Society debate. (I can guess what Ben Goldacre would say.)
- 2009‑03‑30:
Lennart Augusstson releases cmonad, for writing Haskell in a C style. (brilliantly bonkers)
- 2009‑03‑30:
Dan Geer's 1998 talk on information security, "risk management is where the money is".
- 2009‑03‑30:
The Agena programming language.
- 2009‑03‑30:
British team wins new land speed record for a wind-powered vehicle: 202.9 km/h.
- 2009‑03‑30:
C++ draft standard.
- 2009‑03‑30:
Another Aussie daylight savings change causes havoc.
- 2009‑03‑29:
Aho & Ullman Foundations of Computer Science - now out of print but available online.
- 2009‑03‑29:
Interview with David Simon, creator of The Wire - failed newspapers, political corruption, and life at the bottom.
- 2009‑03‑28:
How to reverse yellowing of old plastics.
- 2009‑03‑28:
UK government finally admits to receiving intelligence from torture.
- 2009‑03‑27:
Top of the traditional British pie charts.
- 2009‑03‑27:
The IMF's view of how to get out of a financial crisis: take power away from bankers.
- 2009‑03‑26:
The number of Brits with amusing surnames has declined by up to 75 percent in the last century. (top quality headline)
- 2009‑03‑26:
Googlers write about the unreasonable effectiveness of data in AI applications.
- 2009‑03‑26:
Another computerish Devil's Dictionary.
- 2009‑03‑25:
Overview of how Google handles outages.
- 2009‑03‑25:
Fast HTTP polling with nginx, libevent, memcached.
- 2009‑03‑25:
Abacus email ticketing system designed for handling email to abuse@.
- 2009‑03‑25:
Valerie Aurora reviews "Women don't ask".
- 2009‑03‑24:
Beej's guide to Unix IPC
- 2009‑03‑24:
Some facts about Jon Skeet.
- 2009‑03‑24:
The NASA Apollo guidance computer.
- 2009‑03‑24:
Applications can force the clock to run fast on Windows.
- 2009‑03‑24:
Akamai's parallel internet beats the public one, for their customers.
- 2009‑03‑24:
The Express sort of apologises, not really understanding why they are so disgusting.
- 2009‑03‑23:
Recording industry doesn't want to pay for anti-piracy efforts.
- 2009‑03‑23:
Facebook does continuous deployment.
- 2009‑03‑23:
And then they came for the vegetarians...
- 2009‑03‑23:
Cambridge cabbies insist on parking illegally.
- 2009‑03‑22:
Data storage and recovery problems at the US national archives.
- 2009‑03‑22:
Perl script for Twitter-to-speech.
- 2009‑03‑21:
Amazon EC2's strength is its simplicity.
- 2009‑03‑21:
SOGo open-source groupware server.
- 2009‑03‑21:
Forvo: all the words in the world, pronounced by native speakers.
- 2009‑03‑21:
The Twouble with Twitters.
- 2009‑03‑21:
A 1995 debate about online vs dead tree news.
- 2009‑03‑21:
Value of a Yugoslav 0.1 Dinar coin.
- 2009‑03‑21:
JISC provides advice on the use of Creative Commons licences in UK academia.
- 2009‑03‑20:
Adam Roberts reviews Anathem, with funny neologisms.
- 2009‑03‑20:
Building a better way of teaching the scientific method.
- 2009‑03‑20:
Don't give prizes to people who hide exploitable security vulnerabilities.
- 2009‑03‑19:
Steve Yegge investigates focus-follows-mouse on Mac OS X.
- 2009‑03‑18:
And you thought you had too many books...
- 2009‑03‑18:
Graham Linehan on that disgusting Sunday Express story.
- 2009‑03‑18:
Google provides statistics on DMCA takedown abuse - 37% of notices are bogus.
- 2009‑03‑18:
US Insurers must start disclosing how climate change is likely to affect their businesses.
- 2009‑03‑18:
Emoji (Japanese phone emoticons) for Unicode.
- 2009‑03‑18:
Some truths about Guantanamo Bay.
- 2009‑03‑18:
AnandTech explains SSD performance.
- 2009‑03‑18:
Intellectual property vices and crimes.
- 2009‑03‑18:
RPC and its offspring are convenient yet fundamentally flawed.
- 2009‑03‑17:
If you are a startup, don't do a big PR product launch.
- 2009‑03‑17:
Microsoft reverts RFC 3484 brain damage in recent versions of Windows.
- 2009‑03‑17:
rename(2) isn't atomic on Mac OS X.
- 2009‑03‑17:
Linux TCP buffer autotuning causes congestion collapse.
- 2009‑03‑17:
9% of NTP pool servers failed to handle the leap second correctly.
- 2009‑03‑17:
The average number of new students per department majoring in computer science is up 9.5 percent over last year. This is the first time enrollment increased in six years.
- 2009‑03‑17:
Canada's science minister won't say if he believes in evolution. "I'm not going to answer that question. I am a Christian, and I don't think anybody asking a question about my religion is appropriate."
- 2009‑03‑17:
How to get a URL off the Google Safe Browsing list.
- 2009‑03‑17:
Support for the Google Safe Browsing database in ClamAV.
- 2009‑03‑17:
EPO seeks to validate software patents without the European Parliament.
- 2009‑03‑16:
Operator overloading ad absurdum - I note that Haskell's type classes make disciplined operator naming easier.
- 2009‑03‑16:
Statistics from the UK Vegetarian Society - 3% completely vegetarian plus 5% partly vegetarian.
- 2009‑03‑16:
Copyright law is a "colossal cultural mistake".
- 2009‑03‑16:
Newspapers are dying without piracy so the recording industry is wrong to blame its decline on piracy.
- 2009‑03‑16:
More bogus propaganda about nonexistent terrorist reconnaisance.
- 2009‑03‑16:
Making a radio in a POW camp - including making the components from scratch.
- 2009‑03‑16:
Cambridge University standard entrance requirement to rise to A*AA.
- 2009‑03‑16:
Mad conspiracy theory site about the Corpus clock.
- 2009‑03‑16:
Article in Wired about the Corpus clock.
- 2009‑03‑16:
Press Complaints Commission targets Sunday Express over vicious Dunblane non-story.
- 2009‑03‑16:
How to straighten the leaning tower of Pisa - optical illusion.
- 2009‑03‑15:
Nice memory map of Cambridge.
- 2009‑03‑15:
David Mitchell on the public sector and online feedback.
- 2009‑03‑15:
Old children's books may not be re-sold in USA because of fears over lead pigments.
- 2009‑03‑15:
Apple DRM roundup.
- 2009‑03‑15:
Understanding hypermedia as the engine of application state - on RESTful architecture.
- 2009‑03‑15:
The death of business-method patents - the build-up to and possible effects of the Bilski decision.
- 2009‑03‑14:
Grow-a-brain's compendious collection of clocks and watches.
- 2009‑03‑14:
Unusual clock designs.
- 2009‑03‑14:
Piracy has become mainstream.
- 2009‑03‑14:
NHS Hounslow joins MMR campaign.
- 2009‑03‑14:
Public health advertising for MMR - should have done this before take-up fell to 2/3.
- 2009‑03‑14:
Newspapers and thinking the unthinkable.
- 2009‑03‑13:
The architecture of the Burroughs B5000.
- 2009‑03‑13:
SunOS C style guide.
- 2009‑03‑13:
Amazon uses DMCA to restrict where you can buy e-books.
- 2009‑03‑13:
USA rules texts of prospective anti-counterfeiting and IPR treaty are state secrets.
- 2009‑03‑12:
The history of classical music shows that copyright doesn't do what its supporters claim.
- 2009‑03‑12:
Millions of Brits can't read well enough to keep up with karaoke lyrics. (sounds like bad science to me)
- 2009‑03‑12:
Reverse HTTP - direct support for COMET using the HTTP Upgrade: mechanism.
- 2009‑03‑12:
The Bayeux protocol - a formalized version of COMET.
- 2009‑03‑12:
Sun to take on the router market using Solaris on commodity hardware.
- 2009‑03‑12:
The world's biggest diamond heist.
- 2009‑03‑12:
The bastards at the Sunday Express discover that teenagers are teenagers and decide to spew their bile on the survivors of the Dunblane shootings.
- 2009‑03‑12:
Frank Miller's Charlie Brown.
- 2009‑03‑12:
Did the BBC break the law by demonstrating how to use a botnet? (yes)
- 2009‑03‑12:
Stupid filesystems are better (on top of complicated storage systems).
- 2009‑03‑12:
Number 10 petition from retired senior police officer to repeal section 110 of the Serious Organised Crime and Police Act 2005 and replace it with legislation that protects the individual from arrest unless specifically sanctioned under specific legislation relating to a specific serious offence punishable with imprisonment.
- 2009‑03‑12:
Lithium breakthrough could result in batteries that charge in 10 seconds.
- 2009‑03‑12:
Domain specific pidgins.
- 2009‑03‑12:
The "is it a DSL or an API?" ten question checklist.
- 2009‑03‑12:
Economists say copyright and patent laws are killing innovation and hurting the economy.
- 2009‑03‑11:
Periodic table of typefaces.
- 2009‑03‑11:
PolarClock - pretty screensaver time display.
- 2009‑03‑11:
Practical RSA threshold signatures.
- 2009‑03‑11:
Programming languages and security: a short reading list.
- 2009‑03‑11:
How strictly to follow the test-driven development religion?
- 2009‑03‑11:
Memories, Guesses, and Apologies - comparing the cost of real-world errors and database consistency errors.
- 2009‑03‑11:
Cloud pricing and application architecture - fine-grained billing rewards optimization.
- 2009‑03‑11:
Top 10 inventions of the middle ages.
- 2009‑03‑10:
Why Rand's philosophy is poison to everybody.
- 2009‑03‑10:
Scanwiches.
- 2009‑03‑10:
Academic journal prices are unrelated to their "impact factors".
- 2009‑03‑10:
Gay rare duck breeding failure.
- 2009‑03‑10:
Billy Bragg and Dave Rowntree on Google vs. the PRS.
- 2009‑03‑10:
The problem with integer division in old versions of Python.
- 2009‑03‑10:
Performing Rights Society tries to milk YouTube, makingl music videos too expensive to remain available in the UK.
- 2009‑03‑10:
Train your spouse like an exotic animal in a zoo.
- 2009‑03‑09:
Deliberately unsustainable business models - live fast, die young, don't jump the shark.
- 2009‑03‑09:
The history of Comic Sans - inspired by Watchmen!
- 2009‑03‑09:
Old portrait of Shakespeare re-discovered - other known pictures of him are probably copies of this one.
- 2009‑03‑09:
Face recognition used to register pupils' attendance at some schools in Cambridgeshire.
- 2009‑03‑09:
German car sales up with payment for scrapping old cars.
- 2009‑03‑09:
Informing ourselves to death - bonkers.
- 2009‑03‑08:
Telegraph.co.uk hacked by SQL injection, subscriber details and passwords revealed.
- 2009‑03‑07:
The National Institutes of Health copyfight.
- 2009‑03‑07:
Enterprise fizzbuzz.
- 2009‑03‑06:
More about the Microsoft / Tom Tom patent lawsuit.
- 2009‑03‑06:
20% of all servers bought by Microsoft, Google, Yahoo, Amazon.
- 2009‑03‑06:
LLVM 2.5 release notes.
- 2009‑03‑06:
Google demands patent reform.
- 2009‑03‑05:
The Cult of Done Manifesto.
- 2009‑03‑04:
Another episode in the war against photography.
- 2009‑03‑04:
Native French speakers don't agree on the genders of nouns.
- 2009‑03‑04:
Things to be considered for RFC 3484 revision.
- 2009‑03‑04:
DJB just awarded $1000 for a security hole in djbdns.
- 2009‑03‑04:
Charlie Brooker's screen burn on Heston Blumenthal's Feast. Bonkers hilarity.
- 2009‑03‑04:
Wave nature of light demonstrated by hand.
- 2009‑03‑03:
Popular UK CCTV statistics are based on fiction.
- 2009‑03‑03:
Wired publishes lies about the Japanese opinion of the iPhone.
- 2009‑03‑03:
Runtime support for multicore Haskell.
- 2009‑03‑03:
Newspapers are often not so badly off as their parent companies.
- 2009‑03‑03:
Native Client security contest: can you break out of the sandbox?
- 2009‑03‑03:
Simple dot product benchmark of Data-Parallel Haskell on manycore machines.
- 2009‑03‑03:
The netbook effect: how cheap little laptops hit the big time.
- 2009‑03‑02:
Pseudodoxia, or Vulgar Errors.
- 2009‑03‑02:
Eight design patterns for errorproofing.
- 2009‑03‑02:
Twitter compared to IM, email and forums.
- 2009‑03‑02:
The Economist, in Chinese. Just add 240 citizen translators.
- 2009‑03‑02:
Cambridge local nature reserves.
- 2009‑03‑02:
A journalist ignores corrections from scientists and prints a disredited story with a misleading quote.
- 2009‑03‑02:
Who now can stop the slow death of Venice?
- 2009‑03‑02:
Research shows that the economic implications of file sharing in the Netherlands are strongly positive in the short and long terms.
- 2009‑03‑02:
How many top-level domains are there?
- 2009‑03‑02:
Why Microsoft is likely to lose the TomTom case.
- 2009‑03‑02:
LightCloud: distributed and persistent key value database, scriptable with Lua.
- 2009‑03‑02:
The Fake Digital Britain Report - what it should have said.
- 2009‑03‑01:
A capsule history of typesetting.
- 2009‑03‑01:
Digital politics is different - preserving the COML discussion.
- 2009‑03‑01:
Thousands in scramble for free books after Amazon supplier abandons warehouse.
- 2009‑03‑01:
The benefits of stand-up desks in schools.
- 2009‑03‑01:
Amish hackers.
- 2009‑03‑01:
Microsoft sues TomTom for patent infringement.
- 2009‑03‑01:
Parliamentary government matters. Jack Straw's right. (Not 100% convinced.)
- 2009‑03‑01:
Calls to action from the Convention on Modern Liberty.
- 2009‑02‑28:
Philip Pullman's piece on liberty which was pulled from the Times.
- 2009‑02‑28:
Libel chills financial reporting at 'The Guardian'.
- 2009‑02‑28:
TraceVis: performance visualization for TraceMonkey.
- 2009‑02‑28:
Don't bet on Moore to grow your MySQL deployment.
- 2009‑02‑28:
Amazon disables Kindle's speech synthesis feature following demands from Authors' Guild. Screw the partially sighted.
- 2009‑02‑27:
Phorm threatens "Which?" with defamation and forces them to withdraw a press release that criticized Phorm.
- 2009‑02‑27:
More things that Ryanair are planning to charge extra for?
- 2009‑02‑27:
The surprisingly powerful effect of bad apples.
- 2009‑02‑27:
YOU are the product that Google is selling.
- 2009‑02‑27:
How FriendFeed uses MySQL as a non-relational data store to make changes easier.
- 2009‑02‑27:
Beautiful pictures of waves.
- 2009‑02‑27:
Magistrates want to keep their freedom to choose sentences.
- 2009‑02‑26:
The professor behind "Slumdog Millionaire".
- 2009‑02‑26:
The Liberal Democrats' freedom bill.
- 2009‑02‑26:
Old Press / Mill Lane plans on the Cambridge City Council web site.
- 2009‑02‑26:
Plans to redevelop the Old Press site in Cambridge.
- 2009‑02‑26:
A lexicon of obfuscation mitigation.
- 2009‑02‑25:
Open source permeates Microsoft - and they admit it.
- 2009‑02‑25:
State of the programming languages book market 2008.
- 2009‑02‑25:
UK government abandons evidence-based policy on copyright.
- 2009‑02‑25:
Some people, when confronted with a problem, think "I know, I'll quote Jamie Zawinski." Now they have two problems.
- 2009‑02‑25:
You know digital is mainstream when the cool kids start putting compression artefacts into their videos for deliberate effect.
- 2009‑02‑25:
The London Borough of Redbridge has a nice cannabis leaf logo (or so it seems at the first glance).
- 2009‑02‑25:
When programming, start with the most difficult part (then get bored during the death-march completion stage).
- 2009‑02‑25:
Photographs of London around 1880 - many mediaeval buildings.
- 2009‑02‑25:
Paul Vixie says how the world will be better with DNSSEC.
- 2009‑02‑25:
YesWeScan: Carl Malamud for Public Printer of the United States.
- 2009‑02‑25:
Numbers everyone should know / scaling shared counters / paging through comments.
- 2009‑02‑24:
The Squirrel programming language - another embeddable extension language.
- 2009‑02‑24:
Misunderestimating open science.
- 2009‑02‑24:
12 tips for building and scaling a Ruby on Rails site.
- 2009‑02‑24:
UK government action plan for open source, open standards, and re-use.
- 2009‑02‑24:
Your grammar is worse than Hitler's.
- 2009‑02‑24:
Video of a disk's zero-G sensor parking the heads when dropped.
- 2009‑02‑24:
Andrews & Arnold against UK ISP censorship.
- 2009‑02‑24:
Controlling academic IP harms research - NIH enforced openness improves it.
- 2009‑02‑24:
The formula that killed Wall Street.
- 2009‑02‑24:
A map of where books are set in London.
- 2009‑02‑24:
50 publicity stunts.
- 2009‑02‑23:
Giving a presentation when the audience has an online back-channel.
- 2009‑02‑23:
Ruben's tube - audio visualization with fire.
- 2009‑02‑23:
Hacking Kindle.
- 2009‑02‑23:
Really nice visualization of contributions to OpenStreetMap in 2008.
- 2009‑02‑23:
Ex-director of public prosecutions says "good politics doesn't always make good policy" and that new laws have failed to make us safer and undermined trust that justice will be done (especially to bankers).
- 2009‑02‑23:
David Blunkett, who introduced the idea of identity cards when Home Secretary, worries that Britain is becoming a "Big Brother" state. Oh well, better late than never.
- 2009‑02‑23:
Typography affects how readers understand a text: easy to read implies easy to do.
- 2009‑02‑23:
Implementation errors (buffer overflows, null dereferences, etc.) in NIST SHA competition entries.
- 2009‑02‑23:
How Amazon is growing 20% faster than the rest of the e-commerce sector.
- 2009‑02‑22:
The ecological disaster that is dolphin safe tuna.
- 2009‑02‑22:
Leaked letter reveals recording industry's copyright stance on NZ guilty-on-accusation law.
- 2009‑02‑22:
Landshare: turning unloved gardens into allotments.
- 2009‑02‑22:
Tweetminster: MPs who tweet.
- 2009‑02‑22:
JWZ needs help to stop the California government putting him out of business.
- 2009‑02‑22:
DEFRA drops plans to fix crumbling Pirbright laboratory for animal health.
- 2009‑02‑22:
Everyone loves Google, until it's too big.
- 2009‑02‑21:
Aligning Linux filesystems with SSD erase blocks.
- 2009‑02‑21:
Legal precedent supporting Ben Goldacre against LBC's attempt to use copyright law to hide Jeni Barnett's idiocy.
- 2009‑02‑21:
Ten American law schools call for law journals to ditch print and switch to open access online.
- 2009‑02‑21:
Aardman meets Itchy and Scratchy.
- 2009‑02‑21:
Nigerian pretends to be National Bank of Ethiopia in order to swindle CitiBank. Sounds like a Charlie Stross plot...
- 2009‑02‑21:
An interview with Guy Garcia, author of "The Decline of Men".
- 2009‑02‑21:
Bio-Synergy Skinny Water: low-calorie water fortified with poisonous chromium, for sale from Holland and Barrett. Boggle.
- 2009‑02‑21:
ArRSe - Army rumour service.
- 2009‑02‑21:
PPRuNe - Professional pilots rumour network.
- 2009‑02‑21:
Ben Goldacre is top Google result for "willies".
- 2009‑02‑21:
Cory Doctorow explains how the Internet will devour, transform, or destroy your favorite medium.
- 2009‑02‑21:
After debugging, European emissions trading scheme starts to work.
- 2009‑02‑20:
Vx32: portable, efficient, safe execution of untrusted x86 code.
- 2009‑02‑20:
13 funny software development quotes.
- 2009‑02‑20:
The Register on the Busy Bees childcare voucher security failure.
- 2009‑02‑20:
Impressive: presentation software that displays PDFs nicely, e.g. LaTeX \documentclass{beamer} slides.
- 2009‑02‑20:
Why we immunize.
- 2009‑02‑20:
The convention on modern liberty - Cambridge satellite event.
- 2009‑02‑20:
The case of the 500 mile email.
- 2009‑02‑20:
Weird consequence of dwimmery in perl's regex parser.
- 2009‑02‑20:
Java logging libraries fighting with each other.
- 2009‑02‑20:
Renesys detects BGP-based man-in-the-middle attacks,and finds none so far.
- 2009‑02‑20:
Charles Arthur summarizes Aric Signan's social networking cancer paper.
- 2009‑02‑19:
The actual paper by Aric Sigman published in the Biologist.
- 2009‑02‑19:
The Stanford marshmallow experiment.
- 2009‑02‑19:
C APIs in extension and extensible languages.
- 2009‑02‑19:
UK polling report - independent political survey news.
- 2009‑02‑19:
Law firm "Jones Day" in the stupidest trademark lawsuit ever.
- 2009‑02‑19:
Oh dear, "science" by press release, and a bee in the bonnet about TV and computers.
- 2009‑02‑19:
On the other hand the Daily Mail is still bonkers about the internet and cancer.
- 2009‑02‑19:
Blimey, has the Daily Mail finally come to its senses about MMR?
- 2009‑02‑19:
Exploring Lua for concurrent programming.
- 2009‑02‑19:
Irish police confused by a bad Polish driver seemingly named Prawo Jazdy.
- 2009‑02‑19:
Joyent discovers the good bits of Javascript.
- 2009‑02‑19:
What colour are your bits?
- 2009‑02‑19:
The intertwining of peak oil and climate change.
- 2009‑02‑18:
A dangerous libel decision in the US: truth no longer a defence?
- 2009‑02‑18:
How to avoid a terms-of-service disaster like Facebook's.
- 2009‑02‑18:
Babies with more gestures become toddlers with bigger vocabs - an early correlation between wealth and achievement.
- 2009‑02‑18:
Intel X25-M SSDs have horrible fragmentation problems.
- 2009‑02‑18:
Scope-aware values for Lua.
- 2009‑02‑18:
Exploiting WiFi to make mesh networks and spread malware from house to house.
- 2009‑02‑18:
Unlike the iPhone, Android will span the range from phones to netbooks.
- 2009‑02‑18:
Tufte's presentation tips.
- 2009‑02‑17:
Free Culture vs. Fear Culture vs. Fee Culture.
- 2009‑02‑17:
Open source medical imaging software for planning aortic stent graft surgery.
- 2009‑02‑17:
Economists agree that action on climate change is cheaper than inaction.
- 2009‑02‑17:
Unusual signs of independent thought from the BCS.
- 2009‑02‑17:
Relenta's rather high prices.
- 2009‑02‑17:
Switching from GMail to Relenta (cautiously).
- 2009‑02‑17:
The (ir)rationality of mobile spending.
- 2009‑02‑17:
192 to 118: UK directory enquiries deregulation and the failure of choice.
- 2009‑02‑17:
Violent video games are a good way of letting boys be boys.
- 2009‑02‑17:
A water jetpack.
- 2009‑02‑17:
The courts are in many cases unable to discover what the law is, or was at the date with which the court is concerned.
- 2009‑02‑17:
It is a problem of substantial constitutional importance when relevant legislation is not accessible.
- 2009‑02‑17:
Answering technical questions helpfully.
- 2009‑02‑17:
Depression? Deflation? "D-process", says Dalio.
- 2009‑02‑17:
Inside Steve's Brain.
- 2009‑02‑17:
Ten ways to battle web site bureaucracy in a large organization.
- 2009‑02‑17:
Problems with Lua's module() function.
- 2009‑02‑17:
Greenwich's explanation for the zero longitude of WGS84 not matching the Airey transit instrument.
- 2009‑02‑17:
Transactions across datacentres.
- 2009‑02‑17:
Stella Rimington speaks out against government terrorization laws.
- 2009‑02‑17:
Pricing iPhone apps.
- 2009‑02‑16:
Dennis Richie's HOPL II talk - tangential to his paper on the history of C.
- 2009‑02‑16:
1st Edition Unix manual.
- 2009‑02‑16:
Government will use BT to monitor customers of small ISPs.
- 2009‑02‑16:
And then they came for the airline pilots...
- 2009‑02‑16:
Metropolitan Police Federation speaks out against photographer terrorization law.
- 2009‑02‑16:
Picking apart some lobbying against the Tories' open standards / open procurement / open source policy.
- 2009‑02‑16:
Did you remember to test ... ?
- 2009‑02‑16:
The bee die-off is due to a combination of factors.
- 2009‑02‑16:
Commoditisation vs commodification.
- 2009‑02‑16:
The UK government's official offshore torture policy.
- 2009‑02‑16:
Nationalize the banks! We're all Swedes now.
- 2009‑02‑16:
Dmitry Orlov's best practices for coping with financial and social collapse.
- 2009‑02‑16:
Clifford Stoll talking at TED.
- 2009‑02‑16:
DateJS - Javascript time/date library.
- 2009‑02‑15:
How the crash will/should reshape America.
- 2009‑02‑15:
How patent trolls are a tax on innovation - including some good ideas on patent reform.
- 2009‑02‑15:
Become an autistic savant for a few minutes using transcranial magnetic stimulation.
- 2009‑02‑14:
Honda FCX Clarity: 4x less efficient than the Tesla Roadster.
- 2009‑02‑14:
Lennart Augustsson implements BASIC as an embedded language within Haskell !!!
- 2009‑02‑14:
GlaxoSmithKline changes direction and heads for the moral high ground.
- 2009‑02‑14:
Barack Obama is tired of your motherfucking shit.
- 2009‑02‑13:
Sub-editors are "a layer that can be eliminated", journalism lecturer and media commentator Roy Greenslade has told a publishing industry conference.
- 2009‑02‑13:
Postbox - graphical MUA for Windows and Macintosh.
- 2009‑02‑13:
PETA kills animals.
- 2009‑02‑12:
Harvard slashes investment jobs after its endowment plummets in value.
- 2009‑02‑12:
China's water woes.
- 2009‑02‑12:
Busy Bees childcare voucher service taken offline after horrible security hole found.
- 2009‑02‑12:
Measels outbreak amongst traditionalist religious communities in France (very low vaccine coverage) spreading to wider population.
- 2009‑02‑12:
The Sun publishes a pro-MMR story.
- 2009‑02‑12:
Copying in patent law: almost all patent infringement cases are against independent inventors and do not involve copying.
- 2009‑02‑12:
iRetroPhone.
- 2009‑02‑12:
Continuous deployment at IMVU: doing the impossible fifty times a day.
- 2009‑02‑12:
25 things about Linus.
- 2009‑02‑12:
White eye (instead of red eye) in a photo is a sign of retinoblastoma (eye cancer).
- 2009‑02‑12:
Email Effects - visual tool for creating ASCII art.
- 2009‑02‑12:
Guide to hopeless state of CSS support in email clients.
- 2009‑02‑12:
World's largest vacuum chamber - awesome!
- 2009‑02‑12:
Which browsers support the latest HTML and CSS features?
- 2009‑02‑12:
Two communication satellites collide over Siberia at 25,000mph.
- 2009‑02‑11:
Americans don't get BS 1363.
- 2009‑02‑11:
picoLua - Lua on a PIC.
- 2009‑02‑11:
Reverse graffiti.
- 2009‑02‑11:
Allan Brigham in the Guardian.
- 2009‑02‑11:
Allan Brigham's walking tours of Cambridge for locals.
- 2009‑02‑11:
Cambridge University to give honorary degrees to Allan Brigham (local tour guide and street cleaner) plus Bill and Melinda Gates - and others.
- 2009‑02‑11:
Early day motion 754 on MMR and the media.
- 2009‑02‑11:
Pruning reverse DNS zones.
- 2009‑02‑11:
The learner-driver problem - variance and accident statistics.
- 2009‑02‑10:
Kindle text-to-speech feature triggers copyright insanity.
- 2009‑02‑10:
External university governors are proving to be a bad idea.
- 2009‑02‑10:
Landmark settlement makes U.S. agencies acknowledge climate change.
- 2009‑02‑10:
Could an iTunes-alike save the publishing industry?
- 2009‑02‑10:
Free the Postcode!
- 2009‑02‑10:
A graduate school survival guide: "So long, and thanks for the Ph.D!"
- 2009‑02‑10:
Red Dwarf 2009 FAQ.
- 2009‑02‑10:
"The preposterous prejudice of the anti-MMR lobby" - more support for Ben Goldacre from the Times.
- 2009‑02‑10:
This is what I think of whenever I see one of the new Pepsi ads.
- 2009‑02‑10:
The "FDR failed" myth.
- 2009‑02‑10:
One free interaction - a prospective user interface design pattern.
- 2009‑02‑09:
Philosophical problems with folksonomies.
- 2009‑02‑09:
Secularists of the year: Evan Harris MP and Lord Avebury.
- 2009‑02‑09:
Motoring down, cycling up.
- 2009‑02‑09:
Transactional Flash SSDs.
- 2009‑02‑09:
Inside the 2,000 watt society.
- 2009‑02‑09:
The problem with email clients.
- 2009‑02‑08:
How willing are scientists to give up their cherished theories in the light of new evidence?
- 2009‑02‑08:
More security wrong-headedness from Microsoft: they think UAC isn't broken and that users are just too stupid to understand it.
- 2009‑02‑08:
Andrew Wakefield rigged the data for his 1998 MMR/autism paper.
- 2009‑02‑08:
The yin and yang of acting Academy Awards.
- 2009‑02‑08:
"The Prisoner" - the complete series available to watch online.
- 2009‑02‑08:
Using chaos theory to revitalize fisheries.
- 2009‑02‑08:
Worrying about Bolivia having half the world's lithium supplies.
- 2009‑02‑08:
Phishing for free software.
- 2009‑02‑08:
Cover letters from hell.
- 2009‑02‑08:
Is the cloud the new subprime mortgage?
- 2009‑02‑07:
The trough of no value.
- 2009‑02‑07:
Where the recent snow came from.
- 2009‑02‑07:
Intellectual Ventures backs study on patent troll litigation.
- 2009‑02‑07:
Low-end Windows 7 restrictions will bolster Linux netbooks.
- 2009‑02‑07:
The difference between FREE and 1 cent?
- 2009‑02‑06:
83% of spammed domains supported by only 10 registrars.
- 2009‑02‑06:
50 years of scientific discovery and sharing in Antarctica may end thanks to patent greed.
- 2009‑02‑06:
"Encouraging" breastfeeding.
- 2009‑02‑06:
Where Unix went wrong in filesystem access control.
- 2009‑02‑06:
When a community gets too big and starts suffering from the tragedy of the commons, reboot it.
- 2009‑02‑06:
Google China has the domain g.cn.
- 2009‑02‑06:
Forrester's CEO is not panicing about 2009, at least where tech is concerned.
- 2009‑02‑06:
Chudge, nowtrage and plebbledash - just three of the words to learn from Charlie Brooker's New Media Dictionary.
- 2009‑02‑06:
Ben Goldacre receives legal threats from LBC Radio over Jeni Barnett's MMR scaremongering.
- 2009‑02‑05:
Bogglesome security bug in Java's date handling code.
- 2009‑02‑05:
Dear Internet, stop it. stop it now.
- 2009‑02‑05:
Make love not porn - porn world vs. real world.
- 2009‑02‑05:
New logos after the financial crisis.
- 2009‑02‑05:
Problems with patents and fine-grained property rights in general.
- 2009‑02‑05:
Engineering Windows 7 security by admonishment.
- 2009‑02‑05:
Orkut is insecure and Google are bad at dealing with compromised accounts.
- 2009‑02‑04:
Deer and cattle prefer to face north.
- 2009‑02‑04:
Web hooks: event notification callbacks over HTTP.
- 2009‑02‑03:
Rabin fingerprinting code.
- 2009‑02‑03:
Unfolding the Earth: myriahedral projections.
- 2009‑02‑03:
Safe threading for Python, without the global interpreter lock.
- 2009‑02‑03:
How to make Firefox use Unix key bindings on Unix.
- 2009‑02‑03:
Firefox "open in browser" extension.
- 2009‑02‑03:
Universities! Spam your users and MAKE MONEY FAST!!
- 2009‑02‑03:
Jeff Darcy argues with Biran Cantrill.
- 2009‑02‑03:
Brian Cantrill says the NFS benchmark SPEC SFS is crap.
- 2009‑02‑03:
How Google crawls through web forms.
- 2009‑02‑02:
Microsoft's supposedly "immutable" law of security #1 is not true on a system which has proper sandboxing and follows the principle of least privilege (e.g. a capability-based system).
- 2009‑02‑02:
Practical filesystem design with the BeOS filesystem.
- 2009‑02‑02:
If English were written like Chinese.
- 2009‑02‑02:
Why openness and licensing of data matters.
- 2009‑02‑02:
Transport Chaos - current state "pandemonium"!
- 2009‑02‑02:
Great programming quotes from Stack Overflow.
- 2009‑02‑02:
Derivatives of regular expressions.
- 2009‑02‑01:
Linux graphics drivers for the Vaio P series are a total mess.
- 2009‑02‑01:
Only (?) one million SSL web sites - about 0.5% of the total.
- 2009‑02‑01:
Heavy metal laundry tips.
- 2009‑02‑01:
Interesting thread on cap-talk about the "ACLs don't" paper.
- 2009‑02‑01:
Jumbograms on Internet2.
- 2009‑02‑01:
Colm MacCárthaigh reacts to Cory Doctorow's post about working with interruptions, and explains how he gives himself a starting point each day.
- 2009‑01‑31:
UK pedestrian casualties by type of colliding vehicle for the last 10 years.
- 2009‑01‑31:
Ross Anderson on the history of Cambridge iconoclasts.
- 2009‑01‑31:
Google explains the badware alert screwup.
- 2009‑01‑31:
The story of Henrietta Lacks and human cell lines.
- 2009‑01‑31:
George Soros on the consequences of the Lehman Brothers collapse.
- 2009‑01‑31:
Vanity Fair's oral history of the GWB administration.
- 2009‑01‑31:
Improving Aphrodite.
- 2009‑01‑31:
Kevin Kelly on the two strands of connectionism - where are the mobiles?
- 2009‑01‑31:
The case against credentialism.
- 2009‑01‑30:
Dashing Tweeds.
- 2009‑01‑30:
Less hashing, same performance - you only need two hash functions for any size of Bloom filter.
- 2009‑01‑30:
An unusual approach to log parsing.
- 2009‑01‑30:
Bruce Sterling panics about 2009.
- 2009‑01‑30:
Google street view includes pictures from one of the cars as it runs over a deer!
- 2009‑01‑30:
CNET compares Intellectual Ventures with the University of California.
- 2009‑01‑30:
Fortune Magazine on Myhrvold and Intellectual Ventures.
- 2009‑01‑30:
Transmeta's valuable patent portfolio bought by patent troll Intellectual Ventures.
- 2009‑01‑30:
EU still trying to make ISPs enforce copyright law.
- 2009‑01‑30:
Green (energy efficiency) arguments against proof-of-work (which is a foolish idea that inexplicably refuses to die).
- 2009‑01‑30:
So you can power your data centre using failing SQL servers, or something?
- 2009‑01‑30:
Microsoft SQL Server 2008 will explode your data.
- 2009‑01‑30:
Let's all grow up.
- 2009‑01‑29:
How to do DAB properly.
- 2009‑01‑29:
A single line of code filled with EPIC FAIL.
- 2009‑01‑29:
ACLs don't.
- 2009‑01‑29:
A Scheme to syntax-rules compiler.
- 2009‑01‑28:
WHO surgical safety checklist.
- 2009‑01‑28:
Ofcom issues blacklist of UK telephone scammers.
- 2009‑01‑28:
The Daily Quail: coffee gives your children cancer.
- 2009‑01‑28:
Taming perfectionism.
- 2009‑01‑27:
James W. Taylor - time series forecasting, estimation of uncertainty, and exponential smoothing.
- 2009‑01‑27:
How to calculate the standard deviation incrementally, including a useful pointer to Knuth.
- 2009‑01‑27:
Simpsons sofa gags.
- 2009‑01‑27:
Which tech firms have the healthiest bank balances.
- 2009‑01‑27:
Solve the failure first.
- 2009‑01‑27:
Cory Doctorow on writing without being distracted.
- 2009‑01‑26:
Holt-Winters forecasting (triple exponential smoothing with a multiplicative seasonal component).
- 2009‑01‑26:
The year in spam according to Google.
- 2009‑01‑26:
Lib Dems call for support from sysadmins and open source developers.
- 2009‑01‑26:
A profitless endeavor: phishing as tragedy of the commons.
- 2009‑01‑26:
Rules for photographers on UK national rail and the London Underground.
- 2009‑01‑26:
A guide to the rights of photographers in the UK.
- 2009‑01‑26:
IT's a man's world?
- 2009‑01‑26:
A long-lost text by Archimedes shows that he had begun to discover the principles of calculus.
- 2009‑01‑26:
The car of the future should arrive in October.
- 2009‑01‑26:
Holt-Winters forecasting applied to Poisson processes in real time.
- 2009‑01‑26:
Aberrant behavior detection in time series for network service monitoring - Holt-Winters forecasting for RRDtool.
- 2009‑01‑25:
Google and the future of books.
- 2009‑01‑23:
How to foil phishing scams.
- 2009‑01‑23:
Blacklist Alert DNSBL checker.
- 2009‑01‑23:
64GB DRAM SATA SSD.
- 2009‑01‑23:
Surveillance and profiling of "terrorist" black and asian music in London clubs.
- 2009‑01‑23:
What is Occam's Razor?
- 2009‑01‑23:
Steve Yegge's emacs tips: old news, except I didn't know about iswitchb-mode.
- 2009‑01‑23:
BBC refuses to broadcast an appeal for aid to Gaza by the Disasters Emergency Committee.
- 2009‑01‑23:
Craig Murray: "I cannot tell you how much emotion I feel that the US will no longer be flying people to Uzbekistan, to be tortured and often buried there. I lost my livelihood trying to stop it."
- 2009‑01‑23:
The LEGO digital box uses augmented reality to demonstrate what completed models look like.
- 2009‑01‑23:
Monty Python YouTube channel increases DVD sales by 23000%.
- 2009‑01‑23:
US IP attachés take hard-line position on overseas IP enforcement.
- 2009‑01‑23:
Tracing the peopling of the Pacific - bacterial genetics and linguistics agree.
- 2009‑01‑23:
Blackberry to support Open Document Format.
- 2009‑01‑23:
Will the public domain continue to lose out to the copyright expansionists under Obama?
- 2009‑01‑23:
No2ID's page about the government's plans to eliminate data protection partitions in Whitehall.
- 2009‑01‑23:
Counter-terrorism act 2008 to come into force next month. Depressing assault on our ability to hold the police to account.
- 2009‑01‑23:
Dyson Medic - repair and servicing guides.
- 2009‑01‑23:
The origin of the Labradoodle.
- 2009‑01‑23:
Comscore's estimate of the Internet population passes a billion.
- 2009‑01‑23:
Planes vs trains in the US.
- 2009‑01‑23:
Similarities between the US economy 80 years ago and China's now.
- 2009‑01‑22:
Bloodhound SSC - the second supersonic car targets 1000 mph.
- 2009‑01‑22:
Colbert on remixing.
- 2009‑01‑22:
Obama inauguration traffic data from Arbor Networks.
- 2009‑01‑22:
The Guardian's civil liberties page.
- 2009‑01‑22:
Google calls for a right to fair use of copyright works in the UK.
- 2009‑01‑22:
The Dell cost of Windows.
- 2009‑01‑22:
RIAA agnostic about DRM.
- 2009‑01‑22:
Microsoft to make 5000 staff redundant.
- 2009‑01‑22:
USPTO rejects all claims of the subdomain virtual web hosting patent.
- 2009‑01‑22:
The Guardian on how the OCLC is keeping library catalogues closed and proprietary.
- 2009‑01‑22:
How to approach an interview with a journalist (aimed at managers of techie startups).
- 2009‑01‑22:
USPTO guts the Amazon one-click patent.
- 2009‑01‑22:
Obama's staff find the White House in the technological dark ages.
- 2009‑01‑22:
Al Gore's Mac.
- 2009‑01‑22:
Akamai reports record traffic volumes during Obama's inauguration.
- 2009‑01‑22:
Shut up.
- 2009‑01‑22:
Popularity of version control software amongst Debian developers.
- 2009‑01‑21:
Brian Kernighan on 34 years of Software Tools.
- 2009‑01‑21:
Government U-turn on concealing MP's expenses.
- 2009‑01‑21:
Whitehouse.com transformed from porn site to political news site.
- 2009‑01‑20:
Polaroid film is no longer being made but some people are trying to resurrect it.
- 2009‑01‑20:
In the news eight years ago this week.
- 2009‑01‑20:
Bush forced to repeat a term after failing the end-of-year exams.
- 2009‑01‑20:
George Monbiot on coping with financial crises by creating ad-hoc currencies.
- 2009‑01‑20:
Implementing VisiCalc on the Apple ][.
- 2009‑01‑20:
An evaluation of distributed key/value data stores.
- 2009‑01‑20:
Visible CCD scan effects from the iPhone camera.
- 2009‑01‑19:
The movement to reform healthcare has begun with stories about cruelty.
- 2009‑01‑19:
C.A.R. Hoare's billion dollar mistake.
- 2009‑01‑19:
ScavengerEXA - traffic analysis for outgoing email.
- 2009‑01‑19:
The holographic universe.
- 2009‑01‑19:
Suburbs are the next slums?
- 2009‑01‑19:
TheyWorkForYou campaigning to keep MPs accountable.
- 2009‑01‑19:
Why Google employees quit.
- 2009‑01‑19:
How F-Secure counted 9,000,000 Downadup infections - I wonder if the count from the virus includes re-infections.
- 2009‑01‑19:
NY Times on digital radio in Europe and elsewhere.
- 2009‑01‑19:
Chris Wysopal on the need to take "theoretical" security vulnerabilities seriously.
- 2009‑01‑18:
Tim Bray on the need for a decentralized Twitter.
- 2009‑01‑18:
Python docutils, including "reStructured Text" lightweight markup.
- 2009‑01‑18:
Building traffic on a gaming site.
- 2009‑01‑18:
SO_LINGER and unreliable TCP shutdowns.
- 2009‑01‑18:
Handmade fonts.
- 2009‑01‑18:
William Gibson's blog.
- 2009‑01‑18:
Mappa Mundi magazine.
- 2009‑01‑18:
Why I _do_ document and unit test.
- 2009‑01‑18:
Why I don't document or unit test.
- 2009‑01‑17:
Superuseless superpowers.
- 2009‑01‑17:
The massive yet tiny engine.
- 2009‑01‑17:
Tenants' rights for online services.
- 2009‑01‑17:
The tourist's quide to Cambridge.
- 2009‑01‑17:
Customer update for the Tesla high performance electric car.
- 2009‑01‑16:
Continued fractions and intercalation.
- 2009‑01‑16:
Craig Murray self-publishing success.
- 2009‑01‑16:
A chart of SI units and their dimensions.
- 2009‑01‑16:
LibraryThing on the OCLC policy change.
- 2009‑01‑16:
OCLC delays its attempt to take proprietary control of library catalogue records.
- 2009‑01‑16:
JISC developer happiness days.
- 2009‑01‑16:
Stuart Cheshire looks forward to connector unification.
- 2009‑01‑16:
MySpace to add webmail to their service.
- 2009‑01‑16:
Neat solution to the problem of ethernet ports being too fat: put them behind the display hinge.
- 2009‑01‑16:
Project your own bike lane.
- 2009‑01‑16:
DRAM access timings on NUMA.
- 2009‑01‑16:
IT departments should not fear the multicore future.
- 2009‑01‑16:
The financial modellers' manifesto.
- 2009‑01‑16:
Bush official admits torture occurred in Guantanamo Bay.
- 2009‑01‑16:
The story behind the interview with the adware author - a reminder of how evil his employer was.
- 2009‑01‑16:
An interview with James Howard Kunstler: urban planning, peak oil, and environmental change.
- 2009‑01‑16:
Taxing financial transactions to put a brake on high-volume speculation.
- 2009‑01‑15:
Odd eggs.
- 2009‑01‑15:
Nude self portraits are popular amongst teens but very illegal.
- 2009‑01‑15:
TLS extension IPR nightmare.
- 2009‑01‑15:
Celebrity aptronyms.
- 2009‑01‑15:
The $300 million button.
- 2009‑01‑14:
Steve Jobs takes leave of absence for medical reasons.
- 2009‑01‑14:
Secure PDAs for Barack Obama.
- 2009‑01‑14:
Home chip fab.
- 2009‑01‑14:
Craig Murray releases "The Catholic Orangemen of Togo" online for free.
- 2009‑01‑14:
Bonkers gcc i18n braindamage.
- 2009‑01‑14:
New Scientist's guide to common myths and misconceptions about climate change.
- 2009‑01‑14:
Failure: the secret to success.
- 2009‑01‑14:
Dave Cridland explains how to make TLS compression work with OpenSSL.
- 2009‑01‑14:
Interview with an adware author.
- 2009‑01‑14:
Work on stuff that matters.
- 2009‑01‑14:
Building modules (such as lpeg) for Lua, including the special "-bundle -undefined dynamic_lookup" runes required for Mac OS X.
- 2009‑01‑13:
Problems with AGAs.
- 2009‑01‑13:
Rich people are the main users of cheap flights and the main beneficiaries of airport expansions.
- 2009‑01‑13:
A conversation with Alan Kay.
- 2009‑01‑13:
Why (American) "Pyrex" bowls explode.
- 2009‑01‑13:
The top 25 most dangerous security bugs.
- 2009‑01‑13:
Chromatic interviews Guido van Rossum about the evolution of Python 3.
- 2009‑01‑13:
Differential synchronization.
- 2009‑01‑13:
PLEASE UNSUBSCRIBE ME FROM THIS LIST!
- 2009‑01‑13:
Score for a hole in the ground - interesting woodland acoustic art installation.
- 2009‑01‑13:
Princess Bride 20th anniversary DVD - a very nice ambigram.
- 2009‑01‑13:
SurLaLune annotated fairy tales.
- 2009‑01‑13:
A VC asks, what if your economic model is wrong?
- 2009‑01‑13:
Richard Dawkins is a Church of England atheist.
- 2009‑01‑13:
David MacKay does his own calculations on the energy usage of Google and kettles.
- 2009‑01‑13:
More numbers from Google on the kettle argument.
- 2009‑01‑13:
The Register recommends setting fire to farts to reduce methane emissions.
- 2009‑01‑13:
Google say they use less energy to serve a search result than the client does while waiting for it.
- 2009‑01‑13:
Dodgy estimate that two Google searches use as much energy as boiling a kettle.
- 2009‑01‑13:
iPhone web browser emulator.
- 2009‑01‑13:
Web cookie parsing standards failure.
- 2009‑01‑13:
A rant about the book shop business.
- 2009‑01‑13:
Multi-touch works on the Android G1, with some limitations.
- 2009‑01‑13:
"Going out of business" sales are not always a bargain.
- 2009‑01‑13:
Wellcome Trust to audit compliance to their requirement for open-access publication.
- 2009‑01‑13:
A warning about the real cost of microformats.
- 2009‑01‑13:
David Malone's recordings of the leap second.
- 2009‑01‑13:
Ukelele: Mac OS X keyboard layout editor.
- 2009‑01‑13:
Studying Islam made me an atheist.
- 2009‑01‑13:
Andrew Pelling MP pleased to be stopped and searched by police for taking photographs.
- 2009‑01‑13:
Status of the StyleTap PalmOS emulator for iPhone.
- 2009‑01‑13:
Ways of wearing a Buff.
- 2009‑01‑13:
The Recently Deflowered Girl: the right thing to say on every dubious occasion.
- 2009‑01‑13:
Keyboard Maestro - key macros for the Mac.
- 2009‑01‑13:
Hacking # on Mac keyboards.
- 2009‑01‑13:
Sendfile support for Erlang and YAWS.
- 2009‑01‑13:
An overview of the context of the Israel/Palestine war.
- 2009‑01‑13:
Withdrawal from heroin is a trivial matter.
- 2009‑01‑13:
Some dubious stats on the popularity of web buzzwords - I would guess peak search rates are correlated with unfamiliarity not popularity.
- 2009‑01‑13:
In what order should you teach a process to someone?
- 2009‑01‑13:
Google IPv6 support.
- 2009‑01‑13:
The CSS pixel.
- 2009‑01‑13:
Russian nuclear-powered lighthouses.
- 2009‑01‑13:
The cast of Ferris Bueller's Day Off, twenty years on.
- 2009‑01‑13:
Rate-limiting with memcached.
- 2009‑01‑06:
Kaspersky says covert police surveillance software would be treated as crimeware by AV software.
- 2009‑01‑06:
Apple introduces revolutionary laptop with no keyboard.
- 2009‑01‑06:
Parallel bzip2.
- 2009‑01‑06:
Murdered by the BART police.
- 2009‑01‑05:
Travel time to major cities: a global map of accessibility.
- 2009‑01‑05:
Radio signals during the leap second.
- 2009‑01‑05:
Oracle RAC leap second bug.
- 2009‑01‑04:
Disk latency and vibration.
- 2009‑01‑01:
Open source programing for kids.
- 2008‑12‑30:
The Unix Haters Handbook.
- 2008‑12‑30:
The Tao of Programming.
- 2008‑12‑30:
Pointers to IRTF Routing Research Group discussions on the future of te Internet architecture.
- 2008‑12‑28:
POSIX 2008.
- 2008‑12‑28:
iToilet gallery.
- 2008‑12‑28:
Caring for your introvert.
- 2008‑12‑26:
Boo is a new object oriented statically typed programming language for the CLI with a Python-inspired syntax.
- 2008‑12‑26:
Recordings of the sounds hard disks make when they fail.
- 2008‑12‑25:
Fox vs WB copyfight screws up release of "Watchmen" film.
- 2008‑12‑23:
Extreme bathing.
- 2008‑12‑23:
Selected radiophonic works.
- 2008‑12‑23:
8 bit Jesus.
- 2008‑12‑22:
Solid state disks: time to give up that iron oxide habit.
- 2008‑12‑22:
Reducing your exposure to bank card fraud.
- 2008‑12‑22:
How to set up a PS3 HPC cluster.
- 2008‑12‑22:
Matroshka furniture.
- 2008‑12‑22:
Recyclable present wrapping.
- 2008‑12‑22:
Relativistic time dilation w.r.t. altitude.
- 2008‑12‑22:
ERTMS: European rail traffic management system.
- 2008‑12‑22:
The first ever photograph of the analemma, taken in the year 1978-1979.
- 2008‑12‑19:
How to get faster (less safe) suspends on Mac laptops.
- 2008‑12‑19:
Microwave ovens play "jingle bells".
- 2008‑12‑19:
How to use the BBC HD test card. (via jm)
- 2008‑12‑19:
ATA over Ethernet with Linux. (via jm)
- 2008‑12‑18:
The researcher's bible.
- 2008‑12‑17:
"Kochi" spear phishing reply detector.
- 2008‑12‑17:
Richard Dawkins interviews Derren Brown.
- 2008‑12‑16:
Furoshiki: giftwrapping without throw-away paper and sticky tape.
- 2008‑12‑15:
Programmable concurrency in a pure and lazy language.
- 2008‑12‑15:
Why it is safer to compile your own perl.
- 2008‑12‑15:
On the difficulty of replicating human subjects studies in software engineering.
- 2008‑12‑15:
Instant chocolate cake.
- 2008‑12‑15:
London to Glasgow in five minutes.
- 2008‑12‑15:
The Maillard reaction.
- 2008‑12‑15:
How to use the dial telephone (1927).
- 2008‑12‑15:
Lua Programming Gems now available.
- 2008‑12‑15:
Jellyfish gone wild!
- 2008‑12‑15:
V-CUBE - Verdes reinvented Rubik's cube to support higher numbers of cubies.
- 2008‑12‑14:
If someone wants something then it must exist somewhere.
- 2008‑12‑12:
Letter from the UK govt. about the continuing use of non-metric units.
- 2008‑12‑11:
Nic Jasno - Lego pneumatic engines.
- 2008‑12‑11:
Joseph Stiglitz writes about capitalist fools in Vanity Fair.
- 2008‑12‑11:
How to add electroluminescent wire to clothing.
- 2008‑12‑11:
Proceedings of HotPower08. (shouldn't it have been called "CoolPower08"?)
- 2008‑12‑11:
A spin-up saved is energy earned: achieving power-efficient, erasure-coded storage.
- 2008‑12‑11:
Memory-aware scheduling for energy efficiency on multicore processors.
- 2008‑12‑11:
Val Henson explains how to debug silent data corruption.
- 2008‑12‑11:
Amazon Web Services IP address ranges.
- 2008‑12‑10:
Kansas city library car park.
- 2008‑12‑10:
Eat Babe.
- 2008‑12‑09:
Dublin cycle lanes.
- 2008‑12‑09:
Henry Blodget on why Wall Street always blows it.
- 2008‑12‑09:
The Atlantic's Icelandic infographic.
- 2008‑12‑08:
Network-wide decision making: towards a wafer-thin control plane.
- 2008‑12‑05:
The 7/7 GSM outage was a cockup not an overload.
- 2008‑12‑05:
Hubble advent calendar.
- 2008‑12‑05:
main.cc
- 2008‑12‑05:
Re-feedback and Re-ECN: a new resource sharing mechanism for the Internet enabling new kinds of fairness.
- 2008‑12‑05:
A fairer, faster TCP.
- 2008‑12‑05:
Vietnamese iPhone unlocking - retail hardcore hardware hacking.
- 2008‑12‑04:
Why Google is offering free speech-based services.
- 2008‑12‑04:
The checklist in medicine.
- 2008‑12‑04:
Patterns in network architecture: a return to fundamentals, by John Day.
- 2008‑12‑04:
The path towards centralization of Internet governance under the UN.
- 2008‑12‑04:
Timer-based mechanisms in reliable transport protocol connection management.
- 2008‑12‑03:
Press release for David MacKay's book.
- 2008‑12‑03:
Is that a toddler or is it Yoda?
- 2008‑12‑03:
The Cogent/Sprint depeering.
- 2008‑12‑02:
10 renewable energy myths.
- 2008‑12‑02:
Does the "broken windows" theory apply online?
- 2008‑12‑01:
Grad school enrollment vs. employment rate.
- 2008‑11‑30:
Teach yourself programming in 10 years.
- 2008‑11‑21:
Addressing reality: an architectural response to real-world demands on the evolving Internet.
- 2008‑11‑21:
Memory management in VMware.
- 2008‑11‑20:
The CBL observes the McColo spam reduction.
- 2008‑11‑20:
Ordnance Survey asserts its copyright and puts the brakes on lots of open government projects, so local authorities are switching to OpenStreetMap.
- 2008‑11‑20:
Optimistic thread concurrency on the Azul Java machine.
- 2008‑11‑20:
Cliff Click, David Moon, and Daniel Weinrab compare Azul Systems' Java machines and Symbolics Lisp machines.
- 2008‑11‑20:
Monty Python on YouTube.
- 2008‑11‑19:
Flare: dynamic load balancing without packet reordering.
- 2008‑11‑19:
MIRO: multi-path inter-domain routing.
- 2008‑11‑19:
A literature survey on traffic dispersion.
- 2008‑11‑19:
Smith's mystery clock.
- 2008‑11‑19:
Virtual ID routing.
- 2008‑11‑19:
HLP: a next generation inter-domain routing protocol.
- 2008‑11‑19:
Characterizing the Internet hierarchy from multiple vantage points.
- 2008‑11‑19:
FARA: reorganizing the addressing architecture.
- 2008‑11‑18:
Crossover Chromium uses Wine to run the open source version of Google Chrome on Mac and Linux.
- 2008‑11‑18:
How they got rid of 10 tons of unwanted sodium in 1947.
- 2008‑11‑18:
Temporary ice rink in Cambridge.
- 2008‑11‑18:
The pleasures of counting, by Tom Körner.
- 2008‑11‑17:
What has driven women out of computer science?
- 2008‑11‑17:
An addressing-independent networking structure favorable for all optical packet switching.
- 2008‑11‑17:
Congestion control for small buffer high speed networks.
- 2008‑11‑17:
Decongestion control.
- 2008‑11‑17:
Personal namespaces for network services.
- 2008‑11‑17:
Towards a new internet routing architecture: arguments for separating edges from the transit core.
- 2008‑11‑17:
Towards a next-generation inter-domain routing protocol.
- 2008‑11‑17:
Some foundational problems in inter-domain routing.
- 2008‑11‑17:
Decoupling policy from mechanism in internet routing.
- 2008‑11‑17:
ROFL: routing on flat labels.
- 2008‑11‑17:
Spoke-o-dometer.
- 2008‑11‑17:
Modelling incentives for email blocking strategies - when does it make sense to blacklist an ISP's outgoing relays?
- 2008‑11‑15:
Give up and use tables.
- 2008‑11‑14:
Tim Skirvin's web<->news gateway.
- 2008‑11‑13:
Apple localized keyboard layouts.
- 2008‑11‑12:
Some stats on the effectiveness of DNSBLs from Nortel.
- 2008‑11‑12:
The history of POSIX time_t according to chongo.
- 2008‑11‑12:
Google tracks flu trends in the USA.
- 2008‑11‑12:
Breaking up the transport logjam: Bryan Ford's ideas for decomposing the Internet trasport layer.
- 2008‑11‑12:
Designing DCCP: congestion control without reliability.
- 2008‑11‑11:
Mental health and incapacity benefit.
- 2008‑11‑11:
Nested parens, by Jacob Applebaum and Don Knuth.
- 2008‑11‑11:
Scenes from Antarctica.
- 2008‑11‑11:
Dave Cridland reviews the DNS-SD spec.
- 2008‑11‑11:
Spamhaus has 1,425,440,000 users on its books.
- 2008‑11‑10:
On the naming and binding of network destinations.
- 2008‑11‑10:
The Nimrod routing architecture.
- 2008‑11‑10:
HTTP access to email stores.
- 2008‑11‑10:
Patterns in network architecture: naming and addressing.
- 2008‑11‑05:
Microsoft Exchange/Outlook 2007 autodiscover XML schema.
- 2008‑11‑05:
Microsoft Exchange/Outlook 2007 autodiscover white paper.
- 2008‑11‑05:
Overview of Microsoft Exchange/Outlook 2007 autodiscover.
- 2008‑11‑04:
Obama vs McCain battleground bargraph.
- 2008‑11‑04:
Maps and cartograms of the 2004 US presidential election results.
- 2008‑11‑04:
Why university webmail systems are attractive to spammers.
- 2008‑10‑31:
Noel Chiappa: Endpoints and endpoint names: a proposed enhancement to the Internet Architecture.
- 2008‑10‑31:
Mike O'Dell on loc/id split addressing.
- 2008‑10‑31:
Perl's secret operators.
- 2008‑10‑31:
The insecurity of cheques and the US banking system.
- 2008‑10‑31:
Google's robots.txt has an easter egg.
- 2008‑10‑31:
Knuth no longer writes reward cheques because they are too insecure.
- 2008‑10‑31:
A discussion about static vs dynamic typing.
- 2008‑10‑29:
These non-jokes are not hilarious.
- 2008‑10‑29:
The story of mailx's aux.c source file.
- 2008‑10‑28:
Web design tips for programmers.
- 2008‑10‑28:
Team Cymru malware hash registry.
- 2008‑10‑27:
Combining Kerberos and SMTP.
- 2008‑10‑27:
From computers to ubiquitous computing by 2020.
- 2008‑10‑24:
Do something serious about climate change.
- 2008‑10‑24:
A history of wireless local area networks.
- 2008‑10‑22:
Time series forecasting with Holt-Winters exponential smoothing.
- 2008‑10‑22:
Donation is a campaigning action.
- 2008‑10‑22:
How to remove stains at home.
- 2008‑10‑22:
Multiple dispatch in practice.
- 2008‑10‑21:
NY Times on botnets.
- 2008‑10‑20:
Cambridge Teslathon 2008 - Oct 25-26 at the Museum of Technology.
- 2008‑10‑18:
XKCD vs. the New Yorker.
- 2008‑10‑17:
Boggling booleans.
- 2008‑10‑17:
Ways to amuse small children with computers.
- 2008‑10‑17:
The Nu-Phalt infrared road repair system.
- 2008‑10‑17:
Writing zombie stories is a felony in the state of Kentucky.
- 2008‑10‑16:
DisplayPort vs. HDMI.
- 2008‑10‑16:
DisplayPort technical overview.
- 2008‑10‑16:
Inside the new unibody MacBook Pro.
- 2008‑10‑16:
About the United Parcel Service data centres.
- 2008‑10‑15:
Evaluation of on-street bicycle facilities added to existing roadways.
- 2008‑10‑15:
Iceland is unable to import anything and its supermarkets will empty in a couple of weeks.
- 2008‑10‑14:
The Swiss Ephemeris - GPL astronomical calculations.
- 2008‑10‑14:
iPhone feature comparison table.
- 2008‑10‑13:
ACM Queue September 2008 - Concurrency - including great articles by Bryan Cantrill and Jeff Bonwick on kernel hacking, and Jim Larson on Erlang.
- 2008‑10‑13:
UK house price predictor.
- 2008‑10‑10:
Travelling light, the Lua way.
- 2008‑10‑09:
Nine lessons and carols for godless people - a rational celebration for Newtonmas.
- 2008‑10‑08:
Easter Act 1928.
- 2008‑10‑08:
The Aleppo statement: towards a common date for Easter.
- 2008‑10‑08:
UK railway map.
- 2008‑10‑08:
Cory Doctorow on the maltreatment of immigrants by the British civil service.
- 2008‑10‑08:
RESTful mailstore access?
- 2008‑10‑07:
Ben Goldacre in Cambridge on 21st October: "How the media promote the public misunderstanding of science."
- 2008‑10‑06:
Russ Allbery's system templating with "bundle".
- 2008‑10‑06:
Compiling with Continuations, Continued.
- 2008‑10‑06:
"Growing a language" by Guy Steele.
- 2008‑10‑06:
An illustraton of the relative sizes of various planets and stars.
- 2008‑10‑03:
Non-partisan system administration in the US House of Representatives.
- 2008‑10‑03:
The Featherstitch filesystem project - a generalization of BSD softupdates. Fantastic!
- 2008‑10‑02:
The Geisel Library at the University of California San Diego is also rather funky.
- 2008‑10‑02:
Wikipedia on the rombicuboctahedron.
- 2008‑10‑02:
The National Library of Belarus, Minsk - a very large rhombicuboctahedron.
- 2008‑10‑02:
IEEE Internet Computing article about the new ICANN TLD procedures, featuring YT.
- 2008‑10‑02:
The Bla programming language.
- 2008‑10‑02:
The Equationator - on-line (La)TeX to PNG renderer.
- 2008‑10‑02:
Cory Doctorow visits some data centres.
- 2008‑10‑02:
Partisan system administration in the US House of Representatives.
- 2008‑10‑01:
Anton van Straaten's object/closure koan.
- 2008‑10‑01:
Experience with gradual typing in Erlang.
- 2008‑10‑01:
Data management with Berkeley DB for Google's Internet-scale single sign-on.
- 2008‑10‑01:
Power provisioning for a warehouse-sized computer.
- 2008‑10‑01:
Google site reliability engineering.
- 2008‑10‑01:
RFC 822 -> 2822 -> 5322 - Internet Message Format.
- 2008‑10‑01:
RFC 821 -> 2821 -> 5321 - Simple Mail Transfer Protocol.
- 2008‑10‑01:
UK Energy in brief, July 2008.
- 2008‑10‑01:
Digest of UK energy statistics, 2008.
- 2008‑10‑01:
US household electricity usage in 2001.
- 2008‑10‑01:
Google's green data centres.
- 2008‑09‑30:
The Erlang rationale.
- 2008‑09‑30:
Thomson Reuters (creators of EndNote) sues George Mason University for creating Zotero, interoperable open-source in-browser bibliography software.
- 2008‑09‑30:
Corpus Chronophage web site.
- 2008‑09‑29:
Functional inside-out closure objects in Perl.
- 2008‑09‑29:
The anatomy of John Harrison's grasshopper escapement.
- 2008‑09‑29:
Video map of world airline traffic over 24 hours.
- 2008‑09‑25:
"Higher Ground" laptop bags.
- 2008‑09‑25:
Acorn RISC OS goes open source.
- 2008‑09‑24:
The iPhone development story.
- 2008‑09‑24:
Dogs in elk.
- 2008‑09‑23:
Investment banks switch status to casinos.
- 2008‑09‑22:
The Corpus Christi Chronophage clock. (youtube)
- 2008‑09‑22:
A chapter from the history of Freddie Mac.
- 2008‑09‑22:
Can you name the shipping forecast sea areas?
- 2008‑09‑22:
NYT Freakonomics blog on the banking crisis.
- 2008‑09‑22:
Comparing banking bail-outs to the Chrysler crisis 30 years ago.
- 2008‑09‑22:
Make My Vote Count - campaigning in favour of proportional representation.
- 2008‑09‑22:
Ministry of Justice consultation document on weekend voting, including stupid moves towards electronic voting. They completely miss the point that you can't increase turnout with techno-fixes.
- 2008‑09‑22:
ATS: Applied Type System language (current computer language shootout winner).
- 2008‑09‑19:
Nassim Nicholas Taleb on the limits of statistics, financial modelling, etc.
- 2008‑09‑19:
Time magazine says John McCain is a no-good liar.
- 2008‑09‑19:
Not another scripting language.
- 2008‑09‑19:
C201X draft.
- 2008‑09‑19:
C99 + TC{1,2,3}.
- 2008‑09‑19:
Canada to join EEA?
- 2008‑09‑19:
Squirrelfish Extreme - an even faster JavaScript interpreter/JIT.
- 2008‑09‑18:
Stronly-typed memory areas: programming systems-level data structures in a functional language.
- 2008‑09‑18:
Banks buying each other to get their hands on the data centres.
- 2008‑09‑18:
Verifiable functional purity in Java / Joe-E.
- 2008‑09‑17:
The transactional memory / garbage collection analogy.
- 2008‑09‑17:
A comparison of IPv4 to IPv6 transition proposals.
- 2008‑09‑16:
Some bitwise tricks.
- 2008‑09‑16:
Impossible fractals.
- 2008‑09‑16:
A.C.Grayling flames Steve Fuller to a crisp when reviewing Fuller's book defending "intelligent design".
- 2008‑09‑15:
Why the creator of the GNU.FREE internet voting software decided to kill the project.
- 2008‑09‑15:
BGP information derived from the Spamhaus DROP list.
- 2008‑09‑15:
Simple static check for undefined global variables in Lua.
- 2008‑09‑15:
Cameraria ohridella in Cambridge.
- 2008‑09‑15:
Horse chestnut leaf miner moth (cameraria ohridella).
- 2008‑09‑12:
I want to scream at my computer.
- 2008‑09‑12:
What's wrong with Steve Jobs?
- 2008‑09‑12:
Don't mess with the pancreas.
- 2008‑09‑11:
Wired on the origin of the false United Airlines bankruptcy story.
- 2008‑09‑11:
Dear Zoo.
- 2008‑09‑11:
Best practices for system administration of perl installations.
- 2008‑09‑09:
Unpacking the Google Chrome user agent string.
- 2008‑09‑09:
Pictures of the Tesco Gerrards Cross tunnel collapse.
- 2008‑09‑09:
Tesco Gerrards Cross.
- 2008‑09‑08:
Map of root DNS servers.
- 2008‑09‑08:
Linux tweaks for SSDs.
- 2008‑09‑08:
US Naval Observatory UTC leap second survey.
- 2008‑09‑05:
OpenBTS - open source GSM stack, including field test at Burning Man.
- 2008‑09‑05:
Live action nethack.
- 2008‑09‑04:
Political censorship is a fundamental of network architecture for the ITU?
- 2008‑09‑04:
The awesome Japanese large helical plasma fusion device.
- 2008‑09‑04:
Sunrise Data Dictionary: C library for lock-free hash table storage of arbitrary data.
- 2008‑09‑04:
A scalable non-blocking concurrent hash table implementation with incremental rehashing.
- 2008‑09‑04:
Lock-free resizable hash tables using split-ordered lists.
- 2008‑09‑04:
Shared memory consistency models: a tutorial.
- 2008‑09‑04:
Google Chrome's poitless title bar.
- 2008‑09‑03:
Tom Rokicki's notes on his Hashlife implementation.
- 2008‑09‑03:
More periodic tables.
- 2008‑09‑03:
Alternative periodic tables.
- 2008‑09‑03:
Periodic spiral.
- 2008‑08‑31:
Tom Rokicki's Life In A Register.
- 2008‑08‑29:
A better record type for Erlang suggested by Richard O'Keefe.
- 2008‑08‑27:
UK postcode format.
- 2008‑08‑21:
An A to Z of pet poisons. (so far only A is for Alcohol)
- 2008‑08‑19:
Dave Crocker's view on the impact of email work at RAND in the mid 1970s.
- 2008‑08‑19:
Neal McBurnett on the Verisign SiteFinder debacle.
- 2008‑08‑15:
Perspectives: improving ssh-style host authentication with multi-path network probing.
- 2008‑08‑15:
Ben Laurie on access control and capabilities.
- 2008‑08‑15:
PostSpectacular - cool generative art for advertising etc.
- 2008‑08‑14:
Why film schools teach screenwriters not to pass the Bechdel test.
- 2008‑08‑12:
The Feltron Annual Reports - brilliant and utterly bonkers.
- 2008‑08‑11:
Internet safety guidelines.
- 2008‑08‑11:
"War on Terror" board game siezed by police.
- 2008‑08‑11:
The next Bond?
- 2008‑08‑08:
Poisoning BIND despite port randomization - requires 10 hours and gigabit ethernet.
- 2008‑08‑07:
DNSSEC in 6 (or more) minutes.
- 2008‑08‑07:
Apple can revoke iPhone apps and delete them from your phone when you next sync.
- 2008‑08‑07:
Volatiles are miscompiled, and what to do about it.
- 2008‑08‑06:
How to program the security chip in a stolen passport so it looks genuine.
- 2008‑08‑06:
Gross greylisting server.
- 2008‑08‑04:
Bike light comparison photos.
- 2008‑07‑30:
The UPU dotpost sTLD.
- 2008‑07‑30:
This is the 21st century, damnit! Where's my jetpack?
- 2008‑07‑30:
The fact is that illegally-obtained games often run better than their legal counterparts.
- 2008‑07‑30:
John Levine: "The reason that e-mail is uniquely useful is that you can exchange mail with people you don't already know. The reason that spam exists is that you can exchange mail with people you don't already know."
- 2008‑07‑28:
The Rule.
- 2008‑07‑25:
The 2 minute challenge: short films about the importance of computer science.
- 2008‑07‑25:
DNSSEC @ ICANN: signing the root zone: a way forward toward operational readiness.
- 2008‑07‑24:
Dr Evil logo.
- 2008‑07‑24:
F-Secure logo.
- 2008‑07‑24:
The Cambridge University Library paperchase.
- 2008‑07‑23:
Towards high-performance virtual routers on commodity hardware.
- 2008‑07‑23:
Protecting browsers from DNS rebinding attacks.
- 2008‑07‑23:
Wired interviews Dan Kaminsky.
- 2008‑07‑23:
Dan Kaminsky and his neice explain the DNS problem.
- 2008‑07‑23:
Aggregated diamond nanorods.
- 2008‑07‑23:
Scalable computer programming languages.
- 2008‑07‑23:
Grafting functional support on top of an imperative language: how D 2.0 implements immutability and functional purity.
- 2008‑07‑23:
Ben Edelman on the impending scarcity of IP addresses and what to do about it.
- 2008‑07‑23:
Network World on IPv6 transition plans.
- 2008‑07‑22:
The HAMMER filesystem in Dragonfly BSD.
- 2008‑07‑22:
Crystal Clear LGPL icons.
- 2008‑07‑22:
Instruction creep.
- 2008‑07‑22:
Network World on dual-stack-lite.
- 2008‑07‑22:
Comcast's "dual-stack lite" proposal to speed up IPv6 deployment.
- 2008‑07‑21:
Combining global and personal anti-spam filtering.
- 2008‑07‑21:
Scalaris: a transactional key/value store.
- 2008‑07‑21:
Does genuine tech innovation happen better in a recession?
- 2008‑07‑18:
You won't be prosecuted for driving into a cyclist.
- 2008‑07‑16:
Petition against European copyright term extension.
- 2008‑07‑15:
Legibility and correct punctuation.
- 2008‑07‑15:
Brad Appleton's operating systems links.
- 2008‑07‑15:
Advances in dataflow programing languages.
- 2008‑07‑15:
Most borrowed authors.
- 2008‑07‑14:
A radio receiver made from a carbon nanotube.
- 2008‑07‑14:
Adeona: privacy-preserving tracking of stolen laptops based on OpenDHT.
- 2008‑07‑14:
Boris's design competition for a new Routemaster-like bus for London.
- 2008‑07‑14:
Communications of the ACM on Transactional Memory.
- 2008‑07‑14:
Inside BEAM, Bogdan's Erlang Abstract Machine.
- 2008‑07‑14:
A VW that does 100km per litre of fuel.
- 2008‑07‑14:
Bush hid the facts.
- 2008‑07‑11:
Compiling Mercury to high-level C code.
- 2008‑07‑11:
The origins and nature of the Internet in Australia.
- 2008‑07‑11:
Effective inline-threaded interpretation of Java bytecode using preparation sequences.
- 2008‑07‑11:
Yeti: a gradually extensible trace interpreter.
- 2008‑07‑11:
Context threading: a flexible and efficient dispatch technique for virtual machine interpreters.
- 2008‑07‑11:
Towards type-safe, hierarchical, lightweight, polymorphic and efficient error management in OCaml.
- 2008‑07‑11:
IMAP client feature table.
- 2008‑07‑11:
Import Genius: real-time reporting of the contents of every shipping container entering the United States.
- 2008‑07‑09:
Vote for Skylon!
- 2008‑07‑09:
Select quotes from "Peopleware - productive projects and teams".
- 2008‑07‑09:
Microsoft wants Yahoo!s search advertising patent.
- 2008‑07‑09:
On the unpredictability of support for TLDs with MXs, especially resolver oddities.
- 2008‑07‑08:
Hints for getting mail through various gateways to and from JANET (1990).
- 2008‑07‑08:
An extensible dynamically-typed hierarchy of exceptions for Haskell.
- 2008‑07‑07:
Linux signalfd() and timerfd() vs. kevent.
- 2008‑07‑07:
How freakanomics is ruining the dismal science.
- 2008‑07‑07:
REST anti-patterns.
- 2008‑07‑05:
The origins and development of TOPS-20.
- 2008‑07‑04:
Pringles are more like cakes or biscuits than potato crisps.
- 2008‑07‑01:
Parallel generational-copying garbage collection with a block-structured heap.
- 2008‑06‑27:
Vampire domestication.
- 2008‑06‑25:
Plugin pros and cons.
- 2008‑06‑25:
Let's talk about documentation.
- 2008‑06‑24:
Ideas for a new Erlang.
- 2008‑06‑22:
TICTOC problem statement - transmission of precision time over IP connections and transfer of clock.
- 2008‑06‑22:
ITU-T recommendation X.743 - information technology - open systems interconnection - systems management - time management function.
- 2008‑06‑21:
Xoc: an extension-oriented compiler for systems programming.
- 2008‑06‑21:
Pointer Rijwielen B.V.
- 2008‑06‑19:
ConneXions: the interoperabilty report, 1987-1996.
- 2008‑06‑18:
Murray Edwards College, Cambridge.
- 2008‑06‑18:
James Follett on his stroke and recovery.
- 2008‑06‑18:
$18000 for a 1900-year-old Roman D20.
- 2008‑06‑18:
Pl. George Orwell in Barcelona.
- 2008‑06‑18:
Life beyond distributed transactions: an apostate's opinion.
- 2008‑06‑17:
Quick reference for ANSI 606A administrations standard for telecommunications infrastructure.
- 2008‑06‑17:
Quadrilateral Venn diagram.
- 2008‑06‑16:
What it is like to write a technical book.
- 2008‑06‑16:
Markus Kuhn on Microsoft's lack of support for running PC real-time clocks in UTC.
- 2008‑06‑16:
A practical scalable distributed B-tree.
- 2008‑06‑15:
Wikipedia on Multiflow, with links to more papers.
- 2008‑06‑15:
The Multiflow trace scheduling compiler.
- 2008‑06‑15:
TERENA: trans-European research and education networking association.
- 2008‑06‑13:
Why are our programs still represented by flat files?
- 2008‑06‑13:
IEEE Spectrum special issue on the singularity.
- 2008‑06‑11:
The Schmidt sting pain index - like wine tasing notes for insect bites.
- 2008‑06‑06:
Announcing SquirrelFish: WebKit's new JavaScript interpreter.
- 2008‑06‑06:
Virtual machine showdown: stack versus registers.
- 2008‑06‑06:
The structure and performance of efficient interpreters.
- 2008‑06‑06:
The Guardian on the G4G recreational maths conference.
- 2008‑06‑06:
Fast, inexpensive content-addressed storage in Foundation.
- 2008‑06‑06:
Design tradeoffs for SSD performance.
- 2008‑06‑06:
An optimal Bloom filter replacement.
- 2008‑06‑05:
A&A's retort to stupid email disclaimers.
- 2008‑06‑04:
The design and implementation of dynamic hashing for sets and tables in Icon.
- 2008‑06‑04:
Mac OS X Leopard security configuration guide. (240 pages)
- 2008‑06‑03:
Problems with RFC 3484.
- 2008‑06‑03:
Skydiving plane fails at 7000ft.
- 2008‑06‑01:
A text pattern-matching tool based on parsing expression grammars.
- 2008‑05‑30:
How to manage outbound email.
- 2008‑05‑30:
A grocer's that sells unpackaged goods.
- 2008‑05‑30:
Paul Vixie blocks free email providers.
- 2008‑05‑29:
Joe Armstrong's standard Erlang lecture.
- 2008‑05‑29:
The Labour loans scandal turns into a crisis that may bankrupt members of its national executive committee.
- 2008‑05‑28:
Redundancy vs. dependencies - which is worse?
- 2008‑05‑28:
HPC considered harmful.
- 2008‑05‑28:
Sun "Lively" Javascript environment.
- 2008‑05‑28:
FixMyStreet Cambridge RSS feed.
- 2008‑05‑27:
The Economist on data centre energy use.
- 2008‑05‑27:
Same-day money transfers come to the UK.
- 2008‑05‑25:
Schroedinger's Cat.
- 2008‑05‑25:
Some wet cats.
- 2008‑05‑23:
Dual-head X11 RandR configuration.
- 2008‑05‑23:
FreeBSD dev summit in Cambridge in August.
- 2008‑05‑23:
RPC under fire.
- 2008‑05‑23:
The future without IPv6.
- 2008‑05‑23:
Bram Cohen's recommended version control practices.
- 2008‑05‑23:
The CPS slaps the City of London police over the Scientology "cult" case.
- 2008‑05‑22:
ESPN on Sam Whittingham and the HPV land speed record.
- 2008‑05‑22:
Unbound - fast recursive cacheing DNS server.
- 2008‑05‑21:
Broadband service infrastructure in Cambridge.
- 2008‑05‑21:
Russ Cox on the stupid Debian OpenSSL vulnerability.
- 2008‑05‑21:
DJB's pty program.
- 2008‑05‑21:
Mark Crispin laid off by UW.
- 2008‑05‑20:
Paul Vixie on the L-root decommission weirdness.
- 2008‑05‑20:
GnuTLS remote execution vulnerabilities.
- 2008‑05‑20:
An account of the Estonian Internet war.
- 2008‑05‑20:
ICANN on the L-root DNS server decommission weirdness.
- 2008‑05‑20:
The long, painful history of time.
- 2008‑05‑20:
SOCA fails to keep NHTCU going, so Home Office will fund a replacement.
- 2008‑05‑20:
Source of the famous "now you have two problems" quote.
- 2008‑05‑20:
Blackboard Mac - cool!
- 2008‑05‑20:
Erik Naggum's brilliant anti-XML rant.
- 2008‑05‑20:
Erik Naggum on XML, Lisp, and "enamel".
- 2008‑05‑20:
UK government wants to log all phone calls and emails.
- 2008‑05‑20:
Channel 4 successfully sues police for libel after being accused of exaggerating Muslim extremism.
- 2008‑05‑20:
Steve Bellovin on SPF.
- 2008‑05‑20:
Teenager faces prosecution for calling Scientology a cult.
- 2008‑05‑20:
MailChannels traffic control available free for small sites.
- 2008‑05‑20:
How to have a narrow keyboard.
- 2008‑05‑20:
IBM model M clicky keyboards.
- 2008‑05‑20:
Evoluent - interesting keyboards and mice.
- 2008‑05‑20:
Home-made weather balloon experiment.
- 2008‑05‑19:
Achieving line rate on a 10Gbit NIC.
- 2008‑05‑19:
Which social network web sites are popular where?
- 2008‑05‑19:
Thunderbird Lightning calendaring component.
- 2008‑05‑16:
California supreme court overturns gay marriage ban.
- 2008‑05‑15:
Concrete syntax for objects: domain-specific language embedding and assimilation without restrictions.
- 2008‑05‑15:
Context-aware scanning for parsing extensible languages.
- 2008‑05‑15:
Bashing twitter, or twittering bash?
- 2008‑05‑15:
XKCD on randomness.
- 2008‑05‑15:
Dilbert on randomness.
- 2008‑05‑14:
An interesting approach to peer review.
- 2008‑05‑14:
Evan Martin and I discuss format strings etc.
- 2008‑05‑13:
An older stupid Debian security vulnerability.
- 2008‑05‑13:
Ben Laurie on a stupid Debian security vulnerability.
- 2008‑05‑13:
A sensible literary theorist. (Who'd've thought?!)
- 2008‑05‑13:
MUTO: an ambiguous animation painted on public walls. (amazing!)
- 2008‑05‑13:
The "no dashes or spaces" hall of shame.
- 2008‑05‑12:
One method at a time is quite a waste of time.
- 2008‑05‑12:
1000 blank white cards.
- 2008‑05‑12:
An interview with Cliff Click (Java JITter).
- 2008‑05‑12:
Java 6 performance white paper.
- 2008‑05‑12:
A more self-defeating man with an angle grinder.
- 2008‑05‑12:
Angle grinder man.
- 2008‑05‑12:
"Something you had, something you forgot, something you were."
- 2008‑05‑11:
C++ draft standard.
- 2008‑05‑11:
eBay's lack of effective anti-fraud enforcement starts to hurt business?
- 2008‑05‑11:
How Sun failed to apply experience from Objective C to Java.
- 2008‑05‑09:
Heal warts with duct tape.
- 2008‑05‑09:
Illegal mistreatment of asylum seekers by the Home Office.
- 2008‑05‑09:
Nice password advice posters.
- 2008‑05‑08:
Unvaccinated child dies of preventable disease.
- 2008‑05‑08:
Igudesman & Joo.
- 2008‑05‑08:
Rachmaninov had big hands.
- 2008‑05‑08:
Defunctionalization at work.
- 2008‑05‑08:
Discussion thread about co-operative DNS cacheing.
- 2008‑05‑08:
The death of the SUV. (hooray!)
- 2008‑05‑08:
Web 2.0 developers' cluelessness about Internet hosting.
- 2008‑05‑08:
GreenFS: making enterprise computers greener by keeping their disks off most of the time.
- 2008‑05‑07:
An ex-professor from Dartmouth who deserves to lose.
- 2008‑05‑07:
Session startup mobile optimizations for XMPP.
- 2008‑05‑07:
The eggcorn database of malapropisms.
- 2008‑05‑07:
Black market prices of phished data.
- 2008‑05‑06:
Making the compilation "pipeline" explicit: dynamic compilation using trace tree serialization (October 2007).
- 2008‑05‑06:
Efficient just-in-time execution of dynamically typed languages via code specialization using precise runtime type inference (September 2007).
- 2008‑05‑06:
Incremental dynamic code generation with trace trees (November 2006).
- 2008‑05‑06:
HotpathVM: an effective JIT compiler for resource-constrained devices (June 2006).
- 2008‑05‑02:
The Merchant and the Alchemist's Gate (Nebula award winner by Ted Chiang).
- 2008‑05‑02:
What's expected of us (by Ted Chiang).
- 2008‑05‑02:
Richard Morgan on sfnal infighting.
- 2008‑05‑01:
Extending the scope of syntactic abstraction in Scheme.
- 2008‑05‑01:
Syntactic abstraction in Scheme.
- 2008‑04‑30:
Programming languages and facial hair.
- 2008‑04‑30:
SFTP sync (perl).
- 2008‑04‑30:
Apple vs. Microsoft / product vs. platform.
- 2008‑04‑30:
The real cost of motoring in the UK, 1987-2008.
- 2008‑04‑30:
Syntax matters.
- 2008‑04‑30:
Sex is good for you.
- 2008‑04‑29:
ArseNIC: a user-accessible gigabit ethernet interface.
- 2008‑04‑29:
Steps towards a DoS-resistant internet architecture.
- 2008‑04‑29:
Using packet symmetry to curtail malicious traffic.
- 2008‑04‑29:
La ligne du Haut-Bugey.
- 2008‑04‑29:
IBM X10 experimental programming language.
- 2008‑04‑29:
Making chocolate at home starting from raw beans.
- 2008‑04‑28:
Rubik's cube can be solved in 25 moves or fewer (proved by Thomas Rokicki, also known for a hashlife implementation).
- 2008‑04‑28:
First superheavy element found in nature.
- 2008‑04‑28:
What programming languages should you know?
- 2008‑04‑27:
David Woodhouse's exim+sqlite grelisting.
- 2008‑04‑27:
Heiko Schlitterman's exim+perl greylisting.
- 2008‑04‑27:
Guardian report on DTI human vital statistics survey.
- 2008‑04‑27:
News Corporation hired a hacker to undermine a rival satellite TV network with pirated smart cards.
- 2008‑04‑27:
Debian bug report: insuling source code in quodlibet.
- 2008‑04‑25:
The Internet owes its success to Windows 95 with built-in TCP/IP.
- 2008‑04‑25:
Lightweight version of official Dilbert website.
- 2008‑04‑25:
Infection points everywhere in computing.
- 2008‑04‑24:
The end of end-to-end?
- 2008‑04‑24:
The silence of the Finns.
- 2008‑04‑24:
Cable TV head-end photographs.
- 2008‑04‑24:
Christiaan Postma's amazing clock.
- 2008‑04‑23:
Another step towards augmented intelligence?
- 2008‑04‑23:
Colemak keyboard layout.
- 2008‑04‑22:
Turkish dotless-I can ruin your life.
- 2008‑04‑22:
I can't believe I'm praising Tcl!
- 2008‑04‑22:
Microsoft turns off remote access to Hotmail using standard protocols.
- 2008‑04‑22:
The Darwin Correspondence Project.
- 2008‑04‑21:
How Norway came to vote "yes" for MS-OOXML.
- 2008‑04‑21:
Stirling-engine CPU fan.
- 2008‑04‑21:
The Royal Observatory, Greenwich: a glance at its history and work.
- 2008‑04‑21:
Cambridge's Richardson Candle street lighting.
- 2008‑04‑20:
Funky Fun House.
- 2008‑04‑18:
An engineer's guide to cats.
- 2008‑04‑18:
"Little Brother" by Cory Doctorow, reviewed by Farah Mendlesohn.
- 2008‑04‑18:
The old Dilbert website.
- 2008‑04‑18:
Dilbert without the flash crap.
- 2008‑04‑18:
MIT's obituary of Edward Lorentz.
- 2008‑04‑17:
US-CERT Vulnerability Note VU#162289 - gcc silently discards some wraparound checks.
- 2008‑04‑16:
Lolgrues (via jm).
- 2008‑04‑16:
Apple buyers guide.
- 2008‑04‑16:
Google spins down its "don't be evil" motto.
- 2008‑04‑15:
How Wordpress keep track of 300 servers.
- 2008‑04‑15:
A cat playing the Theremin.
- 2008‑04‑15:
F-secure are against Phorm.
- 2008‑04‑15:
Monster Cables gets a longer version of the response in Arkell vs. Pressdram.
- 2008‑04‑14:
My LibraryThing profile.
- 2008‑04‑14:
Healing backups in Venti archives.
- 2008‑04‑11:
Bubble babble binary-to-text coding system.
- 2008‑04‑11:
Boeing patent prevents recovery of satellite after failed orbit insertion.
- 2008‑04‑10:
John Mashey on RISC vs CISC.
- 2008‑04‑09:
Robust bilingual word alignment for machine-aided translation.
- 2008‑04‑09:
An algorithm for structuring programs - converting Fortran to Ratfor.
- 2008‑04‑09:
Read the fine little red book.
- 2008‑04‑09:
Killough robot platform: omnidirectional motion with normal wheels.
- 2008‑04‑09:
Airtrax fork-lifts etc. with Mecanum/Ilon wheels.
- 2008‑04‑09:
Segway robotic mobility platform, with Mecanum/Ilon wheels.
- 2008‑04‑09:
A short history of omnidirectional wheels.
- 2008‑04‑09:
Modern wheel inventions, including omnidirectional wheels.
- 2008‑04‑08:
On the scale and performance of co-operative web proxy cacheing.
- 2008‑04‑08:
Networked Livermore Time-Sharing System.
- 2008‑04‑08:
Unix file IO atomicity.
- 2008‑04‑08:
Unix file offset semantics.
- 2008‑04‑07:
Core Memory - coffee table book of vintage computer photographs.
- 2008‑04‑06:
High-speed TCP variants.
- 2008‑04‑02:
Renard numbers.
- 2008‑04‑02:
A plan for scams.
- 2008‑04‑02:
Protothreads - switch-based coroutines.
- 2008‑04‑01:
Efficient deadline scheduling with annotated B-trees.
- 2008‑03‑27:
What will life be like in 2008? Predictions from 40 years ago.
- 2008‑03‑26:
Relative capacities of energy sources and users in the USA.
- 2008‑03‑26:
Parametron circuit.
- 2008‑03‑26:
Parametron - Japanese digital computer based on the phase of AC signals.
- 2008‑03‑26:
Chatsworth Products - passive thermal management for data centre cabinets.
- 2008‑03‑26:
Apple Store, Grand Arcade, Cambridge.
- 2008‑03‑19:
Phorm: malware developers who want to intercept all your users' web traffic.
- 2008‑03‑19:
Mac OS X getaddrinfo() unexpectedly looks up MX records for TCP connections to port 25.
- 2008‑03‑18:
An executive infrastructure for TCB minimization.
- 2008‑03‑18:
Trying to find Microsoft interop specifications.
- 2008‑03‑17:
Match it for Pratchett.
- 2008‑03‑14:
Run-time-system-level fault-tolerance for a distributed functional language.
- 2008‑03‑14:
Mifare cryptanalysis.
- 2008‑03‑14:
A safe way to use uninitialized memory.
- 2008‑03‑13:
How to be a programmer.
- 2008‑03‑12:
Jodrell Bank to be closed.
- 2008‑03‑11:
A response to complaints about Erlang.
- 2008‑03‑10:
Erlang warts.
- 2008‑03‑10:
Studly Mac display hack.
- 2008‑03‑09:
DTrace BIFs for Erlang.
- 2008‑03‑09:
DTrace provider for Erlang.
- 2008‑03‑09:
Monadic memoization mixins.
- 2008‑03‑09:
Data types à la carte.
- 2008‑03‑09:
The genuine sieve of Eratosthenes.
- 2008‑03‑09:
Paul Lockhart's Mathematician's lament.
- 2008‑03‑07:
Screen cleaner.
- 2008‑03‑07:
Files in limbo wrt your VCS, and mistakes users make with git.
- 2008‑03‑06:
One user group has been overlooked during the development of the UCS, namely that of young adolescent women.
- 2008‑03‑04:
Solaris dldump(3C) - create a new shared object from (part of) a running process.
- 2008‑03‑04:
Limerick database.
- 2008‑03‑04:
Bundling Lua code in your ELF executable.
- 2008‑03‑04:
Bundling Lua code into your Mach-O executable.
- 2008‑03‑03:
A quick guide to the Lua interpreter.
- 2008‑03‑03:
Haskell on a shared memory multiprocessor.
- 2008‑03‑03:
Uniqueness typing simplified.
- 2008‑02‑29:
Learning to lie.
- 2008‑02‑29:
Van Jacobson on modern IP stack performance improvements.
- 2008‑02‑28:
RIPE on the YouTube hijack.
- 2008‑02‑28:
The true cost of Dubya's wars.
- 2008‑02‑28:
YouTube hijacking summary.
- 2008‑02‑28:
Computing at the Sanger Institute.
- 2008‑02‑28:
The effectiveness of greet-pause.
- 2008‑02‑28:
Better exception syntax for Erlang.
- 2008‑02‑28:
Better exception syntax for SML.
- 2008‑02‑28:
Semantics of value recursion for monadic IO.
- 2008‑02‑28:
A recursive `do` for Haskell.
- 2008‑02‑28:
A comparison of Java, Lua, Perl, Python, Ruby FFIs.
- 2008‑02‑27:
A pro-thougt manifesto.
- 2008‑02‑27:
The L.A. Times wonders if copyright should be taxed.
- 2008‑02‑27:
Lincolnshire museum of etch-a-sketch artwork.
- 2008‑02‑27:
Cunning hack using case-insensitivity in the DNS to provide more security.
- 2008‑02‑27:
British Geological Survey earthquake questionnaire.
- 2008‑02‑27:
Spam bots can solve HoTMaiL / Windows Live Mail CAPTCHAs.
- 2008‑02‑27:
Spam bots can solve GMail CAPTCHAs.
- 2008‑02‑26:
Some fairly nice free icons.
- 2008‑02‑25:
Rosencrantz and Guildenstern are wed.
- 2008‑02‑25:
Monkeypatching is destroying Ruby.
- 2008‑02‑25:
What is a purely functional language?
- 2008‑02‑25:
Sun Labs scalable synchronization research group.
- 2008‑02‑25:
Sun's research into transactional memory.
- 2008‑02‑22:
Firewire: all your memory are belong to bus.
- 2008‑02‑22:
IPv4 global unicast address assignments.
- 2008‑02‑21:
Hyperthreading timing attacks.
- 2008‑02‑21:
Breaking disk encryption by recovering keys from uncleared DRAM after a reboot.
- 2008‑02‑21:
Nominet requires mass registration transfers to be performed using Excel spreadsheets sent via email.
- 2008‑02‑20:
When is a functional program not a functional program?
- 2008‑02‑20:
Desktop RAID is a bad idea.
- 2008‑02‑20:
An analysis of latent sector errors in disk drives (connected to NetApps).
- 2008‑02‑20:
Sometimes all functions are continuous.
- 2008‑02‑20:
Staircase/bookcase.
- 2008‑02‑20:
Latent sector errors in disk drives.
- 2008‑02‑19:
History of the lambda calculus and combinatory logic.
- 2008‑02‑19:
Antikythera mechanism solved.
- 2008‑02‑19:
Corrupted DNS resolution paths: the rise of a malicious resolution authority.
- 2008‑02‑19:
Radio controlled clocks.
- 2008‑02‑18:
Computer administrative debris.
- 2008‑02‑18:
Microsoft Office document format specifications.
- 2008‑02‑18:
Court of the Lord Lyon puts the heraldic slap-down on Donald Trump.
- 2008‑02‑15:
Russ Cox on the Bourne shell.
- 2008‑02‑15:
Justin Mason on the Bourne shell.
- 2008‑02‑15:
MIT graphic identity - fonts.
- 2008‑02‑15:
Eric Tetz on Tcl.
- 2008‑02‑15:
RMS explains why you should not use Tcl.
- 2008‑02‑15:
Explaining the link between autism and MMR.
- 2008‑02‑15:
Some references about precision timekeeping.
- 2008‑02‑15:
ICANN requests public comments on the effect of new gTLDs on the stability of the DNS.
- 2008‑02‑15:
Using inlines to reduce code duplication.
- 2008‑02‑15:
Embedding the photographer's iris scan in the image's EXIF data.
- 2008‑02‑15:
Declining educational standards at Oxford.
- 2008‑02‑15:
Density of water vs. alcohol.
- 2008‑02‑15:
Childhood origins of adult resistance to science.
- 2008‑02‑14:
The Bourne shell's infamous SEGV handler.
- 2008‑02‑14:
Momail: free mobile email for everyone.
- 2008‑02‑14:
Branding with Arial.
- 2008‑02‑14:
The scourge of Arial.
- 2008‑02‑13:
The determination and distribution of precise time (in 1966).
- 2008‑02‑12:
Stretching the storage manager: weak pointers and stable names in Haskell. (Describes memoized functions, so might be useful for a nice implementation of hashlife.)
- 2008‑02‑12:
Are C1 control characters permitted by W3C document formats?
- 2008‑02‑12:
Oil firms' output is down, yet profits skyrocket. Peak oil is coming.
- 2008‑02‑12:
World Health Organization style guide.
- 2008‑02‑12:
Fight the fog: how to write clearly.
- 2008‑02‑12:
The English style guide of the European Commission directorate-general for translation.
- 2008‑02‑12:
UK government plans to require ISPs to ban users who share files.
- 2008‑02‑12:
Do we need WADL?
- 2008‑02‑12:
Should you believe what you write in your PhD thesis?
- 2008‑02‑12:
UK intellectual property office issues statement on software patents.
- 2008‑02‑12:
Online encyclopaedia of western signs and ideograms.
- 2008‑02‑12:
A category-theoretic view of programming language design.
- 2008‑02‑11:
A picture of me!
- 2008‑02‑11:
In defence of the delete key.
- 2008‑02‑11:
iTunes U - educational audio and video hosting and distribution by Apple.
- 2008‑02‑11:
Multi-language extensions for the Java virtual machine.
- 2008‑02‑11:
FontFocus - sounds much better than TrueType (though that isn't hard).
- 2008‑02‑11:
Secure string interpolation in JavaScript.
- 2008‑02‑08:
Observable sharing for functional circuit description.
- 2008‑02‑08:
Data corruption in the Linden Labs network.
- 2008‑02‑07:
Remote control for Airport Express / AirTunes.
- 2008‑02‑06:
Clever hack using Exim's ratelimit features to implement auto-whitelisting.
- 2008‑02‑05:
Impressive Asus eee PC hardware hackery.
- 2008‑02‑04:
EJabberd s2s TLS certificate selection problems.
- 2008‑02‑03:
Programming languages as operating systems (or, revenge of the son of the lisp machine).
- 2008‑02‑03:
On the expressive power of programming languages.
- 2008‑02‑03:
Composable and compilable macros.
- 2008‑02‑03:
A theory of hygienic macros.
- 2008‑02‑03:
C0X draft decomposed for searchability.
- 2008‑02‑03:
"The new C standard: an economic and cultural commentary" updated to TC3.
- 2008‑02‑03:
CEO of Alphabasic Records promotes piracy because mainstream retailers are stiffing him.
- 2008‑02‑02:
Google Maps.
- 2008‑02‑02:
More about LuaJIT 2 NaN tagging.
- 2008‑02‑02:
A comprehensive approach to DRAM power management.
- 2008‑02‑01:
Brad Fitzpatrick announces Google's social graph API.
- 2008‑02‑01:
Some notes on LuaJIT 2.
- 2008‑02‑01:
Neal Stephenson ventures forth across the wide and wondrous meatspace of three continents, chronicling the laying of the longest wire on Earth.
- 2008‑02‑01:
A MacBook Air in pieces.
- 2008‑02‑01:
How the US government has used bogus terrorism scares to bury inconvenient news.
- 2008‑02‑01:
SIGPIPE misdesign in Python.
- 2008‑01‑31:
Jump Networks co-location: £0 per month for rack space, 2x GigE ports, 1Mbps transit, OOB management, and masterswitch port (power not included).
- 2008‑01‑31:
Undersea cable approaches around Cornwall and Brittany.
- 2008‑01‑31:
Countries affected by the Mediterranean cable break.
- 2008‑01‑31:
Deputy static checker for C.
- 2008‑01‑31:
Asterisk and Jabber integration tutorial.
- 2008‑01‑31:
NVIDIA Tesla GPU server.
- 2008‑01‑30:
Itanium sales forecasts.
- 2008‑01‑29:
Barracuda/ClamAV legal defence page.
- 2008‑01‑29:
Trend Micro sues Barracuda for infringement of a patent on scanning email for viruses.
- 2008‑01‑29:
Software patents to be allowed in the UK?!
- 2008‑01‑29:
ICANN votes to make their 20c domain registration tax non-refundable in order to tackle domain tasting and front-running.
- 2008‑01‑29:
A troll gets a patent on smartphones and sues everyone in sight.
- 2008‑01‑28:
Perl cannot be parsed.
- 2008‑01‑28:
Nokia buys TrollTech.
- 2008‑01‑28:
All this online sharing has to stop.
- 2008‑01‑27:
PLT Scheme eliminates the set-car! and set-cdr! functions.
- 2008‑01‑27:
Google to prevent domain kiters from using AdSense, at last.
- 2008‑01‑25:
Ian Fleming / James Bond bibliography.
- 2008‑01‑24:
Fast queue runner for Exim.
- 2008‑01‑24:
Google Health.
- 2008‑01‑24:
Updated travel-time maps from MySociety.
- 2008‑01‑23:
More about separate intent logs for ZFS.
- 2008‑01‑23:
Level 2 ARC (flash cache) for ZFS.
- 2008‑01‑23:
Separate intent logs for ZFS.
- 2008‑01‑23:
Disabling PT_DENY_ATTACH on Mac OS X to make DTrace work properly.
- 2008‑01‑22:
Compiler optimizations using data compression to decrease address reference entropy.
- 2008‑01‑22:
jsMSX - the first MSX emulator 100% written in Javascript - modern software is beyond satire.
- 2008‑01‑22:
The Last Empire: China's pollution problem goes global.
- 2008‑01‑22:
John Levine's collection of UNCOL references from comp.compilers.
- 2008‑01‑22:
The design and implementation of Typed Scheme.
- 2008‑01‑21:
TSCP secure email spec.
- 2008‑01‑21:
The Transglobal Secure Collaboration Program (TSCP) publicly releases secure email specifications.
- 2008‑01‑21:
Cyber-extortion or CIA scaremongering?
- 2008‑01‑21:
Risk compensation deniers - more links from John Adams about road safety.
- 2008‑01‑21:
Heathrow at night.
- 2008‑01‑21:
Seat belt legislation and the Isles report.
- 2008‑01‑21:
Google's secret 10 gigabit ethernet switch.
- 2008‑01‑21:
Randy Bush enables IPv6.
- 2008‑01‑21:
Ben Laurie on Deputy, Delta, and type checking in C.
- 2008‑01‑21:
Official Internet protocol standards - RFCs indexed by topic.
- 2008‑01‑21:
More about the OV-chipkaart from Freedom to Tinker.
- 2008‑01‑21:
A parent's observations of a child using the OLPC.
- 2008‑01‑21:
Software system longevity paradigms.
- 2008‑01‑21:
RFID replay attack allows free travel in NL.
- 2008‑01‑21:
Statement about the Mifare cipher exposure.
- 2008‑01‑21:
The delta debugging tool.
- 2008‑01‑21:
Delta debugging.
- 2008‑01‑21:
Apple disables DTrace probes for some apps, including iTunes.
- 2008‑01‑21:
Car bomb? Exploding hot water tank? Or bread maker?
- 2008‑01‑19:
Fifty years of "How to lie with statistics".
- 2008‑01‑19:
Oracle btrfs for Linux.
- 2008‑01‑18:
Joke about side-effects in F# transactional memory.
- 2008‑01‑18:
Google Maps mashup of average house prices by postcode.
- 2008‑01‑18:
Stupidfilter - applying anti-spam technology to idiots in web fora.
- 2008‑01‑18:
Prototype HUD contact lenses.
- 2008‑01‑18:
AOL adds XMPP c2s access to the AIM/ICQ service.
- 2008‑01‑17:
Cross-site printing.
- 2008‑01‑17:
AXFR illegal in North Dakota.
- 2008‑01‑17:
Penrose vs. Kleenex.
- 2008‑01‑17:
Ancient Islamic Penrose tiles.
- 2008‑01‑16:
Prologue to Iain M. Banks's new Culture novel, Matter.
- 2008‑01‑16:
ACM classic books series, many with full text PDFs available on-line.
- 2008‑01‑16:
The "freedom to tinker" blog on electronic voting machines.
- 2008‑01‑16:
RFC 3974 is the de-facto standard for IPv6 MX routing.
- 2008‑01‑16:
How IPv6 breaks IPv4 MX lookups.
- 2008‑01‑16:
Rise of the stupid network.
- 2008‑01‑15:
Markus Kuhn on ASCII and Unicode quotation marks.
- 2008‑01‑15:
Other symbiotic colonies of bacteria and yeast.
- 2008‑01‑15:
Kombucha / Manchurian Mushroom / tea fungus.
- 2008‑01‑15:
Best GB/$ hard disk drives, graphed.
- 2008‑01‑14:
Ada style guide - performance.
- 2008‑01‑14:
GNAT performance considerations.
- 2008‑01‑14:
Les Hatton's articles on MISRA C and other safe subsets.
- 2008‑01‑14:
Cambridge city centre cycling map.
- 2008‑01‑14:
CD recycling.
- 2008‑01‑14:
The 3COM XJACK - utterly brilliant.
- 2008‑01‑14:
Would you trust your data to these people?
- 2008‑01‑13:
Some applications of Rabin's fingerprinting method.
- 2008‑01‑13:
Recipient filtering in Exchange 2007.
- 2008‑01‑11:
MAAWG abuse desk common practices.
- 2008‑01‑11:
Multitasking is dumbing us down and driving us crazy.
- 2008‑01‑10:
Multi-purpose fuzzer "zzuf".
- 2008‑01‑09:
Coffee portal.
- 2008‑01‑09:
Microsoft's "Mommy, Why is There a Server in the House?"
- 2008‑01‑09:
Network Solutions seems to be domain tasting.
- 2008‑01‑08:
Possibly the original description of the DJB times-33 hash function.
- 2008‑01‑08:
Blue Vinyl: an environmentalist documentary about PVC building materials.
- 2008‑01‑08:
A green house near Tahoe.
- 2008‑01‑08:
The Register on Cambridge's VOIP project.
- 2008‑01‑08:
Premake build script generator.
- 2008‑01‑08:
Computer science education: where are the software engineers of tomorrow?
- 2008‑01‑08:
Has chip+pin failed to foil fraudsters?
- 2008‑01‑07:
Fair Deal Homeopathy: natural products to help you feel better about yourself.
- 2008‑01‑07:
Government response to the petition to the Prime Minister to scrap the Huntingdon-Cambridge guided busway.
- 2008‑01‑07:
Why do critics still sneer at sci-fi?
- 2008‑01‑06:
Evolutionary programming and gradual typing in ECMAScript 4 - a tutorial.
- 2008‑01‑06:
Steve Yegge on Java and code bloat.
- 2008‑01‑06:
The in-flight passenger internet access network in the Boeing 787 is connected to the plane's control, navigation and communication systems.
- 2008‑01‑05:
Let's make cows fart like kangaroos.
- 2008‑01‑04:
The worker-wrapper transformation.
- 2008‑01‑04:
Open multimethods for C++.
- 2008‑01‑04:
J&: nested intersection for scalable software composition.
- 2008‑01‑04:
Mark Nottingham's cache channels prototype for HTTP.
- 2008‑01‑04:
Alan Ralsky on trial for penny stock fraud via spam.
- 2008‑01‑03:
Logan's Run - plot summary.
- 2008‑01‑03:
"If it works, it's not AI": a commercial look at artificial intelligence startups.
- 2008‑01‑03:
Patterns of Software - tales from the software community by Richard P. Gabriel.
- 2008‑01‑03:
Comments on the failure of Symbolics.
- 2008‑01‑03:
Why did Symbolics fail?
- 2008‑01‑03:
St James's Gate to be closed and sold off.
- 2008‑01‑02:
Bruce Bethke on Cyberpunk.
- 2008‑01‑02:
Satanism is alive and well.
- 2008‑01‑02:
Brad Hicks on the end of the Bronze Age.
- 2008‑01‑02:
The secret Mifare cipher has been broken.
- 2008‑01‑02:
Dave Gorman solves our calendrical and time-keeping problems.
- 2008‑01‑02:
A nasal spray of orexin A wakes up sleep-deprived monkeys.
- 2008‑01‑01:
An empirical study into the security exposure to hosts of hostile virtualized environments.
- 2007‑12‑28:
Smoking bans around the world, as of June 2007.
- 2007‑12‑19:
Paddy Power's gambling advertisement teating problems.
- 2007‑12‑18:
Perl-5.10 changes.
- 2007‑12‑18:
perl-5.10 hits CPAN - browse the source.
- 2007‑12‑18:
"Shimmering" in Tcl - a rare case where Perl doesn't have the cool jargon for an obscure feature.
- 2007‑12‑18:
Nine Inch Noëls.
- 2007‑12‑18:
Larry Wall: "scripting is a lot like obscenity".
- 2007‑12‑18:
Happy 20th birthday, Perl. Release version 5.10 already!
- 2007‑12‑18:
What's cooking for FreeBSD-7.0 - a good summary of the notable improvements.
- 2007‑12‑18:
Top 10 tips for new bloggers from the first blogger, Jorn Barger.
- 2007‑12‑18:
Worm propagation strategies in an IPv6 internet.
- 2007‑12‑18:
free.fr deploys IPv6 for its 2.767 million ADSL customers. (French)
- 2007‑12‑18:
Open-FCoE is the home of the Fibre Channel over Ethernet implementation for the Linux operating system.
- 2007‑12‑17:
Amount of space required to transport the same number of people by car, bus, or bicycle.
- 2007‑12‑16:
The case for energy-proportional computing.
- 2007‑12‑14:
What to know before debating type systems.
- 2007‑12‑12:
Meta 419 scam.
- 2007‑12‑12:
Terry Pratchett announces "an embuggerance".
- 2007‑12‑12:
Knuth does Hacker's Delight.
- 2007‑12‑12:
GooglePages listed in the SBL. GooglePages URLs appearing in mail will trigger anti-spam systems, including SpamAssassin, until this is resolved. (via Justin Mason)
- 2007‑12‑12:
Bogglingly bad vulnerability in Lotus Notes.
- 2007‑12‑12:
Amateur time hackers play with atomic clocks at home.
- 2007‑12‑12:
SPECpower_ssj2008 - performance per watt of server-side Java.
- 2007‑12‑12:
How super-precise atomic clocks will change the world in a decade.
- 2007‑12‑11:
Apparatus for facilitating the birth of a child through centrifugal force.
- 2007‑12‑10:
Language Log: The etiology and elaboration of a flagrant mistranslation.
- 2007‑12‑10:
Soft hyphen - a hard problem?
- 2007‑12‑10:
The design of the Inferno virtual machine.
- 2007‑12‑10:
Henry Baker's archive of research papers, including several on linear languages.
- 2007‑12‑10:
Linear logic bibliography.
- 2007‑12‑10:
Continuations and Stackless Python.
- 2007‑12‑10:
The case for virtual register machines.
- 2007‑12‑10:
The 2003 workshop on interpreters, virtual machines and emulators.
- 2007‑12‑07:
Hand-written home page.
- 2007‑12‑07:
Stan Kelly-Bootle's Son of Devil's Advocate columns.
- 2007‑12‑06:
Ryanair and Aer Lingus together account for 25% of passenger complaints about European airlines.
- 2007‑12‑06:
Trying times in ISO's SGML committee.
- 2007‑12‑05:
Email standards compliance project.
- 2007‑12‑05:
Pictures of Cambridge's newest bridge.
- 2007‑12‑05:
Building noarch RPMs.
- 2007‑12‑05:
Microsoft wireless keyboards "encrypt" keystrokes using XOR with a one byte key.
- 2007‑12‑04:
Problems with IP address sorting in glibc and RFC 3484.
- 2007‑12‑04:
Cool glowy things.
- 2007‑12‑03:
Why the BBC fails at the Internet.
- 2007‑11‑30:
Frank Schilling on Dell's domain tasting lawsuit.
- 2007‑11‑30:
Dell takes domain tasters to court - excellent news!
- 2007‑11‑27:
A piece of stunning idiocy from ZDNet.
- 2007‑11‑26:
A cry for web standards in email.
- 2007‑11‑26:
Energy-efficient digital networks at LBL.
- 2007‑11‑25:
No Starch Press page about Forbidden Lego.
- 2007‑11‑25:
A review of the book "Forbidden Lego".
- 2007‑11‑25:
How to be a homeopathic bioterrorist.
- 2007‑11‑22:
Large meccano difference engine.
- 2007‑11‑22:
Small meccano difference engine.
- 2007‑11‑22:
Lego difference engine.
- 2007‑11‑20:
Out-of-office autoreply suppression in Exchange 2003.
- 2007‑11‑20:
Books about celestial mechanics and astronomical calculations.
- 2007‑11‑20:
Matthew Garrett on Automatix.
- 2007‑11‑19:
Open access to academic research in the US gets closer.
- 2007‑11‑19:
Why the future doesn't need us - Bill Joy.
- 2007‑11‑19:
The law of accelerating returns - Ray Kurzweil.
- 2007‑11‑19:
KurzweilAI.net - articles on acceleratng technological change.
- 2007‑11‑19:
Colossus rebuilt at Bletchley - National Codes Centre press release.
- 2007‑11‑19:
Colossus rebuilt at Bletchley - BBC news report.
- 2007‑11‑19:
Stephen Bates never wanted to be a religious affairs correspondent.
- 2007‑11‑16:
PHP compiler and static analyser.
- 2007‑11‑15:
RIPA section III in action.
- 2007‑11‑13:
Jens Schweikhardt on writing man pages.
- 2007‑11‑13:
Peter Seebach on writing man pages.
- 2007‑11‑12:
Discussion of Maemo Alpine port.
- 2007‑11‑12:
Nokia 770/800 Maemo applications, including Alpine.
- 2007‑11‑12:
Improving TCP/IP security through randomization without sacrificing interoperability.
- 2007‑11‑11:
Ivan Krstić on OLPC security.
- 2007‑11‑09:
CIO 2007 - meeting of ivy league law school IT managers.
- 2007‑11‑09:
Surf.NL Copyright Toolbox.
- 2007‑11‑08:
RFC 5068 / BCP 134.
- 2007‑11‑07:
MarkLogic XML / XQuery database - developer pages.
- 2007‑11‑07:
SiCortex: teraflops from milliwatts.
- 2007‑11‑07:
Cheap USB interfaces for easy prototyping.
- 2007‑11‑06:
UK business taxes for telco infrastructure.
- 2007‑11‑06:
Institutional access to staff and student IT accounts and IT equipment - model policy from JISC.
- 2007‑11‑05:
A few facts concerning GMT, UT, and the RGO.
- 2007‑11‑05:
Leap seconds and how they are handled by meinberg devices and NTP.
- 2007‑11‑05:
What went wrong with the leap second?
- 2007‑11‑05:
KSD solar diode window.
- 2007‑11‑04:
DJB's thoughts on security after ten years of qmail.
- 2007‑11‑04:
Bluffs: BSD logging updated FFS.
- 2007‑11‑04:
Kris Kennaway's FreeBSD 7.0 preview slides.
- 2007‑11‑03:
Can a bayesian spam filter play chess?
- 2007‑11‑02:
Log writer library.
- 2007‑11‑02:
OSSP l2.
- 2007‑11‑02:
log4c.
- 2007‑11‑02:
Malfunctioning central locking system jams other cars' RFID signals.
- 2007‑11‑02:
The daily dose of IETF - summary of document state changes.
- 2007‑11‑02:
Using the ssh agent with Mac OS X Leopard.
- 2007‑11‑01:
The GHC commentary.
- 2007‑11‑01:
ICANN IDN TLD test wiki.
- 2007‑10‑31:
The mathematics of the ISO week calendar.
- 2007‑10‑31:
ISO 8601:2004 in a zip file.
- 2007‑10‑31:
OM NOM NOM NOM
- 2007‑10‑31:
ISO/FDIS 8601:2000.
- 2007‑10‑31:
LJ Brad's halloween costume.
- 2007‑10‑31:
Google UK carbon footprint calculator.
- 2007‑10‑31:
Challenge-response anti-spam systems like TMDA considered harmful.
- 2007‑10‑30:
Git for computer scientists.
- 2007‑10‑29:
More on PMCS.
- 2007‑10‑29:
Post-micturation convulsion syndrome.
- 2007‑10‑29:
The two cultures of mathematics.
- 2007‑10‑29:
Undefined behaviour in Perl and other languages.
- 2007‑10‑29:
In praise of implementation-defined languages.
- 2007‑10‑29:
Nomic: a game of self-amendment.
- 2007‑10‑29:
Jam - software build tool from Perforce.
- 2007‑10‑29:
Rant - flexible, Ruby-based make.
- 2007‑10‑29:
CMake - cross-platform make.
- 2007‑10‑29:
SCons software construction tool.
- 2007‑10‑29:
The Waf build system.
- 2007‑10‑29:
Boost build system v2.
- 2007‑10‑29:
Why the KDE project switched to CMake - and how.
- 2007‑10‑26:
The SPEC Power and Performance Committee is developing the first generation SPEC benchmark for evaluating the power and performance characteristics of volume server class computers.
- 2007‑10‑25:
The Zero Install system.
- 2007‑10‑25:
Mailinator - throwaway email addresses.
- 2007‑10‑25:
1/6th of Library of Congress has been misplaced.
- 2007‑10‑25:
Public svn repository for Alpine snapshots.
- 2007‑10‑25:
L-root IP address change on the ICANN blog.
- 2007‑10‑25:
L.root-servers.net IP address to change on 2007-11-01.
- 2007‑10‑25:
UK academic open source advisory service: MX server survey.
- 2007‑10‑25:
Baltimore County judge rules partial prints are not good enough for murder trials.
- 2007‑10‑25:
Bytelevel two-letter country code world maps.
- 2007‑10‑23:
IERS: on the use of Julian dates.
- 2007‑10‑23:
Simon Josefsson's guidelines for free standards in the IETF.
- 2007‑10‑23:
How not to coerce someone into a confession, and how not to try to cover it up.
- 2007‑10‑23:
JANET mirror of the Spamhaus Zen blacklist.
- 2007‑10‑23:
Zebra barcode reader.
- 2007‑10‑23:
Flash webcam barcode scanner.
- 2007‑10‑22:
McCullagh's law of politics.
- 2007‑10‑22:
Structured programming using processes.
- 2007‑10‑19:
Fusion io - large and fast flash storage for servers.
- 2007‑10‑19:
Asus Eee PC - what RM are reselling as the Minibook.
- 2007‑10‑19:
Zonbu at Wikipedia.
- 2007‑10‑19:
RM Asus Minibook - another Linux appliance, this time aimed at schools.
- 2007‑10‑19:
Zonbu - interesting subscription-based Linux appliance.
- 2007‑10‑18:
Australia successfully questions the masculinity of speeding drivers.
- 2007‑10‑18:
The Vulcan bomber flies again.
- 2007‑10‑17:
GUIdebook.
- 2007‑10‑17:
Nokia N810 pictures.
- 2007‑10‑16:
American lawbreaking: drugs, porn, copyright, immigration.
- 2007‑10‑16:
A history of multi-touch input devices and user interfaces.
- 2007‑10‑15:
The telecommunications perfect storm.
- 2007‑10‑15:
Sun's Project Blackbox - a data centre in a shipping container.
- 2007‑10‑15:
PyGPU - program your GPU with Python.
- 2007‑10‑15:
Tufte-LaTeX.
- 2007‑10‑15:
Fun physics in the game "Portal".
- 2007‑10‑15:
Browsing web 3.0 at 3.0 watts - lots of good mobile technology forecasting.
- 2007‑10‑15:
Map of the Internet including IP addresses on the Spamhaus XBL.
- 2007‑10‑12:
Caja - Javascript object-capability subset.
- 2007‑10‑12:
Updated installer for EDTK+BDB.
- 2007‑10‑12:
Erlang driver toolkit production-quality Berkeley DB interface.
- 2007‑10‑12:
RJK asks about languages with non-nullable reference types.
- 2007‑10‑11:
Steven Pinker writes a good essay about bad language.
- 2007‑10‑11:
Marshall Rose on helicopters and submarines (SIP vs XMPP).
- 2007‑10‑09:
Delegating responsibility in digital systems: Horton's "Who done it?"
- 2007‑10‑09:
Dynamo: Amazon's highly-available key-value store.
- 2007‑10‑08:
Programming models for hybrid CPU/FPGA chips.
- 2007‑10‑08:
The Reduceron - an FPGA machine for executing Haskell.
- 2007‑10‑08:
It's time to stop calling circuits "hardware".
- 2007‑10‑08:
czip - turn data into zlib-compressed C source.
- 2007‑10‑04:
Chad Fowler on the dangers of the big software rewrite.
- 2007‑10‑04:
Colour Lovers - colour trends and palettes.
- 2007‑10‑04:
WellStyled colour scheme generator.
- 2007‑10‑03:
Building an IPv6 router with GNU/Linux.
- 2007‑10‑03:
The Open Group Jericho Forum - arguing against hard-crunchy-outside soft-chewy-inside networks.
- 2007‑09‑30:
Lego Mindstorms firmware development sources.
- 2007‑09‑28:
Brian Candler on IM2000.
- 2007‑09‑28:
Brian Candler on IPv6.
- 2007‑09‑27:
Lua-5.1 test suite.
- 2007‑09‑27:
Invisible college!
- 2007‑09‑26:
Visualizations of the global routing table over time.
- 2007‑09‑26:
Sutton Trust - interesting research into university admissions.
- 2007‑09‑20:
USD and CAD reach parity.
- 2007‑09‑20:
Erlang grammer from erlide.
- 2007‑09‑20:
Principles of language design and evolution, by Bertrand Meyer.
- 2007‑09‑19:
ASCII smiley created 25 years ago today at CMU.
- 2007‑09‑19:
Thirty years later: lessons from the Multics security evaluation.
- 2007‑09‑19:
Giganews's history of Usenet.
- 2007‑09‑18:
RFC 2140: TCP control block interdependence.
- 2007‑09‑17:
Philip Hazel's thoughts on a future MTA, from March 1995.
- 2007‑09‑17:
JANET policy against inappropriate email bounces.
- 2007‑09‑17:
Uniform boilerplate and list processing, or, scrap your scary types.
- 2007‑09‑17:
The unmanaged internet architecture project.
- 2007‑09‑17:
Structured streams: a new transport abstraction.
- 2007‑09‑14:
When piracy is easier than legal purchase.
- 2007‑09‑14:
One sixth of US GDP depends on limitations on copyright holders' exclusive rights.
- 2007‑09‑13:
USPS on suspicious packages.
- 2007‑09‑13:
Too much /proc is bad for you!
- 2007‑09‑11:
Intel's rules for concurrent / multicore programming.
- 2007‑09‑11:
Mike Dimmick's notes on parsing C++.
- 2007‑09‑11:
Meta-compilation for C++.
- 2007‑09‑11:
A key indicator for bubbles.
- 2007‑09‑11:
An introduction to Ten15 - a personal retrospective.
- 2007‑09‑10:
Cory Doctorow on DRM (3) Pushing the impossible.
- 2007‑09‑10:
Cory Doctorow on DRM (2) Don't fall for the Potemkin scam.
- 2007‑09‑10:
Cory Doctorow on DRM (1) Copy Killers.
- 2007‑09‑10:
When cute acronyms go too far...
- 2007‑09‑07:
Storm botnet attacks security researchers that probe it.
- 2007‑09‑07:
A no-frills introduction to the Lua VM.
- 2007‑09‑07:
SMS FoxBox - Linux embedded micro Web server and SMS gateway.
- 2007‑09‑07:
Russian nuclear-powered lighthouses to be replaced.
- 2007‑09‑06:
XHTML-only interface to GMail.
- 2007‑09‑05:
Wellsolved environmentally-aware property maintenance.
- 2007‑09‑05:
Someone petitions the Prime Minister to Outlaw social networking sites to assist the fight against crime.
- 2007‑09‑04:
LinuxBIOS on AMD Geode platforms (including OLPC and ThinCan).
- 2007‑09‑04:
Expert-TW StarBox product page.
- 2007‑09‑04:
StarBox / TinyTuxBox manual.
- 2007‑09‑04:
Transtec AMD Geode LX800 thin client.
- 2007‑09‑04:
Artec ThinCan - AMD Geode computers.
- 2007‑09‑04:
Linutop - ThinCan resellers.
- 2007‑09‑04:
TinyTuxBox 4 - small cheap AMD GX2-466 computer.
- 2007‑09‑04:
Picotux - the smallest Linux computer in the world.
- 2007‑09‑04:
Pico-ITX PC motherboards.
- 2007‑09‑04:
Eurostar UK rail speed record - 335km/h.
- 2007‑09‑04:
Paris to London Eurostar speed record.
- 2007‑09‑03:
SML and O'Caml, side-by-side.
- 2007‑09‑03:
Communicating sequential processes - online edition of the book by C.A.R.Hoare.
- 2007‑09‑03:
Chumby.
- 2007‑08‑30:
Open source licences are contracts.
- 2007‑08‑29:
Phidgets - simple USB IO adapters.
- 2007‑08‑24:
Beyond pretty-printing: galley concepts in document formatting combinators.
- 2007‑08‑24:
Stefano Mazzocchi on version control architectures, git vs svn, and the fear of displacing innovation.
- 2007‑08‑23:
Luca Cardelli was an accidental Simula user.
- 2007‑08‑23:
BarCamb.
- 2007‑08‑23:
Higher-order and typed "HOT" pickles in Alice ML.
- 2007‑08‑22:
Efficient manipulation of binary data using pattern matching in Erlang.
- 2007‑08‑22:
Applications, implementation and performance evaluation of bit stream programming in Erlang.
- 2007‑08‑22:
Ada 95 representation items.
- 2007‑08‑22:
A bit syntax package for Haskell.
- 2007‑08‑20:
Spamford Wallace gets sued yet again.
- 2007‑08‑20:
Thirteen things to avoid in a blog.
- 2007‑08‑16:
DHTML hyperlinked grammars for C#, Haskell, O'Caml.
- 2007‑08‑15:
"Customer-arranged collection" for deliveries from UK to Falkland Islands?!
- 2007‑08‑14:
Tiny threads - a tour of the code.
- 2007‑08‑14:
Miranda prototypes in C (2).
- 2007‑08‑14:
Miranda prototypes in C (1).
- 2007‑08‑14:
Miranda methods in Java.
- 2007‑08‑14:
Robodoc - language-independent in-source documentation extractor.
- 2007‑08‑14:
ICANN request for information on domain tasting.
- 2007‑08‑14:
BAARF: the battle against any RAID five four or f-three.
- 2007‑08‑14:
2007 iMac disassembly.
- 2007‑08‑14:
Bit-level binaries and generalized comprehensions in Erlang (full paper).
- 2007‑08‑13:
Microsoft Windows "fibers".
- 2007‑08‑13:
On compact routing for the Internet.
- 2007‑08‑13:
Endpoints and endpoint names: a proposed enhancement to the internet architecture.
- 2007‑08‑10:
Simulated annealing for interpreter optimization.
- 2007‑08‑10:
Friendly copy and paste with xterm.
- 2007‑08‑10:
Avahi mDNS implementation for Linux.
- 2007‑08‑09:
Why numbering should start at zero.
- 2007‑08‑09:
Tatham's device.
- 2007‑08‑08:
Safe serialization under mutual suspicion.
- 2007‑08‑07:
A lisp machine with very compact programs.
- 2007‑08‑07:
ACM history of programming languages conferences.
- 2007‑08‑07:
ACM HOPL I proceedings.
- 2007‑08‑07:
ACM HOPL II proceedings.
- 2007‑08‑07:
ACM HOPL III proceedings.
- 2007‑08‑07:
Levine the genius programming language designer.
- 2007‑08‑06:
Hazard pointers: safe memory reclamation for lock-free objects.
- 2007‑08‑06:
Non-blocking hash tables with open addressing.
- 2007‑08‑06:
A lock-free hash table for Java.
- 2007‑08‑06:
Mythic Beasts Mac Mini and Apple TV dedicated servers.
- 2007‑08‑06:
We the undersigned petition the Prime Minister to enforce the existing UK law on marketing and labelling of infant formula.
- 2007‑08‑06:
Paul Graham on having too much stuff.
- 2007‑08‑06:
100% easy-2-read web pages.
- 2007‑08‑03:
Dot-local lookup configurator for Mac OS X - for compatibility between multicast DNS and standard DNS.
- 2007‑08‑03:
Microsoft's domain naming recommendations for their Small Business Server.
- 2007‑08‑02:
"The only moral abortion is my abortion" - when the anti-choice choose.
- 2007‑08‑01:
Musical solid-state tesla coils.
- 2007‑08‑01:
C++ compiler exception support.
- 2007‑08‑01:
Radical statistics.
- 2007‑08‑01:
Sendmail meets Erlang: experiences using Erlang for email applications.
- 2007‑07‑31:
Lotus Notes user interface hall of shame.
- 2007‑07‑27:
Bill Kinnersley's language list.
- 2007‑07‑27:
A dictionary of programming languages.
- 2007‑07‑27:
Videos of TUG 2007.
- 2007‑07‑27:
A book of Lua programming gems.
- 2007‑07‑27:
Will the real "end-to-end principle" please stand up?
- 2007‑07‑27:
The design philosophy of the DARPA Internet protocols.
- 2007‑07‑25:
The pure pattern calculus.
- 2007‑07‑25:
View patterns: lightweight views for Haskell.
- 2007‑07‑25:
LOOP: Lua object-oriented programming library.
- 2007‑07‑25:
Details of the iPhone / WiFi / Duke / Cisco ARP flood bug.
- 2007‑07‑25:
Type inference for first-class messages with match functions.
- 2007‑07‑25:
The third manifesto.
- 2007‑07‑25:
Notes on how to design a programming language.
- 2007‑07‑25:
Some links to interesting programming language research.
- 2007‑07‑24:
Communicating process architecture for multicores.
- 2007‑07‑24:
Xmos tips software-defined silicon.
- 2007‑07‑23:
Optimizing pattern matching in O'Caml.
- 2007‑07‑23:
ML pattern match compilation and partial evaluation.
- 2007‑07‑23:
SML/NJ match compiler notes.
- 2007‑07‑23:
Tree pattern matching for ML.
- 2007‑07‑23:
When do match-compilation heuristics matter?
- 2007‑07‑22:
Fast string matching on the GPU.
- 2007‑07‑20:
Building effective enterprise distributed software systems.
- 2007‑07‑20:
Chromatic's criteria for the world's most maintainable programming language.
- 2007‑07‑20:
Hotmail fails to deliver up to 81% of messages with attachments.
- 2007‑07‑20:
Puppet best practice, from Stanford.
- 2007‑07‑20:
Laws of software development.
- 2007‑07‑19:
Charles Miller describes email quoting as a design pattern.
- 2007‑07‑19:
John Gruber on top.
- 2007‑07‑19:
Dave Cridland on the crap security of iPhone / Yahoo! email.
- 2007‑07‑18:
Rainbow's End, by Vernor Vinge.
- 2007‑07‑18:
What American conservatives say when they think the rest of us aren't listening.
- 2007‑07‑18:
Why David Mundie loves gema.
- 2007‑07‑18:
Gema: general-purpose macro processor, with Lua hooks.
- 2007‑07‑18:
The ML/1 macro processor.
- 2007‑07‑18:
Nokia 770 internet tablet going cheap!
- 2007‑07‑18:
iGo Stowaway Bluetooth keyboard going cheap!
- 2007‑07‑18:
PerlHP is an attempt to give Perl the same simplicity and hackiness that PHP has spent years trying to forget.
- 2007‑07‑18:
"Incandescence" by Greg Egan to be published May 2008.
- 2007‑07‑17:
PseudoPOD: O'Reilly's markup language for perl books.
- 2007‑07‑17:
Top-down operator precedence: Javascript-in-Javascript.
- 2007‑07‑17:
Seeing Yellow - against colour laser printer watermarks.
- 2007‑07‑17:
Running Pine on the Nokia 770.
- 2007‑07‑16:
Possible Cambridge congestion charging zone map.
- 2007‑07‑16:
Live code upgrades in Erlang.
- 2007‑07‑14:
Anti-war quotes.
- 2007‑07‑13:
How to disable the Mac OS X Dashboard.
- 2007‑07‑13:
Another Lua Cairo binding.
- 2007‑07‑13:
Lua Cairo.
- 2007‑07‑13:
Environmental Justice Foundation round-table on sustainable cotton.
- 2007‑07‑13:
Continental Clothing (wholesale blank t-shirts) and Uzbekistan.
- 2007‑07‑13:
C.A.R.Hoare's hints on programming language design.
- 2007‑07‑13:
Online bibliography of Haskell research.
- 2007‑07‑12:
How to test high voltage capacitors.
- 2007‑07‑12:
Petrol consumption per day, US vs. other countries.
- 2007‑07‑11:
On the security of digital tachographs.
- 2007‑07‑11:
Cambridge OpenGuide wiki.
- 2007‑07‑11:
Lua-ML: embedding an interpreted language using higher-order functions and types.
- 2007‑07‑11:
Rapid case dispatch in Scheme.
- 2007‑07‑11:
An attempt to improve text rasterization algorithms using only publicly available information.
- 2007‑07‑09:
Simply easy! (An implementation of a dependently typed lambda calculus.)
- 2007‑07‑08:
Why the gods are not winning.
- 2007‑07‑07:
In-program backtraces with glibc.
- 2007‑07‑06:
Tail recursive stack disciplines for an interpreter.
- 2007‑07‑06:
Design patterns as higher order datatype generic programs.
- 2007‑07‑06:
Interview with Terrence Parr.
- 2007‑07‑06:
Tutorial on good lisp programming style.
- 2007‑07‑06:
The doctrine of the feline sedentation.
- 2007‑07‑06:
A science fiction author asks, how would you explain World of Warcraft advertising hacks to someone thirty years ago?
- 2007‑07‑06:
Self-righting objects.
- 2007‑07‑05:
A correspondence between continuation passing style and static single assignment form.
- 2007‑07‑05:
SSA is functional programming.
- 2007‑07‑05:
Optimizing nested loops using local CPS transformation.
- 2007‑07‑05:
Beware of the Turing tar-pit.
- 2007‑07‑05:
A technical overview of Microsoft's common language runtime.
- 2007‑07‑05:
Harlequin / Ravenbrook memory pool system.
- 2007‑07‑05:
The memory management reference.
- 2007‑07‑05:
Comprehensive comprehensions: comprehensions with "order by" and "group by".
- 2007‑07‑04:
Composing contracts / how to write a financial contract - Simon Peyton Jones and Jean-Marc Eber (founder of LexiFi).
- 2007‑07‑04:
LexiFi FAQ - describes the Modelling Language for Finance (MLFi).
- 2007‑07‑04:
Haskell vs Erlang reloaded.
- 2007‑07‑03:
A performance comparison of judy to hash tables.
- 2007‑07‑03:
A cool and practical alternative to traditional hash tables.
- 2007‑07‑03:
Cuckoo hashing for undergraduates.
- 2007‑07‑03:
Cuckoo hashing.
- 2007‑07‑03:
WTFPL.
- 2007‑07‑03:
Email chain re: the Vernon Wilkes explosion.
- 2007‑07‑02:
Face your pockets!
- 2007‑06‑30:
Giant microwave oven turns plastic back into oil.
- 2007‑06‑28:
What the heck is electronic mail?
- 2007‑06‑27:
Lua code for traversing all live objects.
- 2007‑06‑26:
Towards dependency-agnostic upgrades in distributed systems.
- 2007‑06‑25:
Viewing American class divisions through Facebook and MySpace.
- 2007‑06‑25:
A type system for bounded space and functional in-place update.
- 2007‑06‑23:
Functional pearl: inverting the Burrows-Wheeler transform.
- 2007‑06‑22:
Arsehole-driven development.
- 2007‑06‑21:
Mark Mayo explains why CGI, FastCGI, SCGI, etc. should be abandoned in favour of HTTP.
- 2007‑06‑21:
Distributed computing economics.
- 2007‑06‑21:
Whose name is it? Name ownership and databases.
- 2007‑06‑21:
Curvy tube map by Maxwell Roberts.
- 2007‑06‑20:
ABNF (superset) parser generator.
- 2007‑06‑20:
Japanese live-action tetris.
- 2007‑06‑20:
Dynamic Demand - the frequency of the UK national grid.
- 2007‑06‑19:
ISO EBNF.
- 2007‑06‑19:
The garbage collection mailing list.
- 2007‑06‑19:
Typesetting with the Linotype in 1960.
- 2007‑06‑19:
Python 3000 status update.
- 2007‑06‑18:
SFSlite is a stripped-down version of the SFS asynchronous development libraries.
- 2007‑06‑16:
The collapse of the Soviet Union: selling oil to buy wheat doesn't work when oil is too cheap.
- 2007‑06‑15:
Abject-oriented programming.
- 2007‑06‑15:
Accelerating OpenSSH connections with ControlMaster.
- 2007‑06‑15:
Karmasphere VisiBL blacklist visualization system.
- 2007‑06‑14:
Cache-oblivious data structures.
- 2007‑06‑14:
First measels death in UK after 14 years.
- 2007‑06‑14:
JANET outages.
- 2007‑06‑14:
Cambridgeshire beekeepers association.
- 2007‑06‑14:
LuaTeX is an extended version of pdfTeX using Lua as an embedded scripting language.
- 2007‑06‑14:
TypEr: A type annotator for Erlang code.
- 2007‑06‑13:
Optimising TCP/IP connectivity: An exploratory study in network-intensive Erlang systems.
- 2007‑06‑12:
Lambda-the-ultimate discusses C++.
- 2007‑06‑12:
A functional description of TeX's formula layout algorithm.
- 2007‑06‑12:
The self-pipe trick.
- 2007‑06‑12:
Turing completeness considered harmful: component programming with a simple language.
- 2007‑06‑12:
Islands and lakes.
- 2007‑06‑11:
Open source Xara.
- 2007‑06‑11:
History of Computer Concepts / Xara.
- 2007‑06‑11:
Monty Python does HTTP authentication.
- 2007‑06‑10:
The tao of programming.
- 2007‑06‑10:
Frisby - parsing expression grammars for Haskell.
- 2007‑06‑10:
LPeg - parsing expression grammars for Lua.
- 2007‑06‑10:
Packrat parsing and Parsing Expression Grammars (PEGs).
- 2007‑06‑09:
ECMAscript 4 (JavaScript 2) specification and refeerence implementation.
- 2007‑06‑08:
Seed7: the extensible programming language.
- 2007‑06‑08:
Send-receive considered harmful: Myths and realities of message passing.
- 2007‑06‑08:
Evaluating high-level distributed language constructs.
- 2007‑06‑08:
Chilled cider warms lido.
- 2007‑06‑08:
David Korn's shell coding guidelines.
- 2007‑06‑08:
Solaris shell coding style.
- 2007‑06‑08:
EASTL: Electronic Arts C++ (non)standard template library.
- 2007‑06‑08:
You can't make cheese from human milk because it does not curdle.
- 2007‑06‑08:
A physics teacher complains about the destruction of the science GCSE syllabus.
- 2007‑06‑07:
How UK Internet censorship works (or fails to).
- 2007‑06‑07:
Home Office moving towards Internet censorship in the UK.
- 2007‑06‑07:
Can the suspect tell his story backwards? If not, he's lying.
- 2007‑06‑07:
Cycling in London.
- 2007‑06‑07:
How lucrative domain parking can be.
- 2007‑06‑07:
The art of wikigroaning.
- 2007‑06‑06:
Effects of adding water to whisky.
- 2007‑06‑06:
Promotion of unhealthy baby food in the Philippines by western governments.
- 2007‑06‑06:
Lrexlib is a Lua binding of POSIX and PCRE regular expression libraries.
- 2007‑06‑06:
Elite - text adventure version.
- 2007‑06‑06:
The landscape of parallel computing research: a view from Berkeley.
- 2007‑06‑06:
Merrimac - Stanford streaming supercomputer project.
- 2007‑06‑06:
Brook for GPUs is a compiler and runtime implementation of the Brook stream program language for modern graphics hardware.
- 2007‑06‑06:
Popular girls' names.
- 2007‑06‑06:
Popular boys' names.
- 2007‑06‑05:
Pregnancy and unscientific advice.
- 2007‑06‑05:
"The Depot": JISC national online academic publication repository.
- 2007‑06‑05:
Scheme-to-Erlang compiler.
- 2007‑06‑05:
An amusing way to get the sack.
- 2007‑06‑05:
Automated white-box fuzz testing.
- 2007‑06‑05:
Ray Bradbury claims Fahrenheit 451 is not about censorship. (!)
- 2007‑06‑05:
Crackpot checklist.
- 2007‑06‑05:
Evolving a language in and for the real world: C++ 1991-2006.
- 2007‑06‑04:
Doctors change the way they think about death.
- 2007‑06‑04:
London 2012 olympics logo.
- 2007‑06‑04:
ACM curricula recommendations.
- 2007‑06‑04:
Sophos global headquarters in Abingdon.
- 2007‑06‑04:
London 2012 olympics logo.
- 2007‑06‑04:
Inside Google's search quality department.
- 2007‑06‑04:
Jack Straw guilty of "treating" (electoral corruption).
- 2007‑06‑04:
Skoda Fabia cake ad.
- 2007‑06‑04:
Termite is an Erlang-like distributed programming system written in Scheme.
- 2007‑06‑04:
Compiling Erlang to Scheme.
- 2007‑06‑04:
Distributing requests for DNS service using GNU Zebra, ISC BIND 9 and FreeBSD.
- 2007‑06‑04:
London 2012 olympics logo.
- 2007‑06‑01:
LOLsingularity.
- 2007‑06‑01:
LOLpoets.
- 2007‑05‑31:
What's wrong with doctors.
- 2007‑05‑31:
How to get good science.
- 2007‑05‑31:
LambdaVM - a JVM backend for GHC.
- 2007‑05‑31:
Real world Haskell - the web site of the book.
- 2007‑05‑30:
Patch to improve enhanced USB keyboard support in FreeBSD.
- 2007‑05‑30:
Microsoft enhanced keyboard notes.
- 2007‑05‑30:
Microsoft USB HID to PS/2 key code mapping.
- 2007‑05‑30:
Top ten weirdest keyboards ever.
- 2007‑05‑29:
LOLcode.
- 2007‑05‑29:
A strange home-made keyboard.
- 2007‑05‑29:
Engineering a sort function.
- 2007‑05‑29:
Dylan programming.
- 2007‑05‑29:
The Dylan reference manual.
- 2007‑05‑28:
Practical Common Lisp.
- 2007‑05‑28:
Common Lisp: a gentle introduction to symbolic computation.
- 2007‑05‑28:
"On Lisp" online.
- 2007‑05‑28:
Languages for programming the JVM.
- 2007‑05‑25:
Revctrl wiki, for discussion about revision control systems.
- 2007‑05‑25:
Low MMR vaccination leads to lots of measels in Coventry.
- 2007‑05‑25:
Increasing the efficiency of quicksort.
- 2007‑05‑25:
Optimal sorting of 5 objects with 7 comparisons.
- 2007‑05‑25:
Can you sort five objects with seven comparisons?
- 2007‑05‑25:
Introduction to the Puppet configuration manager.
- 2007‑05‑25:
The SNOBOL4 programming language.
- 2007‑05‑24:
Where is the centre of London?
- 2007‑05‑22:
A brief look at C++0X.
- 2007‑05‑22:
Keyboard vs. mouse (part 3).
- 2007‑05‑22:
Keyboard vs. mouse (part 2).
- 2007‑05‑22:
Keyboard vs. mouse (part 1).
- 2007‑05‑22:
First principles of interaction design.
- 2007‑05‑19:
Beat the stock market using good customer service.
- 2007‑05‑18:
Ontology is overrated and tagging is the future.
- 2007‑05‑18:
How to print floating point numbers accurately.
- 2007‑05‑18:
How to read floating point numbers accurately.
- 2007‑05‑18:
Making a film using CCTV and the Data Protection Act.
- 2007‑05‑18:
No organic hives lost to bee colony collapse syndrome?
- 2007‑05‑18:
"These come from trees" stickers.
- 2007‑05‑17:
Sparkling wine in a can.
- 2007‑05‑16:
Source repository formats matter.
- 2007‑05‑16:
Lua quick ref.
- 2007‑05‑15:
Creative business card designs.
- 2007‑05‑15:
Pictures of Mirny diamond mine.
- 2007‑05‑15:
Mirny diamond mine.
- 2007‑05‑15:
Some interesting keyboards.
- 2007‑05‑15:
John Graham-Cumming on France's national Signal Spam service.
- 2007‑05‑15:
Living in the presence.
- 2007‑05‑15:
So you want to learn Japanese...
- 2007‑05‑15:
Why Chinese is so damn hard.
- 2007‑05‑15:
Direct Cambridge-Paris rail link on track for success.
- 2007‑05‑14:
Distributed multihead X.
- 2007‑05‑14:
I'm in Ur... (2)
- 2007‑05‑14:
I'm in Ur... (1)
- 2007‑05‑14:
Charlie Stross on lifelogging.
- 2007‑05‑14:
Lua helper threads.
- 2007‑05‑13:
VMS cluster uptimes.
- 2007‑05‑13:
LuaTask.
- 2007‑05‑13:
Pretty dirty tops.
- 2007‑05‑13:
Twelve steps to Scala.
- 2007‑05‑13:
Martin's completely perfect language.
- 2007‑05‑11:
ColourBrewer - online tool for choosing colour schemes for data graphics.
- 2007‑05‑11:
A 3D fabricator that makes objects from sugar.
- 2007‑05‑10:
What an anti-spam doorbell from 1933 teaches us about email spam.
- 2007‑05‑10:
How not to praise your kids.
- 2007‑05‑10:
Spamtrap.
- 2007‑05‑09:
Uri Geller counter-sued for bogus copyright takedown demand.
- 2007‑05‑09:
Robots are a soldier's best friend.
- 2007‑05‑09:
Bit-level binaries in Erlang, including a very cute uudecode one-liner.
- 2007‑05‑08:
A graphical notation for the lambda calculus with animated reduction.
- 2007‑05‑08:
Alligators and eggs.
- 2007‑05‑08:
Copas: coroutine oriented portable asynchronous services for Lua.
- 2007‑05‑08:
Coplex: Lua co-operative multiplexing.
- 2007‑05‑08:
LuaEvent.
- 2007‑05‑08:
LuaJIT.
- 2007‑05‑07:
Equal rights for functional objects, or, the more things change, the more they are the same.
- 2007‑05‑06:
BEST waffle iron EVAR.
- 2007‑05‑06:
A collection of functional pearls.
- 2007‑05‑06:
Lehrer's elements, including the as-yet-to-be-discuvered ones.
- 2007‑05‑06:
Form 1040 schedule CI - income from academic conflict of interest.
- 2007‑05‑06:
The McNamara fallacy.
- 2007‑05‑06:
Jim Horning's beard.
- 2007‑05‑05:
Threads and IO in the synthesis kernel.
- 2007‑05‑05:
The synthesis kernel.
- 2007‑05‑04:
Steve Yegge: the next big language.
- 2007‑05‑02:
A group is its own worst enemy.
- 2007‑05‑01:
Learning quickly when irrelevant attributes abound: A new linear-threshold algorithm.
- 2007‑05‑01:
Combining winnow and orthogonal sparse bigrams for incremental spam filtering.
- 2007‑05‑01:
Quantum crypto broken.
- 2007‑04‑30:
The implementation of functional programming languages.
- 2007‑04‑30:
Implementing functional languages: a tutorial.
- 2007‑04‑30:
Notes on optimizing "ditionaries" (hash tables) in the Python source.
- 2007‑04‑30:
Teaching real-time programming using model trains.
- 2007‑04‑30:
Elsa is a C and C++ parser.
- 2007‑04‑30:
Is a fungus the cause of bee colony collapse disorder?
- 2007‑04‑30:
Hedge funds and institutional investors funding patent trolls.
- 2007‑04‑30:
OECD broadband statistics to December 2006.
- 2007‑04‑30:
The general-purpose storage revolution.
- 2007‑04‑30:
A layman's guide to a subset of ASN.1, BER, and DER.
- 2007‑04‑30:
LOL geeks.
- 2007‑04‑30:
Ceph - petabyte-scale distributed storage.
- 2007‑04‑26:
Proect Honeypot - five days of announcements.
- 2007‑04‑25:
Highly automated RAID box.
- 2007‑04‑25:
Links to reviews of The Execution Channel by Ken Macleod.
- 2007‑04‑25:
Adventures of a functional programmer on Wall Street.
- 2007‑04‑25:
Let's cut to the chase.
- 2007‑04‑19:
draft-fanf-smtp-quickstart-a-00
- 2007‑04‑19:
draft-fanf-smtp-quickstart-b-00
- 2007‑04‑18:
WTF! Little children get arrested in Florida.
- 2007‑04‑18:
Changes to jemalloc.
- 2007‑04‑18:
Roads are for bikes too.
- 2007‑04‑17:
Useless cat.
- 2007‑04‑17:
Resources for Cambridge parents.
- 2007‑04‑17:
FreeBSD revision control requirements.
- 2007‑04‑17:
Mozilla revision control requirements.
- 2007‑04‑16:
Encapsulating plurality.
- 2007‑04‑16:
Optimizing dynamically-typed object-oriented languages with polymorphic inline caches.
- 2007‑04‑15:
History of the Emerald programming language.
- 2007‑04‑15:
"Type" is not a type.
- 2007‑04‑15:
Anatomy of a click-fraud bot.
- 2007‑04‑15:
15-year-old jailed for 12 days because of US DST confusion.
- 2007‑04‑15:
Little fingers keyboard.
- 2007‑04‑15:
My first keyboard.
- 2007‑04‑15:
When the CRC and the TCP checksum disagree.
- 2007‑04‑13:
Bill Gates wanted ACPI to be Windows-specific.
- 2007‑04‑12:
What do you get if you cross Ubuntu with Solaris?
- 2007‑04‑12:
ARC - adaptive replacement cache - balances most-frequently-used and most-recently-used.
- 2007‑04‑12:
"Technical debt" and "technical inflation".
- 2007‑04‑12:
ZFS the movie, starring Bart Simpson as Jeff Bonwick.
- 2007‑04‑12:
Why ZFS matters to Mac users.
- 2007‑04‑12:
Otterly silly.
- 2007‑04‑12:
LEGO digital designer.
- 2007‑04‑12:
The solution to C++ threading is Erlang.
- 2007‑04‑12:
Hamster shredder.
- 2007‑04‑11:
Cambridge University Library's tower stands 157 feet tall, six feet shorter than the top of St John's College Chapel and ten feet taller than the peak of King's College Chapel.
- 2007‑04‑11:
Gnome Mail Notification icon, with IMAP IDLE support.
- 2007‑04‑11:
draft-fanf-smtp-quickstart-01
- 2007‑04‑11:
Ski down the longest escalator in Europe.
- 2007‑04‑11:
6502 compatible compiler and emulator in javascript.
- 2007‑04‑11:
Dr Aas is an advocate of faecal bacteriotherapy.
- 2007‑04‑10:
SMS spam in Ireland.
- 2007‑04‑10:
Apache gets stroppy with Sun about Java open licensing.
- 2007‑04‑10:
Neat home-made chain reaction video.
- 2007‑04‑06:
ZFS is now part of FreeBSD.
- 2007‑04‑06:
Nix is a purely functional package manager.
- 2007‑04‑06:
FizzBuzz implemented in C++ templates.
- 2007‑04‑05:
"Daylight saving" fails to save energy in the US, just like Oz.
- 2007‑04‑05:
Pixelator.
- 2007‑04‑04:
A con as big as the Ritz.
- 2007‑04‑04:
Karen Spärck Jones (26 August 1935 - 4 April 2007).
- 2007‑04‑04:
draft-fanf-smtp-quickstart-00
- 2007‑04‑03:
Best games by UCSC "intro to game design" students.
- 2007‑04‑03:
Vista's code signing compromised - the return of the boot sector virus?
- 2007‑04‑02:
Google seppuku.
- 2007‑04‑02:
JavaScript hijacking.
- 2007‑04‑02:
Alexander Sotirov presents a JavaScript library with functions for setting up the heap in a controlled state before triggering a heap corruption bug. This allows him to exploit very difficult heap corruption vulnerabilities with great reliability and precision.
- 2007‑04‑02:
Email outage at MIT.
- 2007‑04‑02:
Hume (Higher-order Unified Meta-Environment) is a strongly typed, mostly-functional language for concurrent, real-time, safety-critical systems.
- 2007‑04‑02:
Information software and the graphical interface.
- 2007‑03‑31:
xmpp4moz.
- 2007‑03‑30:
Successor-ML.
- 2007‑03‑30:
Cambridge JANET traffic accounting data - email uses 3% of the University's bandwidth.
- 2007‑03‑29:
Support for PEP in ejabberd.
- 2007‑03‑29:
Comparison of the concurrency concepts of Ada, Chill, Erlang, and Java.
- 2007‑03‑29:
Description and comparision of the concurrency concepts of Ada, Java and CHILL.
- 2007‑03‑29:
Erlang flexible process registry.
- 2007‑03‑29:
Googlephone press release.
- 2007‑03‑28:
Microsoft Windows 2000 TCP/IP implementation details.
- 2007‑03‑28:
TCP over WAN performance tuning and troubleshooting.
- 2007‑03‑27:
I just found out that EastNet (i.e. Cambridge) now has an uplink to Leeds as well as London.
- 2007‑03‑27:
The effect of file sharing on record sales: an empirical analysis.
- 2007‑03‑27:
Liability of ISPs for third-party material.
- 2007‑03‑27:
The UK's e-commerce regulations.
- 2007‑03‑27:
OUCS cleartext email shutdown.
- 2007‑03‑27:
del.icio.us and academic research.
- 2007‑03‑27:
The world's most important 6-second drum loop - the "amen" break.
- 2007‑03‑26:
Why security is hard - an economic perspective.
- 2007‑03‑26:
RFC humo(u)r.
- 2007‑03‑26:
How Emily tamed the Caml - Emily is a subset of OCaml that uses a design rule verifier to enforce object-capability principles.
- 2007‑03‑24:
Stanford University wins lawsuit against James Joyce's copyright ghouls.
- 2007‑03‑23:
Borderware IP address reputation database.
- 2007‑03‑23:
Watford Electronics is no more.
- 2007‑03‑23:
Martin Keegan's obituary of Chris Lightfoot.
- 2007‑03‑23:
Dutch government blackmailed by e-voting manufacturer.
- 2007‑03‑22:
Alternative software development.
- 2007‑03‑22:
What every computer scientist should know about floating point.
- 2007‑03‑21:
Simon Schubert's simple stub unix mailer.
- 2007‑03‑20:
Video of Luminox - the Oxford fire art festival.
- 2007‑03‑20:
Connecting web spammers with advertisers.
- 2007‑03‑20:
The Nullarbor Nymph.
- 2007‑03‑20:
Auralex Acoustics is the industry leader in acoustical treatment products.
- 2007‑03‑20:
Class and web design.
- 2007‑03‑20:
Fantastic anti-spam story.
- 2007‑03‑18:
Stupid email disclaimers.
- 2007‑03‑18:
Google Gapminder World 2006.
- 2007‑03‑18:
Gapminder applications.
- 2007‑03‑17:
The PSYC developers on XML.
- 2007‑03‑17:
The PSYC developers on Jabber.
- 2007‑03‑16:
Torben Mogensen's "basics of compiler design".
- 2007‑03‑16:
Isn't it alanic ... dontcha think?
- 2007‑03‑16:
"Pith Helmet" ad blocker for Safari.
- 2007‑03‑16:
"Saft" adds lots of features to Safari.
- 2007‑03‑16:
"Pith" Safari crash recovery tool.
- 2007‑03‑16:
Enable the Safari debug menu.
- 2007‑03‑16:
"Microsoft is not a security company. Security is important, but it's just a little part of Microsoft." -- Arno Edelmann, Microsoft's European business security product manager.
- 2007‑03‑16:
Orwell on "politics and the English language".
- 2007‑03‑16:
Knuth on "mathematical writing".
- 2007‑03‑16:
"Considered harmful" essays considered harmful.
- 2007‑03‑16:
Twitter growth graph from Alexaholic.
- 2007‑03‑16:
Geomerics "Enlighten" real-time radiosity demo. (YouTube)
- 2007‑03‑16:
Accessible train timetables.
- 2007‑03‑16:
Real-world DRM.
- 2007‑03‑16:
Obituary of Chris Lightfoot in The Times.
- 2007‑03‑14:
Markus Kuhn on academic publication.
- 2007‑03‑14:
The primary component of [SPEC CPU 2006 perlbench] is the Open Source spam checking software SpamAssassin.
- 2007‑03‑14:
Wrongfully imprisoned? You still have to pay for your stay.
- 2007‑03‑13:
Scalable statistical bug isolation.
- 2007‑03‑13:
Network partitions and Erlang/OTP.
- 2007‑03‑13:
Pirahã Exceptionality: a Reassessment.
- 2007‑03‑12:
Beautiful code: leading programmers explain how they think. (Amazon)
- 2007‑03‑12:
My Twitter page.
- 2007‑03‑12:
Open source at Joost.
- 2007‑03‑12:
Ejabberd + jwchat.
- 2007‑03‑11:
Juggling in a gravity well.
- 2007‑03‑11:
Juggling in a cone.
- 2007‑03‑09:
Microsoft customers melting down over daylight saving patches.
- 2007‑03‑09:
stunserver.org
- 2007‑03‑09:
GTalk-to-VoIP.
- 2007‑03‑09:
libjingle includes a STUN server.
- 2007‑03‑09:
Vovida STUN server.
- 2007‑03‑08:
SEC cracks down on spam-driven small stocks.
- 2007‑03‑08:
Disk failures in the real world: what does an MTTF of 1,000,000 hours mean to you?
- 2007‑03‑07:
Alternative keyboards listed by the adaptive technology for information and computing group at MIT.
- 2007‑03‑06:
Using packet symmetry to curtail malicious traffic.
- 2007‑03‑06:
Nigerian dead parrot sketch.
- 2007‑03‑06:
Encouraging people towards piracy.
- 2007‑03‑05:
No2ID obituary of Chris Lightfoot.
- 2007‑03‑05:
MySociety obituary of Chris Lightfoot.
- 2007‑03‑05:
Chris Lightfoot 1978-2007.
- 2007‑03‑05:
Tim O'Reilly: Concurrent programming: Erlang, Haskell...and XSLT.
- 2007‑03‑04:
Programming Erlang - software for a concurrent world - Joe Armstrong.
- 2007‑03‑01:
Metalua - language extensions in and for Lua.
- 2007‑02‑28:
Economic controls for corporate intranet junk email?
- 2007‑02‑28:
Walking times between tube stations in zone 1.
- 2007‑02‑27:
Veniamin's human slinky.
- 2007‑02‑27:
"Beamer" is a LaTeX class that allows you to create presentation slides and handouts.
- 2007‑02‑27:
LaTeX links from CUED.
- 2007‑02‑27:
MailChannels server survey, reported in O'Reilly SysAdmin magazine.
- 2007‑02‑27:
Dan Shearer's MTA comparison.
- 2007‑02‑27:
Mail server survey, April 2003.
- 2007‑02‑27:
Mail server survey, April 2004.
- 2007‑02‑27:
The Cray XMT platform can scale to a system with over 8000 processors providing over one million simultaneous threads and 128 terabytes of shared memory.
- 2007‑02‑27:
Children swimming with polar bears.
- 2007‑02‑26:
Interlocking 3D puzzles.
- 2007‑02‑23:
Failure trends in Google's large disk drive population.
- 2007‑02‑22:
An SMTP proxy written in Perl.
- 2007‑02‑22:
Ejabberd module API documentation.
- 2007‑02‑20:
Autoyast documentation.
- 2007‑02‑20:
Canadian time zone anomalies.
- 2007‑02‑20:
Hied-emailadmin list archives.
- 2007‑02‑20:
MX server survey - Exim at number 3!
- 2007‑02‑20:
See-through car.
- 2007‑02‑20:
MS Exchange and its catastrophic handling of the USA DST rule change.
- 2007‑02‑19:
Darwin Calendar Server.
- 2007‑02‑16:
Office boaties.
- 2007‑02‑15:
Music industry executives don't like DRM.
- 2007‑02‑14:
Wired magazine on Bitfrost.
- 2007‑02‑14:
OLPC security architecture: "Bitfrost".
- 2007‑02‑14:
Threading in JavaScript 1.7.
- 2007‑02‑14:
Linux syslets - generic async chained syscalls.
- 2007‑02‑14:
Hennesy & Patterson talking about trends in computer architecture.
- 2007‑02‑14:
Brendan Eich says threads suck.
- 2007‑02‑14:
No news is good news.
- 2007‑02‑13:
Bundle sysadmin automation tool.
- 2007‑02‑13:
Clarissa Dickson-Wright.
- 2007‑02‑13:
Finger trees: a simple general-purpose purely functional data structure.
- 2007‑02‑13:
Mersenne Twister non-crypto random number generator.
- 2007‑02‑13:
How to remove a lobster's shell without damaging the flesh inside.
- 2007‑02‑12:
Lawrence Lessig on the Republicans, the Internet, and innovation.
- 2007‑02‑12:
Gillian McKeith is astonishingly ignorant of basic nutritional and medical science
- 2007‑02‑11:
The public lives of modern youth.
- 2007‑02‑08:
Calvin's snowmen.
- 2007‑02‑08:
draft-fanf-smtp-rfc1845bis-01
- 2007‑02‑08:
Colour schemes for graphs.
- 2007‑02‑07:
BBC web design principles.
- 2007‑02‑07:
Diagrams of system call traces comparing Apache on Linux to IIS on Windows.
- 2007‑02‑07:
Proebsting's Law.
- 2007‑02‑07:
Apple makes it clear they are anti-DRM.
- 2007‑02‑07:
Matthew Garrett on ACPI.
- 2007‑02‑06:
Team Cymru DNS name server status pages.
- 2007‑02‑05:
Piece of sh- Symbian.
- 2007‑02‑05:
Why the iPhone is ARM but not Symbian.
- 2007‑02‑03:
Does extending daylight saving time save energy? Evidence from an Australian experiment.
- 2007‑02‑02:
RabbitMQ - a complete open-source implementation of the advanced message queue protocol.
- 2007‑02‑01:
Breastfeeding pharmacology.
- 2007‑02‑01:
The Jacobson and Appel "fastest scrabble program in the west".
- 2007‑02‑01:
Hardware acceleration for ClamAV.
- 2007‑02‑01:
Risks of Windows Vista's speech command feature.
- 2007‑01‑30:
How to write shared libraries.
- 2007‑01‑30:
US radio spectrum allocations.
- 2007‑01‑30:
Bumptop.
- 2007‑01‑30:
Tupper's self-referential formula.
- 2007‑01‑29:
Definitional interpreters revisited.
- 2007‑01‑29:
Definitional interpreters for higher-order programming languages.
- 2007‑01‑29:
Orange Problems.
- 2007‑01‑29:
53 CSS techniques you can probably live without.
- 2007‑01‑29:
Assessing the security threats of looping constructs.
- 2007‑01‑28:
Houses to be built by 3D concrete inkjet printers.
- 2007‑01‑28:
Programming the greedy CAM machine.
- 2007‑01‑27:
Is god an accident?
- 2007‑01‑26:
An empirical study of spam traffic and the use of DNS black lists.
- 2007‑01‑26:
Comparative graphs of DNS blacklists.
- 2007‑01‑26:
The shadow tells the time.
- 2007‑01‑26:
draft-fanf-smtp-rfc1845bis-00
- 2007‑01‑25:
Switzerland's valley of death.
- 2007‑01‑25:
Standard video screen sizes.
- 2007‑01‑25:
The tao of debugging.
- 2007‑01‑25:
Hierarchial data format, good for time-series data.
- 2007‑01‑25:
Cable-lacing howto.
- 2007‑01‑24:
ENECO has developed the Thermal Chip, a new type of semiconductor device for direct energy conversion between heat and electricity.
- 2007‑01‑24:
The greatest drunk on earth.
- 2007‑01‑24:
Outlook renders inline message information as an attachment, deliberately ignoring RFC 2183.
- 2007‑01‑24:
Experience deploying high density 802.11 networks.
- 2007‑01‑24:
Petition for guaranteed public access to publicly-funded research results.
- 2007‑01‑24:
Get lost.
- 2007‑01‑24:
OMG facebook LOL.
- 2007‑01‑23:
Elections in Georgia (USA) are run by Kennesaw State University. (!)
- 2007‑01‑23:
More porn leads to less rape.
- 2007‑01‑23:
Joel Spolsky on the 1900 leap year bug.
- 2007‑01‑23:
OOXML propagates the Lotus 123 / MS Excel 1900 leap year bug and the Mac/PC Excel epoch incompatibility.
- 2007‑01‑23:
Live pagerank.
- 2007‑01‑23:
Resistance to anti-TB drugs in populations is a phenomenon that occurs primarily due to poorly managed TB care. Problems include incorrect drug prescribing practices by providers, poor quality drugs or erratic supply of drugs, and also patient non-adherence.
- 2007‑01‑23:
Extreme drug resistant TB.
- 2007‑01‑22:
Books on ethics are stolen more than other philosophy books.
- 2007‑01‑22:
Direct measurement of spam zombie activity in a residential broadband network.
- 2007‑01‑22:
Alliance for Telecommunications Industry Solutions report on circuit path diversity.
- 2007‑01‑22:
BT deploys zombie detection on its broadband network.
- 2007‑01‑22:
Stephen Colbert explains the whole AT&T thing.
- 2007‑01‑22:
Errors of fact in Richard Dawkins's "The God Delusion".
- 2007‑01‑22:
The suggestion that women are not advancing in science because of innate inability is being taken seriously by some high-profile academics. Ben A. Barres explains what is wrong with the hypothesis.
- 2007‑01‑22:
UW IMAP "mix" format mailboxes.
- 2007‑01‑22:
How R2D2 and Chewie led the Rebelloin.
- 2007‑01‑21:
Customer sends in bailiffs to seize bank's computers.
- 2007‑01‑21:
The near future of digital photography.
- 2007‑01‑21:
Disastrously bad American maths curricula.
- 2007‑01‑17:
First jury conviction under CAN-SPAM act.
- 2007‑01‑17:
More about marine cable repair.
- 2007‑01‑17:
Boxing Day earthquake cable repair problems.
- 2007‑01‑17:
Telegeography map of the submarine cables damaged by the Boxing Day earthquake.
- 2007‑01‑17:
Response to the petition to the Prime Minister for a private copying exemption to copyright.
- 2007‑01‑17:
Upgrade your iPod with a blender.
- 2007‑01‑16:
The technology and stats of the 2007 MacRumorsLive keynote coverage.
- 2007‑01‑16:
Arkell vs. Pressdram.
- 2007‑01‑16:
gross - greylisting of suspicious sources.
- 2007‑01‑16:
Spreadsheets, Improv, and other improvements.
- 2007‑01‑15:
"Reading design"
- 2007‑01‑14:
GIOVE-A becomes official, but where's the rest of Galileo?
- 2007‑01‑14:
GSM operators, coverage maps, and roaming information.
- 2007‑01‑14:
Why Oyster's e-money plans hit the buffers.
- 2007‑01‑14:
Dimmable compact fluorescent bulb - works with normal dimmer switch.
- 2007‑01‑14:
Dimmable compact fluorescent bulb - works with normal binary light switch.
- 2007‑01‑14:
Nazi raccoons invade Europe!
- 2007‑01‑12:
Occam-π.
- 2007‑01‑12:
What Ryan Lackey did next.
- 2007‑01‑12:
HavenCo: what really happened.
- 2007‑01‑12:
Supreme court says patent licensees can sue to be released from future licence fees before they risk infringing the patent.
- 2007‑01‑12:
Keep the lasagna flying.
- 2007‑01‑12:
Amnesty International demonstration against Guantanamo Bay.
- 2007‑01‑11:
The Oxford and Cambridge Act 1571.
- 2007‑01‑11:
Dove's guide for church bell ringers.
- 2007‑01‑11:
DB Fletcher Capstan Table.
- 2007‑01‑11:
LG KE850 vs Apple iPhone.
- 2007‑01‑11:
Map of dioceses in England.
- 2007‑01‑11:
Cambridge Garden Centres.
- 2007‑01‑11:
Beautiful expanding circular table.
- 2007‑01‑11:
... then they came for the librarians ...
- 2007‑01‑11:
"Until literature departments take into account that humans are not just cultural or textual phenomena but something more complex, English and related disciplines will continue to be the laughingstock of the academic world that they have been for years because of their obscurantist dogmatism and their coddled and preening pseudo-radicalism."
- 2007‑01‑10:
Walking with dinosaurs - LIVE!
- 2007‑01‑10:
A substitute school teacher in Connecticut has been found guilty of exposing children to spyware.
- 2007‑01‑10:
MS Outlook 2007 uses MS Word to render HTML, not MSIE!
- 2007‑01‑10:
6.5% of British people are stupid and greedy.
- 2007‑01‑10:
Andrews & Arnold compliance with email requirements of the Companies Act 2006.
- 2007‑01‑10:
The world's most accurate NTP hardware?
- 2007‑01‑09:
Conformal projections.
- 2007‑01‑09:
Polyhedral maps.
- 2007‑01‑09:
Multi-touch user interface.
- 2007‑01‑09:
Experimental demonstration of General Relativity is child's play.
- 2007‑01‑08:
Symmetricom bought HP's atomic clock business from Agilent.
- 2007‑01‑08:
Information about the DARPA chip-scale atomic clock project from their contractor Symmetricom.
- 2007‑01‑07:
The plant by my desk is an "epipremnum".
- 2007‑01‑06:
Harrison's deliberately imperfect chronometer.
- 2007‑01‑06:
A blog of strange maps.
- 2007‑01‑05:
How well-prepared is the US for economic collapse?
- 2007‑01‑05:
A history of the international date line.
- 2007‑01‑05:
The shock of the old.
- 2007‑01‑05:
Querty vs. Dvorak.
- 2007‑01‑05:
Wikileaks - untraceable mass document leaking and analysis - a system enables everyone to leak safely to a ready audience is the most cost effective means of promoting good government.
- 2007‑01‑04:
Save Milton Country Park.
- 2007‑01‑04:
Religions in SF.
- 2007‑01‑03:
The LanguageLog on Vicky Pollard.
- 2007‑01‑03:
British aviation futurology from 1920.
- 2007‑01‑02:
Electromagnetic analysis of synchronous and asynchronous circuits using hard disc heads.
- 2007‑01‑02:
A4 cut-paper art.
- 2007‑01‑01:
Hilarious French self-parody.
- 2007‑01‑01:
Lung hyperpermeability and asthma prevalence in schoolchildren: unexpected associations with the attendance at indoor chlorinated swimming pools.
- 2006‑12‑29:
Getting started with amateur time and frequency.
- 2006‑12‑29:
Calendars as types: data modeling, constraint reasoning, and type checking with calendars.
- 2006‑12‑29:
UTC is an observational calendar.
- 2006‑12‑29:
David W. Allan - brilliant time metrologist, but perhaps a bit batty in his old age?
- 2006‑12‑28:
The National Bureau of Standards atomic time scale: generation, stability, accuracy and accessibility.
- 2006‑12‑27:
The Guardian on MovieOS.
- 2006‑12‑27:
Jakob Nielsen on MovieOS.
- 2006‑12‑27:
Syntonicity and the psychology of programming.
- 2006‑12‑27:
Programming antiobjects.
- 2006‑12‑26:
Republic of Terra calendar specification (bonkers).
- 2006‑12‑26:
International conference held at Washington for the purpose of fixing a prime meridian and a universal day.
- 2006‑12‑24:
Prime Minister's strategy unit policy review on crime, justice and cohesion (part 2).
- 2006‑12‑24:
Prime Minister's strategy unit policy review on crime, justice and cohesion (part 1).
- 2006‑12‑24:
A cost analysis of Windows Vista high-definition video content protection.
- 2006‑12‑22:
Atomic time-keeping from 1955 to the present.
- 2006‑12‑22:
Beautiful concurrency.
- 2006‑12‑21:
Unifying Atomic Time and the post-Gregorian calendar corrections.
- 2006‑12‑21:
What to do if International Time hits the International Date Line?
- 2006‑12‑21:
Timecounters: Efficient and precise timekeeping in SMP kernels.
- 2006‑12‑21:
The nanokernel.
- 2006‑12‑21:
On the chronometry and metrology of computer network timescales and their application to the network time protocol.
- 2006‑12‑20:
A translation of Gregory's Papal Bull on calendar reform.
- 2006‑12‑20:
More on Roman calendar reform.
- 2006‑12‑20:
Roman calendar reform.
- 2006‑12‑20:
Errata for "Calendrical Calculations".
- 2006‑12‑19:
Switchy McLayout - width-adaptive web pages.
- 2006‑12‑19:
Gilbert Heaton on dates and times.
- 2006‑12‑19:
Frequently asked questions about calendars.
- 2006‑12‑19:
Unicode common locale data repository.
- 2006‑12‑19:
TAI - UTC according to the USNO (same data as from the IERS but more readable).
- 2006‑12‑19:
IERS Bulletin D - DUT1.
- 2006‑12‑19:
Relationship between TAI and UTC from 1961.
- 2006‑12‑19:
Offsets and step adjustments of UTC from 1961.
- 2006‑12‑19:
The Olson tz database.
- 2006‑12‑19:
Paul Eggart's modernized <time.h> proposal.
- 2006‑12‑19:
Clive Feather's struct tmx proposal.
- 2006‑12‑19:
DJB's libtai.
- 2006‑12‑19:
Markus Kuhn's proposed new <time.h>.
- 2006‑12‑19:
Jonathan Lennox's proposal for thread-safe time zone information in C and POSIX.
- 2006‑12‑19:
SRFI 19: Time data types and procedures for Scheme.
- 2006‑12‑19:
David Tribble's struct timezone proposal.
- 2006‑12‑19:
David Tribble's struct calendar proposal.
- 2006‑12‑19:
David Tribble's longtime_t proposal.
- 2006‑12‑19:
The Russians had a nuke in their embassy in Washington, DC.
- 2006‑12‑18:
Perl 5.10 advanced regexes.
- 2006‑12‑18:
Time thing of the year: 1982 vs 2006.
- 2006‑12‑18:
Joel on simplicity.
- 2006‑12‑18:
Simplicity is highly overrated.
- 2006‑12‑17:
Great works in programming languages.
- 2006‑12‑15:
OSBF-Lua: text classification using orthogonal sparse bigrams and exponential differential document count confidence factors.
- 2006‑12‑14:
Bulldozers tear down giant religious teapot.
- 2006‑12‑14:
How to claim back bank penalty charges.
- 2006‑12‑14:
Joseph and Mary discuss breast feeding.
- 2006‑12‑14:
Everything you didn't want to have to know about spam.
- 2006‑12‑14:
World's tallest man saves dolphins.
- 2006‑12‑14:
Practical type inference based on success typing.
- 2006‑12‑14:
Any attempt to improve the security of PHP from the inside is futile. (Let alone the outside?)
- 2006‑12‑14:
Jason Scott: "Mythapedia".
- 2006‑12‑14:
`textfiles.com`
- 2006‑12‑14:
Cambridge regional war room (no fighting!).
- 2006‑12‑14:
Brooklands Avenue bunker saved from demolition.
- 2006‑12‑14:
The BBC on the bunker.
- 2006‑12‑14:
Cambridge 2000 on the bunker.
- 2006‑12‑14:
Brooklands Avenue bunker (scroll down 50%).
- 2006‑12‑14:
A nuclear bunker.
- 2006‑12‑12:
How I Broke Bath, and other stories.
- 2006‑12‑11:
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports.
- 2006‑12‑10:
Nikodemus's Common Lisp FAQ.
- 2006‑12‑09:
Most-cited computer scientists, according to their h-numbers.
- 2006‑12‑09:
Eskimo: experimenting with skeletons in the shared address model.
- 2006‑12‑09:
Commercial users of functional programming, 2006.
- 2006‑12‑09:
Google's thread-cacheing malloc().
- 2006‑12‑09:
Are High-level Languages suitable for Robust Telecoms Software?
- 2006‑12‑09:
What would happen if you were to connect all the ZIP codes in the US in ascending order?
- 2006‑12‑04:
Petrovich - an operating system based on reward and punishment.
- 2006‑12‑04:
Intelligent design sort.
- 2006‑12‑04:
Erlang SMTP client.
- 2006‑12‑04:
Sanesecurity ClamAV signatures.
- 2006‑12‑04:
The Wolfson Foundation: a historical perspective.
- 2006‑12‑03:
Some characteristic features of natural languages.
- 2006‑12‑03:
Joshua Bloch on how to design a good API and why it matters.
- 2006‑12‑01:
Beixo - yet another shaft-driven bike.
- 2006‑12‑01:
CERNY.schema
- 2006‑12‑01:
iBar
- 2006‑12‑01:
Literate Haskell JPEG decoder.
- 2006‑11‑30:
Alpine: Apache-licenced Pine.
- 2006‑11‑28:
The ceiling cat is watching you.
- 2006‑11‑28:
Java (DSpace) developer job at the Computing Service.
- 2006‑11‑26:
London: a life in maps - an exhibition at the British Library.
- 2006‑11‑24:
Exceptions and side-effects in atomic blocks.
- 2006‑11‑23:
Air-port security.
- 2006‑11‑23:
Why Michael Dillon's final, ultimate solution to the spam problem isn't.
- 2006‑11‑23:
Simon Peyton Jones and Tim Harris talk about transactional memory.
- 2006‑11‑23:
Bill Bailey and Billy Bragg performing "Unisex Chip Shop".
- 2006‑11‑22:
Waves and bubbles in a large free sphere of water.
- 2006‑11‑22:
MGM to release Obree movie in the U.S.
- 2006‑11‑21:
Passive versus active voice.
- 2006‑11‑21:
The things mentioned here are not debatable, they are facts about English that can easily be checked, and it is about time copy editors were told to stop wasting millions of hours on pointlessly correcting them when they were correct in the first place.
- 2006‑11‑21:
Computer-generated recording of the mega-tittums touch on 16 handbells from the Ancient Society of College Youths' dinner.
- 2006‑11‑21:
WTF-8.
- 2006‑11‑20:
The layers principle: Internet architecture and the law.
- 2006‑11‑20:
linogram is the constraint-driven diagram-drawing program described in Chapter 9 of Higher-Order Perl.
- 2006‑11‑20:
Franchise jurisdictions - relevant to odd obsolete things like the university and heraldic courts.
- 2006‑11‑17:
No2ID petition on the Prime Minister's petitions web site.
- 2006‑11‑17:
Why SOAP sucks.
- 2006‑11‑17:
Stuff that's broken.
- 2006‑11‑16:
The radioactive boy scout.
- 2006‑11‑16:
Waterken web calculus.
- 2006‑11‑16:
Waterken: secure multi-user distributed applications.
- 2006‑11‑16:
The next mainstream programming language: a game developer's perspective.
- 2006‑11‑16:
Least privilege and more.
- 2006‑11‑16:
The Oz-E Project: design guidelines for a secure multiparadigm programming language.
- 2006‑11‑16:
Nick Szabo's essays, papers, and concise tutorials.
- 2006‑11‑16:
Scarce objects.
- 2006‑11‑16:
The Scala experiment.
- 2006‑11‑15:
The utterly brilliant Leopold Tea Tube.
- 2006‑11‑15:
Can abstract state machines be useful in language theory?
- 2006‑11‑15:
Vulnerabilities in scriptable multiplayer online games.
- 2006‑11‑15:
The Cambridge CAP computer.
- 2006‑11‑15:
Monitor your Linux computer with machine-generated music.
- 2006‑11‑15:
Busting blocks: appropriate legal remedies for wrongful inclusion in spam filters under U.S. law.
- 2006‑11‑15:
George Osborne, the Shadow Chancellor, talks up Linux and Wikipedia.
- 2006‑11‑15:
Stop Spam Alliance - talking shop for intergovernmental agencies.
- 2006‑11‑14:
Sideways bike.
- 2006‑11‑14:
Advanced tools for operators at Amazon.com.
- 2006‑11‑13:
Writing a Lisp interpreter in Haskell.
- 2006‑11‑13:
How XLib is implemented, and what we're doing about it.
- 2006‑11‑13:
The need for asynchronous, zero-copy network IO.
- 2006‑11‑13:
TV licensing abandons case against unlicensed TV owner.
- 2006‑11‑12:
Applied pi - a brief tutorial.
- 2006‑11‑12:
The polyadic pi calculus: a tutorial.
- 2006‑11‑12:
Overloading whitespace in C++.
- 2006‑11‑12:
The long road to 64 bits.
- 2006‑11‑11:
Indirection is not abstraction.
- 2006‑11‑10:
Neko vs. Lua.
- 2006‑11‑10:
The joy of #!
- 2006‑11‑10:
Low-level virtual machine / compiler infrastructure.
- 2006‑11‑10:
Neko embeddable programming language.
- 2006‑11‑09:
Petition against copyright term extension for recorded music.
- 2006‑11‑08:
Comments on the Adobe/Mozilla deal.
- 2006‑11‑08:
Adobe/Macromedia Flash's scripting engine to be made open source and given to Mozilla.
- 2006‑11‑07:
"Reactable" synth controller videos.
- 2006‑11‑06:
The Dockum drug store sit-in in Wichita, Kansas, July-August 1958.
- 2006‑11‑06:
ikiwiki.
- 2006‑11‑06:
Markdown wikitext syntax.
- 2006‑11‑06:
More details of Fastmail's Cyrus replication deployment.
- 2006‑11‑06:
Patterns of Software by Richard P. Gabriel.
- 2006‑11‑06:
Continuum fingerboard - amazing synth controller.
- 2006‑11‑01:
Time-lines of computer science research, development, and commercialization.
- 2006‑11‑01:
nbsmtp - no-brainer SMTP client, not sendmail-compatible.
- 2006‑11‑01:
esmtp - sendmail-compatible stub SMTP client with local delivery support.
- 2006‑11‑01:
msmtp - sendmail-compatible stub SMTP client.
- 2006‑11‑01:
3D triangles in Javascript.
- 2006‑11‑01:
Fastmail has fully deployed the Cambridge Cyrus replication code.
- 2006‑10‑31:
Optimizing HTTP page load time.
- 2006‑10‑31:
mailsync - another IMAP mailbox synchronizer.
- 2006‑10‑31:
isync - another IMAP mailbox synchronizer (predecessor of asis).
- 2006‑10‑31:
imapsync - another IMAP mailbox synchronizer.
- 2006‑10‑31:
offlineimap - another IMAP mailbox synchronizer.
- 2006‑10‑31:
asis - fast IMAP disconnected mode mailbox synchronizer.
- 2006‑10‑31:
The view source key.
- 2006‑10‑26:
Batten on the OSI / Internet wars.
- 2006‑10‑26:
The anatomy of a loop.
- 2006‑10‑26:
Multi-return function call.
- 2006‑10‑25:
Erlang: the movie.
- 2006‑10‑20:
Ryan Finnie's MIME torture test.
- 2006‑10‑20:
MIME examples, including a torture test.
- 2006‑10‑19:
Flow rate fairness: dismantling a religion.
- 2006‑10‑16:
Here comes Bod.
- 2006‑10‑12:
The church of Google.
- 2006‑10‑12:
Lightning exits woman's bottom.
- 2006‑10‑11:
ICANN on the Spamhaus / e360Insight lawsuit.
- 2006‑10‑11:
Future versions of Qualcomm Eudora to be based on Mozilla Thunderbird.
- 2006‑10‑09:
Turning off disk caches on an Infortrend Eonstor.
- 2006‑10‑08:
A very modal model of a modern, major, general type system.
- 2006‑10‑07:
Sub-woofers.
- 2006‑10‑05:
Sunifdef - Symbian unifdef.
- 2006‑10‑04:
Higher pay for long service ruled illegal.
- 2006‑10‑04:
BURL in action.
- 2006‑10‑03:
Death-by-committee of the first-mover advantage.
- 2006‑10‑03:
Web 2.0 versus HTML 2.0?
- 2006‑10‑03:
Ministerium fuer Heimatsicherheit?
- 2006‑10‑03:
Daniel Davies on the loss of confidence in public sector IT.
- 2006‑10‑02:
Implementation and performance evaluation of a safe runtime system in Cyclone.
- 2006‑09‑30:
Philip Wadler's page about computational thinking, including a wildly off-the-mark quote from Dijkstra.
- 2006‑09‑30:
Strange tale of Boris Johnson and his US passport.
- 2006‑09‑29:
Douglas Adams - Hyperland - 1990. (google video)
- 2006‑09‑28:
Clinton advocates ubuntu.
- 2006‑09‑28:
BBC gets into bed with MICROS~1.
- 2006‑09‑28:
Program yourself. (youtube)
- 2006‑09‑27:
Live train map of the UK. (Google Maps mashup)
- 2006‑09‑27:
Google working on efficient computer power supplies.
- 2006‑09‑26:
Ron Rivest's ThreeBallot voting system.
- 2006‑09‑26:
Flash animation of middle eastern empires in the last 3500 years.
- 2006‑09‑25:
Which services should remain offline?
- 2006‑09‑25:
John Baez's crackpot index.
- 2006‑09‑25:
Carl Sagan's baloney detection kit.
- 2006‑09‑25:
Greg Egan pleas to save New Scientist.
- 2006‑09‑24:
OMG girlz don't exist on teh Intarweb!!!!1
- 2006‑09‑24:
Domain models are aspect-free.
- 2006‑09‑22:
AJAX and mobile computing.
- 2006‑09‑22:
HP optical mouse without scroll wheel.
- 2006‑09‑21:
Weaknesses in HMAC?
- 2006‑09‑20:
Blackbeard the Pirate's Rugged Tampons.
- 2006‑09‑20:
Turn a Brompton into a kiddie-tandem.
- 2006‑09‑20:
Don't spam your own ISP's abuse desk when joe-jobbing Spamhaus.
- 2006‑09‑20:
What 11th September means to Chileans.
- 2006‑09‑20:
Russ Allbery on community.
- 2006‑09‑19:
Whit shud we feed tha burds fur?
- 2006‑09‑19:
Earliest uses of symbols of operation.
- 2006‑09‑19:
Overview of the Internet in Zimbabwe in 2000.
- 2006‑09‑19:
No bread in Zim either.
- 2006‑09‑18:
Zimbabwe cut off from the Internet.
- 2006‑09‑17:
Microsoft Research: Singularity: a research project focused on the construction of dependable systems through innovation in the areas of systems, languages, and tools.
- 2006‑09‑17:
Thirty years is long enough: getting beyond C.
- 2006‑09‑15:
New anti-phishing algorithm in ClamAV.
- 2006‑09‑15:
GMail's sender reputation system.
- 2006‑09‑15:
Automatic indicator lighs for bikes.
- 2006‑09‑14:
Why Johnny can't code.
- 2006‑09‑14:
A roadmap for the TCP specification documents.
- 2006‑09‑14:
Tom and Jerry: the lost episodes.
- 2006‑09‑14:
Royal Society archive online.
- 2006‑09‑14:
Imperial College high performance computing data centre hosting service.
- 2006‑09‑14:
Imperial College data centre refurb project page.
- 2006‑09‑14:
Trox Advanced IT Cooling Systems.
- 2006‑09‑14:
Modern Building Services journal on the Trox CO2 rack cooling system installed at Imperial Colege.
- 2006‑09‑13:
History of AppleScript (draft).
- 2006‑09‑13:
First-person shooter specs.
- 2006‑09‑13:
Hakka chinese restaurant.
- 2006‑09‑12:
Analyzing large ddos attacks using multiple data sources.
- 2006‑09‑12:
Stupid email disclaimers and the IETF.
- 2006‑09‑11:
Secure IMAP with a Blackberry.
- 2006‑09‑11:
Edinburgh University email upgrade project.
- 2006‑09‑11:
Does Visual Studio rot the mind?
- 2006‑09‑11:
The New Yorker on the Poincaré conjecture.
- 2006‑09‑10:
Craig Murray's book "Murder in Samarkand" banned by UK airport security.
- 2006‑09‑05:
W3slidy.
- 2006‑09‑05:
Criminal terrorism enforcement in the United States during the five years since the attacks on 11th September 2001.
- 2006‑09‑04:
Characteristics of fascism.
- 2006‑09‑04:
CERT secure coding standards.
- 2006‑09‑04:
Spamhaus "zen" combined block list.
- 2006‑09‑04:
Spamhaus policy block list.
- 2006‑09‑04:
Dave Hayes unhinged ranting.
- 2006‑09‑04:
Some one is spamming on behalf of Dave Hayes, anti-anti-spam kook.
- 2006‑09‑03:
Software reliability.
- 2006‑09‑03:
What if there is a silver bullet?
- 2006‑09‑03:
There _is_ a silver bullet.
- 2006‑09‑01:
More complaining about ENHANCEDSTATUSCODES.
- 2006‑09‑01:
British people have been brainwashed by the government and media about terrorism.
- 2006‑09‑01:
The children's database - yet more government centralizing stupidity.
- 2006‑09‑01:
DAMP 2007: workshop on declarative aspects of multicore programming.
- 2006‑08‑31:
#haskell stats.
- 2006‑08‑31:
History of Haskell timeline.
- 2006‑08‑31:
PowerDNS performance graphs from xs4all.
- 2006‑08‑31:
Truce in the war on copying?
- 2006‑08‑31:
Gradual typing for functional languages.
- 2006‑08‑30:
Telemarketer annoyance device.
- 2006‑08‑30:
mutt-ng.
- 2006‑08‑30:
Reflective program generation with patterns.
- 2006‑08‑30:
USA bans its own citizen from returning home.
- 2006‑08‑29:
Alexey Melnikov agrees.
- 2006‑08‑29:
I rant about ENHANCEDSTATUSCODES.
- 2006‑08‑29:
Opt out of junk mail.
- 2006‑08‑29:
Junk mail preference service.
- 2006‑08‑29:
Junk mail reduction.
- 2006‑08‑29:
Porous concrete paving.
- 2006‑08‑29:
Pool tricks (youtube).
- 2006‑08‑29:
Exim patch for hooking into Dovecot's SASL daemon.
- 2006‑08‑29:
Cory Doctorow: I, row-boat.
- 2006‑08‑29:
I am not a terrorist.
- 2006‑08‑29:
Early history of the electromagnetic telegraph.
- 2006‑08‑28:
Upstart: a replacement for init.
- 2006‑08‑27:
TSA whistle-blower thinks the state of U.S. aviation security invites another attack.
- 2006‑08‑27:
More magnets, please.
- 2006‑08‑27:
The magnetism of carbon.
- 2006‑08‑25:
Don't download this song.
- 2006‑08‑25:
What are the odds?
- 2006‑08‑25:
Threat levels.
- 2006‑08‑24:
"Christ, what an asshole!" is the answer to the New Yorker magazine caption contest.
- 2006‑08‑24:
Ragel state machine compiler.
- 2006‑08‑23:
Suspension trauma.
- 2006‑08‑23:
List of fictional expletives.
- 2006‑08‑23:
List of exclamations used by Captain Haddock.
- 2006‑08‑22:
Credit card issuers given an exemption from the data protection act to cancel cards used in child porn offenses.
- 2006‑08‑22:
What is the wheel-driven land-speed record?
- 2006‑08‑22:
JCB diesel-powered land speed record.
- 2006‑08‑22:
Imail: email-over-xmpp.
- 2006‑08‑22:
Bryan Ford's packrat parsing page.
- 2006‑08‑22:
Neil Mitchell's Haskell parser.
- 2006‑08‑22:
Frisby: Haskell implementation of packrat parsing.
- 2006‑08‑21:
"Matt" on security checks.
- 2006‑08‑21:
Exploding Li-Ion batteries.
- 2006‑08‑21:
Tom Flynn - outlawing unbelief.
- 2006‑08‑21:
Animator vs animation (flash).
- 2006‑08‑21:
BBC - the power of nightmares.
- 2006‑08‑21:
Jerry Fishenden - biometrics: enabling guilty men to go free?
- 2006‑08‑21:
Petr Skrabanek's Publications.
- 2006‑08‑21:
Eric Rescola: is finding security holes a good idea?
- 2006‑08‑21:
Mulberry MUA rescued from Cyrusoft's creditors and now available for free (though not Free).
- 2006‑08‑16:
Mitch Benn's myspace page.
- 2006‑08‑15:
C-Store: a column-oriented DBMS.
- 2006‑08‑15:
Chicken Yoghurt on John Reid's distorted view of reality.
- 2006‑08‑15:
Spam from Google.
- 2006‑08‑15:
A review of the Falklands War as if it were alternate history.
- 2006‑08‑15:
David E. H. Jones on the stability of the bicycle.
- 2006‑08‑14:
Google Internals described by a non-googler.
- 2006‑08‑14:
Daily Changes by Name Intelligence - details of registrar activity; good for spotting spammers.
- 2006‑08‑14:
Robert Pape on the motivation of suicide bombers.
- 2006‑08‑14:
Piet - a graphical programming language in the style of Mondrian.
- 2006‑08‑14:
The zombie programming language.
- 2006‑08‑14:
The Daily Show featuring Aasif Mandvi in Beirut.
- 2006‑08‑14:
Pepper Pad 3 - Linux-based web computer.
- 2006‑08‑14:
Rocket belts for sale in Mexico!
- 2006‑08‑14:
Why the government wants to exaggerate the risk of terrorism, and why they should not.
- 2006‑08‑14:
21st century newsflash - Women achieve EQUALITY.
- 2006‑08‑14:
Euro coinage spacial diffusion observatory.
- 2006‑08‑12:
Noises that indicate a defective hard drive.
- 2006‑08‑11:
Implications of power laws for policing homelessness etc.
- 2006‑08‑11:
On the implausibility of the explosives plot.
- 2006‑08‑11:
The GHC typechecker is Turing-complete.
- 2006‑08‑10:
Rich Kulawiec: dealing with spam. (nanog)
- 2006‑08‑09:
Archiveopteryx - SQL-based IMAP/POP/server.
- 2006‑08‑08:
Terrorists can be defeated simply by not becoming terrorized -- that is, anything that enhances fear effectively gives in to them.
- 2006‑08‑07:
Cameroon typosquats .com.
- 2006‑08‑07:
General-purpose tool-building factory factory factory.
- 2006‑08‑04:
How little do you need to bring a Linux box back to life?
- 2006‑08‑04:
dbmail - SQL-based IMAP/POP server.
- 2006‑08‑01:
IETF Montreal EAI WG meeting Jabber log.
- 2006‑08‑01:
IRON filesystems.
- 2006‑07‑31:
Karl Ulrich: the environmental paradox of bicycling - increased energy use from longer life expectancy cancels out reduced energy use from efficient transportation.
- 2006‑07‑31:
Bcfg2 is a tool that aids in the administration of complex environments.
- 2006‑07‑31:
Puppet configuration management tool.
- 2006‑07‑31:
AISK - classifying spam using neural nets.
- 2006‑07‑31:
The size of the Earth relative to other planets and stars.
- 2006‑07‑26:
Problematic Firefox extensions.
- 2006‑07‑26:
Yet another live lightning mapper.
- 2006‑07‑26:
Live map of UK traffic trouble spots.
- 2006‑07‑26:
Programming as if performance mattered.
- 2006‑07‑26:
Too many silver bullets.
- 2006‑07‑25:
IRA has ceased its criminality.
- 2006‑07‑25:
Using wave generators to draw letters on the surface of water.
- 2006‑07‑24:
URIBL.
- 2006‑07‑24:
The proposed Trumpington Meadows housing estate.
- 2006‑07‑24:
This can be taken as a comment on the perennial usefulness of the incipit, on the natural origins of the incipit, or it can be a reflection of the lack of modernity of these computer systems.
- 2006‑07‑24:
No, Mr Bond, I expect you to die!
- 2006‑07‑24:
AMD and ATI to merge.
- 2006‑07‑23:
Wouldn't a connection-id be a useful thing to have?
- 2006‑07‑23:
Google searches for vulnerable code.
- 2006‑07‑23:
The Little Artists (John Cake and Darren Neave) immortalize iconic artists and their artworks in un-manipulated Lego.
- 2006‑07‑23:
ENORMOUS harbour construction in Shanghai, including the longest bridge in the world.
- 2006‑07‑20:
Ejabberd + Active Directory shared rosters.
- 2006‑07‑18:
Cold Blood - antarctic/sf/horror on BBC radio 7.
- 2006‑07‑14:
History of Haskell.
- 2006‑07‑14:
Event-based programming without inversion of control using Scala.
- 2006‑07‑13:
AngloHaskell hacker gathering.
- 2006‑07‑13:
The evolution of the IM worm since the beginning of 2005.
- 2006‑07‑13:
Ejabberd LDAP patches.
- 2006‑07‑12:
journald: User-space generic journalling daemon.
- 2006‑07‑11:
Workplace temperature and thermal comfort.
- 2006‑07‑07:
Split windows in irssi.
- 2006‑07‑06:
Funniest WLIIA? episode EVAR.
- 2006‑07‑05:
Open proxy honeypot project, including reports of zombie control hosts.
- 2006‑07‑05:
MAAWG on ports 25 and 587.
- 2006‑07‑05:
Joe St Sauver - filtering spam at your leisure, using the gap between a message being received and read.
- 2006‑07‑05:
UK noise mapping.
- 2006‑07‑05:
W and liberty.
- 2006‑07‑04:
Hotmail uses expired accounts as spam traps.
- 2006‑07‑04:
About the hash function while(len--) hash = hash*33 + *ptr++;
- 2006‑07‑04:
Elastic tab stops - nice!
- 2006‑07‑03:
DANGER: falling dot-coms!
- 2006‑07‑03:
NY Times: A search engine that's becoming an inventor.
- 2006‑07‑03:
Internet News: Peeking into Google.
- 2006‑07‑03:
Colm MacCarthaigh's history of electronic voting in Ireland.
- 2006‑07‑03:
Getting Exim to reject messages early that Mailman would bounce.
- 2006‑07‑03:
Unknown rc script y2038 bug.
- 2006‑06‑30:
Western Digital loses class-action lawsuit over the size of a gigabyte.
- 2006‑06‑30:
Transport strategy in the East of England does not suffer from an "infrastructure deficit", but instead it should focus on "demand management and climate change mitigation".
- 2006‑06‑30:
Vanity Fair is a terrorist publication?
- 2006‑06‑30:
MIME-compatible binary ordered compression for Unicode.
- 2006‑06‑30:
AOLserver y2038 bug.
- 2006‑06‑28:
Map of noise levels in London.
- 2006‑06‑28:
Standard compression scheme for Unicode (designed by Reuters).
- 2006‑06‑28:
Sudden giant trunk nostril.
- 2006‑06‑28:
Sudden giant nostril gallery.
- 2006‑06‑28:
The power of seven.
- 2006‑06‑28:
MicroID.
- 2006‑06‑28:
Mac the Ripper.
- 2006‑06‑27:
Tom Kistner's anti-spam timeban script.
- 2006‑06‑27:
Cambrige Mountain Rescue.
- 2006‑06‑27:
Simon Tatham has successfully geneticall modified the Newton-Raphson iterative fractal, pumped it full of drugs in a secret government laboratory, and then captured some striking video footage of it. People of a nervous disposition and pregnant women, beware.
- 2006‑06‑27:
Brian Deer: excellent health journalism, including work on Andrew Wakefield and company.
- 2006‑06‑27:
A page about one of Andrew Wakefield's insane supporters.
- 2006‑06‑26:
Dave Prosser's corrected and annotated C preprocessor algorithm: document X3J11/86-196.
- 2006‑06‑26:
Rethinking the design of presentation slides.
- 2006‑06‑26:
Securing the .NET programming model.
- 2006‑06‑26:
The Gold Casino proves fair dealing with PhatHash.
- 2006‑06‑23:
D-BUS specification.
- 2006‑06‑23:
Domain kiting - abuse of short-term un-paid-for registrations.
- 2006‑06‑23:
Dave Cridland on top-posting and mobile email.
- 2006‑06‑23:
Was it said by Adolf Hitler or Ann Coulter?
- 2006‑06‑22:
Table of condiments that periodically go bad.
- 2006‑06‑22:
Mum's new place in France.
- 2006‑06‑22:
Administration-free Thursdays.
- 2006‑06‑22:
Mac Mini in a Prius.
- 2006‑06‑21:
Carplus Cambridge residents' survey.
- 2006‑06‑20:
The rise and fall of CORBA - there's a lot we can learn from CORBA's mistakes.
- 2006‑06‑20:
A flaw in the child porn witch-hunt.
- 2006‑06‑19:
How Boyer-Moore works.
- 2006‑06‑19:
Extensible Binary Meta Language specification.
- 2006‑06‑16:
Plash: tools for practical least privilege.
- 2006‑06‑15:
Broken Windows Theory.
- 2006‑06‑15:
B3ta roadsign challenge.
- 2006‑06‑15:
Numerical representations as higher-order nested datatypes.
- 2006‑06‑15:
TenDRA open-source crown copyright licence.
- 2006‑06‑15:
A principled approach to operating system construction in Haskell.
- 2006‑06‑15:
Haskell users' operating system and environment.
- 2006‑06‑15:
CMU software engineering + CERT: managed strings library for C.
- 2006‑06‑14:
Funnel: programming with functional nets.
- 2006‑06‑14:
The Corruptibles: how Hollywood is trashing your rights - video from the EFF.
- 2006‑06‑13:
On the future availability of helium.
- 2006‑06‑13:
The Windows malicious software removal tool: progress made, trends observed.
- 2006‑06‑13:
ICMP filtering.
- 2006‑06‑13:
Ages of consent around the world.
- 2006‑06‑13:
No lobbyists as such - the war over software patents in the European Union.
- 2006‑06‑09:
RIP Act part III to be activated - government seizure of crypto keys.
- 2006‑06‑09:
David Hembrow on the Arbury Camp development.
- 2006‑06‑09:
Des Phillips on the Arbury Camp development.
- 2006‑06‑08:
Convergence in language design: a case of lightning striking four times in the same place.
- 2006‑06‑08:
Getling: a high-performance web server.
- 2006‑06‑08:
The rising tide: DDoS by defective designs and defaults.
- 2006‑06‑08:
Spanish castle colour illusion.
- 2006‑06‑07:
Tiscali Jukebox legal music download service is "too interactive" for the recording labels.
- 2006‑06‑07:
Nominet public consultation on the scope of their business.
- 2006‑06‑06:
Spoof Cambridge computer science tripos papers.
- 2006‑06‑05:
The Encap package management system.
- 2006‑06‑02:
Cambridge train performance data.
- 2006‑06‑02:
Jakob Nielsen's usability fighting styles.
- 2006‑06‑02:
On the lifestyle of Erlang developers.
- 2006‑06‑02:
Lout document formatting system.
- 2006‑06‑02:
Ant is not TeX.
- 2006‑06‑02:
Worse-is-better is worse.
- 2006‑06‑02:
Tiny Threads - hilarious thread context allocation.
- 2006‑06‑01:
JPEG patent claims ruled invalid.
- 2006‑05‑31:
Cambridge curry house scores.
- 2006‑05‑31:
Just because you can, Mr Lightfoot, that doesn't mean you should.
- 2006‑05‑31:
Patent goo: self-replicating Paxil.
- 2006‑05‑31:
Linux desktops at the University of Oxford.
- 2006‑05‑25:
Qt Cryptographic Architecture OpenSSL interface, including XMPP support.
- 2006‑05‑25:
See Cambridge: panoramic views of the historic university city.
- 2006‑05‑25:
Apple's portable computer sudden motion sensor.
- 2006‑05‑25:
Miscalculating the area and angles of a needle-like triangle.
- 2006‑05‑24:
"Hatracks", i.e. places to hang your hats, i.e. XMPP-to-XMPP gateways.
- 2006‑05‑24:
XMPP-to-XMPP gateway.
- 2006‑05‑24:
How Java's floating-point hurts everyone everywhere.
- 2006‑05‑19:
Security in Windows Vista: to 2002 and beyond!
- 2006‑05‑19:
Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation.
- 2006‑05‑19:
Chaffinch: confidentiality in the face of legal [RIPA] threats.
- 2006‑05‑19:
Part 3 of RIPA may come in to force - UK Government to demand handover of encryption keys.
- 2006‑05‑19:
Verisign buys another SSL CA competitor.
- 2006‑05‑18:
GTalk Profile can help you find other Google Talk [and Jabber] users from around the world.
- 2006‑05‑18:
UOregon recommended email configuration.
- 2006‑05‑17:
Martin Howe QC on the problems with the EU.
- 2006‑05‑17:
A bare SURBL implementation for Exim.
- 2006‑05‑17:
Freetalk: console-based jabber client.
- 2006‑05‑17:
19th c. US currency.
- 2006‑05‑16:
MUCkl - a version of JWchat tuned for multi-user chat.
- 2006‑05‑15:
Jason Evans' new threaded malloc() for FreeBSD.
- 2006‑05‑15:
Al Gore on Saturday Night Live. (QuickTime)
- 2006‑05‑15:
Web presence icons for ejabberd.
- 2006‑05‑15:
A notation for dates on linear time scales.
- 2006‑05‑10:
JEP-0124 HTTP binding patch for ejabberd.
- 2006‑05‑09:
Roundcube webmail (PHP, XHTML, CSS, AJAX).
- 2006‑05‑08:
Freedom of speech banned in UK.
- 2006‑05‑08:
Extending NTP for the interplanetary internet.
- 2006‑05‑08:
Tracking plane flight on the Internet with BGP.
- 2006‑05‑08:
HAKMEM count set bits algorithm adjusted for 32 bit words.
- 2006‑05‑08:
Wikipedia on leet speak.
- 2006‑05‑08:
Wikipedia on professional farters.
- 2006‑05‑08:
Rob Pike on the history of UTF8.
- 2006‑05‑05:
Using load balancers in front of an eJabberd cluster.
- 2006‑05‑02:
Prescott's local government revolution.
- 2006‑05‑01:
Links: web programming without tiers.
- 2006‑05‑01:
Firms face new tax on staff email to friends.
- 2006‑04‑28:
The monkeysphere.
- 2006‑04‑28:
The Dunbar number.
- 2006‑04‑27:
Practical dynamic software updating for C.
- 2006‑04‑27:
Blue poster lunar calendar.
- 2006‑04‑27:
Is the pace of change really such a shock?
- 2006‑04‑27:
Delayed sleep-phase syncrome.
- 2006‑04‑26:
A survey of DNS security: most vulnerable and valuable assets.
- 2006‑04‑26:
The Camelford water contamination scandal.
- 2006‑04‑26:
Grand illusions toy shop.
- 2006‑04‑25:
All about Jabber PubSub.
- 2006‑04‑25:
Shrove Tuesday Public Licence.
- 2006‑04‑25:
Design and engineering of the PowerDNS recursor.
- 2006‑04‑24:
NFSv4 RDMA for Linux.
- 2006‑04‑24:
Direct Access Transport collaborative.
- 2006‑04‑24:
Direct Access File System presentation by NetApp.
- 2006‑04‑24:
Evolution of the Virtual Interface Architecture.
- 2006‑04‑24:
Virtual Interface Architecture book from Intel.
- 2006‑04‑24:
I guess the Internet Watch Foundation wasn't bureaucratic enough.
- 2006‑04‑23:
Aligning security and usability.
- 2006‑04‑23:
User interaction design for secure systems.
- 2006‑04‑23:
Why events are a bad idea for high-concurrency servers.
- 2006‑04‑23:
The problem with threads - Edward Lee.
- 2006‑04‑23:
Co-operative taks management wihtout manual stack management.
- 2006‑04‑23:
Security in Plan 9 (2002).
- 2006‑04‑23:
User-level protocol servers with kernel-level performance.
- 2006‑04‑23:
Interoperation of copy avoidance in network and file I/O.
- 2006‑04‑23:
Usenix HotOS X proceedings - inaccessible until June 2006.
- 2006‑04‑23:
Type inference for first-class messages with match-functions.
- 2006‑04‑23:
QuickTunes - iTunes status in the menu bar (ignore the ugly windows).
- 2006‑04‑21:
SQLite copyright disclaimer.
- 2006‑04‑21:
How to (re)start screen automatically on remote logins.
- 2006‑04‑21:
Chris Lightfoot on PHP.
- 2006‑04‑21:
Iraq crater.
- 2006‑04‑21:
Idiot lawyer threatens Google over its lovely Joan Miro commemoration logo.
- 2006‑04‑21:
Fastmail backscatter protection - I wonder what they do with vacation messages...
- 2006‑04‑21:
Using a Cray as a compression server.
- 2006‑04‑19:
Universiteit Utrecht Department of Computer Science - email architecture 2002-present.
- 2006‑04‑19:
Universiteit Utrecht Department of Computer Science - email architecture 1998-2002.
- 2006‑04‑19:
Renew your passport in May 2006 - resist compulsory ID card registration.
- 2006‑04‑19:
USPS guide to shipping hippopotamuses.
- 2006‑04‑18:
Correct forms of address.
- 2006‑04‑18:
TRIAD: a scalable deployable NAT-based internet architecture.
- 2006‑04‑18:
Robust Composition: towards a unified approach to access control and concurrency control - thesis about the E distributed object-capability programming language.
- 2006‑04‑14:
Xerces faster than flex?
- 2006‑04‑12:
How to write a good research paper, and give a good research talk.
- 2006‑04‑12:
Cambridge station area redevelopment plans (789).
- 2006‑04‑12:
Cambridge station area redevelopment plans (456).
- 2006‑04‑12:
Cambridge station area redevelopment plans (123).
- 2006‑04‑11:
Link.
- 2006‑04‑11:
"I have a nightmare in which the entire Internet is clogged by spammers sending out messages which the recipients throw into black holes..." - Philip Hazel, October 1996.
- 2006‑04‑10:
The design of the Postgres storage system.
- 2006‑04‑10:
Crash-only software.
- 2006‑04‑10:
Eric Brewer: Lessons from giant-scale services.
- 2006‑04‑10:
IP addresses per capita in each country.
- 2006‑04‑10:
Joe Armstrong - Erlang stuff.
- 2006‑04‑10:
CIL - infrastructure for C program analysis and transformation.
- 2006‑04‑10:
The design and implementation of an intentional naming system.
- 2006‑04‑10:
Idle Sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs.
- 2006‑04‑09:
... in which he blurs the line between corporate participation and outright mockery.
- 2006‑04‑07:
Making the workd of communications a different place.
- 2006‑04‑07:
Infinite extensibility tends to encourage duplication of effort, whereas a co-ordinated registry brings value in shared data and protocols.
- 2006‑04‑07:
Responsive yet stable traffic engineering in the style of XCP.
- 2006‑04‑07:
Harnessing TCP's burstiness using flowlet switching.
- 2006‑04‑07:
Machine-readable passports (ICAO doc 9303 / ISO 7501).
- 2006‑04‑07:
Oakdale Arms Easter beer festival.
- 2006‑04‑07:
Local governments of Britain.
- 2006‑04‑07:
The counties of Britain.
- 2006‑04‑07:
Open letter to D-Link about their NTP vandalism.
- 2006‑04‑06:
Can TRIPS serve as an enforcement device for developing countries in the WTO? (online access for free from CUDN)
- 2006‑04‑06:
Can TRIPS serve as an enforcement device for developing countries in the WTO?
- 2006‑04‑06:
Antigua planning to stop enforcement of American patents and trademarks?
- 2006‑04‑06:
UMich email architecture.
- 2006‑04‑06:
simta - A Simple Internet Mail Transfer Agent.
- 2006‑04‑05:
Asterisk and Jingle interop.
- 2006‑04‑05:
A brief history of the Internet.
- 2006‑04‑05:
Internet growth requires new transmission protocol.
- 2006‑04‑05:
eXplicit congestion Control Protocol
- 2006‑04‑05:
A delay-based approach for congestion avoidance in interconnected heterogeneous computer networks.
- 2006‑04‑05:
Congestion control with explicit rate indication.
- 2006‑04‑04:
Why phishing works - how users approach browser security.
- 2006‑04‑04:
The ESP game.
- 2006‑04‑04:
Vulnerability to flooding in Britain.
- 2006‑04‑04:
TCP performance tuning.
- 2006‑04‑04:
Internet2 land speed records.
- 2006‑04‑04:
SSH for high-performance networks.
- 2006‑04‑03:
DHTML Lemmings.
- 2006‑04‑03:
eduroam: 802.1x + Radius across multiple Universities.
- 2006‑03‑30:
Man-in-the-middle _defences_.
- 2006‑03‑30:
LCFG: automatic configuration and installation system from Edinburgh University.
- 2006‑03‑29:
Patricia Waller's freaky soft toys.
- 2006‑03‑29:
Automated server software updates - an interesting use of XMPP.
- 2006‑03‑28:
Paul Vixie on the history of the f-root nameserver and PAIX.
- 2006‑03‑28:
Reverse-engineering Skype.
- 2006‑03‑28:
We do `not` need a djb-quality encrypted remote login.
- 2006‑03‑28:
Cambridge student-run wiki.
- 2006‑03‑28:
Man-in-the-middle attacks in tunnelled authentication protocols.
- 2006‑03‑27:
How to get Apache-1.3 DAV to work with Windows XP.
- 2006‑03‑27:
Interview with Tim Berners-Lee, including some mad alternative URL syntax ideas, and stuff about the semantic web.
- 2006‑03‑27:
Map of the US Internet.
- 2006‑03‑27:
Updates to Derek Jones's The New C Standard: An Economic and Cultural Commentary.
- 2006‑03‑27:
David Maher - Reporting to God - a trademark lawyer's retrospective on the Internet revolution.
- 2006‑03‑27:
Tornado + no offsite backups = ?
- 2006‑03‑18:
The CSV format and its variants.
- 2006‑03‑16:
Shelving books according to colour.
- 2006‑03‑16:
Nixie Cron.
- 2006‑03‑16:
The three laws of military robotics.
- 2006‑03‑14:
C99 + TC1 & TC2.
- 2006‑03‑14:
A more up-to-date archive of C standards committee documents.
- 2006‑03‑13:
That Varsity article (see page 7).
- 2006‑03‑13:
Text generator - for those bored of lorem ipsum.
- 2006‑03‑13:
FreeBSD's mailhub blew up.
- 2006‑03‑13:
Warner Losh melted his laptop with a runaway CPU.
- 2006‑03‑11:
Continuous partial attention.
- 2006‑03‑11:
Google spam site report form.
- 2006‑03‑10:
Using LEDs as sensors.
- 2006‑03‑10:
Multi-touch interaction research.
- 2006‑03‑10:
Sesame Street is NP-complete.
- 2006‑03‑10:
Your rights during and after a section 44 "anti-terrorism" stop-and-search.
- 2006‑03‑10:
Teachers' guide to Cambridge admissions.
- 2006‑03‑10:
How to invalidate a patent application with prior art
- 2006‑03‑10:
Weird things that surprise academics trying to commercialize a static checking tool (Coverity).
- 2006‑03‑10:
Starfish Prime high-altitude nuclear test.
- 2006‑03‑10:
South Cambridgeshire key facts from the Government Office for the East of England.
- 2006‑03‑10:
Cambridge key facts from the Government Office for the East of England.
- 2006‑03‑06:
Chiltern Railways centenary.
- 2006‑03‑06:
Milton Village from the air in WWII.
- 2006‑03‑03:
Google Underground map.
- 2006‑03‑03:
DJabberd CVS.
- 2006‑03‑03:
Brad Fitzpatrick's Perl-based DJabberd.
- 2006‑03‑03:
F-Secure world map.
- 2006‑03‑03:
Mozilla bug discussing support for TLS server name indication.
- 2006‑03‑03:
Web sites that don't support SSL3+.
- 2006‑03‑02:
DNS protocol conformance tester.
- 2006‑02‑28:
POWER inquiry executive summary.
- 2006‑02‑28:
Tom Baker says...
- 2006‑02‑28:
The Guardian reporting the FBI's opinion of animal rights terrorists.
- 2006‑02‑28:
Optimus: A keyboard with a colour display in every key.
- 2006‑02‑27:
Give cyclists room!
- 2006‑02‑26:
Wine marketing via blogs.
- 2006‑02‑24:
Fractal noughts and crosses.
- 2006‑02‑24:
Home-made pipe organ.
- 2006‑02‑23:
What is MySpace and why is it popular?
- 2006‑02‑22:
Hula - scalable calendar and mail server.
- 2006‑02‑21:
Jim Gray and David Patterson on the hugeness and slowness of disks.
- 2006‑02‑21:
TeraScale SneakerNet: using inexpensive disks for backup, archiving, and data exchange.
- 2006‑02‑21:
Jane Elliott's blue eyes / brown eyes racism teaching exercise.
- 2006‑02‑20:
Richard Bornat's home page.
- 2006‑02‑20:
A brief look at C++0X - Bjarne Stroustrup.
- 2006‑02‑20:
Passive DNS replication.
- 2006‑02‑17:
Government consultation on revisions to the Highway Code.
- 2006‑02‑17:
College email address FAQ.
- 2006‑02‑16:
The physics of skipping a stone on the surface of water.
- 2006‑02‑16:
Running a diesel on veg oil.
- 2006‑02‑16:
Dan Kaminski on the collusion between anti-virus vendors and DRM rootkit vendors.
- 2006‑02‑16:
How Google use Berkeley DB.
- 2006‑02‑16:
Oracle has bought Sleepycat.
- 2006‑02‑16:
European spreadsheet risks interest group - news stories.
- 2006‑02‑16:
Spam Stock Tracker - Just how much can you lose?
- 2006‑02‑15:
Arcing in high voltage power equipment.
- 2006‑02‑14:
Anamorphic pavement art.
- 2006‑02‑14:
Richard Clayton on challenge-response.
- 2006‑02‑14:
Windows access control demystified: automated discovery of privilege escalation vulnerabilities.
- 2006‑02‑13:
Movie makers tube map.
- 2006‑02‑13:
Cambridge Usability Group.
- 2006‑02‑10:
London Underground anagram map.
- 2006‑02‑09:
Converting server activity to sound.
- 2006‑02‑09:
LEGO Difference Engine.
- 2006‑02‑07:
Ordnance Survey research publications.
- 2006‑02‑07:
A history of the Netscape/Mozilla/Firefox user interface.
- 2006‑02‑06:
The topology of covert conflict - attack and defence strategies for networks.
- 2006‑02‑06:
A good explanation of the discrepancy between WGS84 and the original Greenwich meridien.
- 2006‑02‑06:
Annual lecture series in sustainable development at CUED.
- 2006‑02‑03:
Mini patch leads: only wrong by two orders of magnitude.
- 2006‑02‑02:
The I.T. Crowd - C4 sitcom.
- 2006‑02‑02:
Backups only work if you don't delete them.
- 2006‑02‑01:
THUS sells Demon.NL.
- 2006‑01‑31:
The ox.faq on -ise vs -ize.
- 2006‑01‑30:
Children are becoming less able and exams are getting easier.
- 2006‑01‑29:
Harry Porter's relay computer.
- 2006‑01‑29:
The Mathematical Bridge at Queens' College.
- 2006‑01‑29:
Dorodango - shining mud ball.
- 2006‑01‑27:
XMPP/SIMPLE feature comparison.
- 2006‑01‑27:
Post office branch finder.
- 2006‑01‑27:
Flyspray is an uncomplicated, web-based bug tracking system for assisting with software development.
- 2006‑01‑27:
Waterfall 2006 - hilarious.
- 2006‑01‑27:
StPeter's ETel presentation about Jabber - somewhat Takahashi.
- 2006‑01‑27:
Blackworm infection stats from LURHQ.
- 2006‑01‑27:
Google cache deemed fair use in court.
- 2006‑01‑26:
OpenWengo multi-platform SIP softphone.
- 2006‑01‑26:
There are no SIMPLE folk out there to chat with.
- 2006‑01‑26:
XML situps.
- 2006‑01‑26:
AJAX is no overnight success.
- 2006‑01‑26:
Banned Xbox360 ad.
- 2006‑01‑26:
Implementing cryptography on TFT technology for secure display applications.
- 2006‑01‑26:
Video of Robert Watson talking about TrustedBSD.
- 2006‑01‑25:
Axe-throwing.
- 2006‑01‑25:
Jabphone: a Jingle to POTS gateway.
- 2006‑01‑25:
The No Foundation: say no to everything.
- 2006‑01‑25:
Google's web authoring statistics.
- 2006‑01‑25:
University of Cambridge students can now access key textbooks online, thanks to a new project called ebooks@cambridge.
- 2006‑01‑25:
Best wikipedia edit EVAR!
- 2006‑01‑25:
Law students show contempt for Alberto Gonzales.
- 2006‑01‑23:
The problem with precedent.
- 2006‑01‑23:
Interpretation act 1978.
- 2006‑01‑23:
Statutory interpretation.
- 2006‑01‑23:
Common sense and the law.
- 2006‑01‑20:
The Night Climbers of Cambridge, by Whipplesnaith.
- 2006‑01‑19:
Feds try to get indiscriminate porno surveillance data from Google.
- 2006‑01‑19:
Large-format digital photography using a flatbed scanner.
- 2006‑01‑18:
The aargh page.
- 2006‑01‑17:
Build your own Segway.
- 2006‑01‑16:
"Spam will be a thing of the past by [24th Jan 2006]" -- Bill Gates.
- 2006‑01‑16:
Ranking of the world's largest economies, including countries and corporations.
- 2006‑01‑16:
X-ray of an Apple laptop.
- 2006‑01‑15:
TCP control block interdependence.
- 2006‑01‑15:
The BBC 1 Computer Originated World.
- 2006‑01‑15:
MICROS~1 embraces and extends RSS instead of using Atom.
- 2006‑01‑14:
The HP ScanJet PLAY TUNE command, with video.
- 2006‑01‑14:
The case of the disappearing teaspoons: longitudinal cohort study of the displacement of teaspoons in an Australian research institute.
- 2006‑01‑13:
Aeroplane seat layouts.
- 2006‑01‑13:
The YOU-CAN-SPAM act does not override local anti-spam policies.
- 2006‑01‑11:
GOSSiP is a massively distributed, peer-to-peer reputation system for email.
- 2006‑01‑11:
Why TCP-over-TCP is a bad idea.
- 2006‑01‑11:
V.iruses I.nfections S.pyware T.rojans A.dware
- 2006‑01‑11:
An interesting use for Jabber.
- 2006‑01‑10:
Performance characteristics of application-level security protocols.
- 2006‑01‑10:
SER SIMPLE/XMPP gateway module.
- 2006‑01‑10:
Attack-resistant trust metrics.
- 2006‑01‑10:
Tube time-travel map.
- 2006‑01‑10:
A complex system that works is invariably found to have evolved from a simple system that worked.
- 2006‑01‑10:
Don't invent new XML languages.
- 2006‑01‑10:
Nice physical + political map of the world.
- 2006‑01‑10:
Google movie search in Cambridge.
- 2006‑01‑10:
A pixel is not a little square.
- 2006‑01‑10:
Maritime lawsuit served by email is valid.
- 2006‑01‑06:
Floating point arithmetic in C++ templates.
- 2006‑01‑04:
Key-bumping revisited.
- 2006‑01‑04:
Toool's bumpkey alert movie.
- 2006‑01‑04:
A video to do with security patches etc.
- 2006‑01‑03:
Urban railway maps for your iPod photo.
- 2006‑01‑03:
The solar system is just a theory.
- 2006‑01‑03:
Chemistry is just a theory.
- 2006‑01‑02:
Tim Bray on character strings.
- 2005‑12‑31:
A log, painful, history of time.
- 2005‑12‑30:
Countering trusting trust through diverse double-compiling.
- 2005‑12‑29:
Cambridge pubs and Google maps.
- 2005‑12‑29:
Kitten war!
- 2005‑12‑24:
Ingy: the name change with rock dots.
- 2005‑12‑23:
Comparison Of Secure Email Technologies: X.509 / PKI, PGP, and IBE.
- 2005‑12‑22:
A critique of Abelson and Sussman: why calculating is better than scheming.
- 2005‑12‑22:
The structure and interpretation of the computer science curriculum.
- 2005‑12‑22:
The undergraduate language course: what to do?
- 2005‑12‑21:
An excellent IPv6 deployment report.
- 2005‑12‑18:
Efficient method dispatch in PCL.
- 2005‑12‑18:
Composing Contracts: and adventure in financial engineering.
- 2005‑12‑18:
Comparison of dynamic string libraries.
- 2005‑12‑18:
Interactive Connectivity Establishment via NATs for SIP
- 2005‑12‑18:
Security for JEP-0065.
- 2005‑12‑16:
Gatewaying Jingle and SIP.
- 2005‑12‑16:
Jingle mailing list archives.
- 2005‑12‑16:
Jabberd2 storage backend migration.
- 2005‑12‑16:
Notification of new email via Jabber with procmail and perl.
- 2005‑12‑14:
The Royal Commission for the Exhibition of 1851.
- 2005‑12‑13:
Edinburgh guided bus doesn't work (2).
- 2005‑12‑13:
Edinburgh guided bus doesn't work (1).
- 2005‑12‑13:
Mac Rumours buyers' guide.
- 2005‑12‑12:
Proto-JEPs.
- 2005‑12‑12:
Jabber MUC ChatBot.
- 2005‑12‑12:
Bank Holidays in England.
- 2005‑12‑12:
tcpcp - TCP connection passing.
- 2005‑12‑12:
CryoPID - single-process software suspend for Linux.
- 2005‑12‑09:
Matthias Wimmer's Jabber software.
- 2005‑12‑08:
ML Module Mania.
- 2005‑12‑08:
Bob Jenkins: filling space with orbiting satellites.
- 2005‑12‑08:
Bob Jenkins: Hash functions and block ciphers.
- 2005‑12‑06:
RFC 4287: the Atom syndication format.
- 2005‑12‑05:
Palaver: Jabber multi-user chat component written in Python.
- 2005‑12‑05:
Jabberd2 patches.
- 2005‑12‑05:
Implementing Ken Thompson's 1968 regex algorithm.
- 2005‑12‑05:
University of Cambridge Raven project.
- 2005‑12‑05:
University of Washington pubcookie.
- 2005‑12‑05:
Stanford Webauth v3.
- 2005‑12‑05:
Yale Central Authentication Service.
- 2005‑12‑05:
Linux web browser with bells and whistles on FreeBSD.
- 2005‑12‑04:
Twisted: a Python networking library.
- 2005‑12‑04:
Dave Cridland's IMAP and ACAP stuff.
- 2005‑12‑02:
Text-to-XML conversion using XSLT 2.0.
- 2005‑12‑02:
Brompton frame parts in a box.
- 2005‑12‑01:
David Tribble's longtime_t proposal.
- 2005‑12‑01:
Tunnels at CMU.
- 2005‑12‑01:
Bullets hitting fruit etc.
- 2005‑12‑01:
Over-engineered chair repair.
- 2005‑12‑01:
The history of short names of USA federal legislation.
- 2005‑11‑29:
Peter Saint-Andre's draft JEPs.
- 2005‑11‑04:
A timelapse film made by Tom.
- 2005‑11‑04:
IETF Jabber chat rooms.
- 2005‑11‑04:
Podcast of the SICP lectures.
- 2005‑11‑02:
Reserved identifiers in C and C++.
- 2005‑11‑01:
Proposed Haskell time library.
- 2005‑11‑01:
Sony installs rootkits on customers' machines.
- 2005‑11‑01:
Collaborative English Law Glossary.
- 2005‑11‑01:
Maps of UK climate.
- 2005‑11‑01:
Threads cannot be implemented as a library.
- 2005‑11‑01:
Shared memory consistency models: a tutorial.
- 2005‑10‑31:
"Enterprise software" is a social, not technical, phenomenon.
- 2005‑10‑31:
Grice's Conversational Maxims.
- 2005‑10‑31:
Oxford University Library Service organization plan.
- 2005‑10‑26:
Technical reasons for the dual function/value namespaces in Lisp.
- 2005‑10‑26:
Haskell inner-loop compilation: jhc vs. ghc.
- 2005‑10‑25:
Official UK bird flu logo (from the Foreign Office).
- 2005‑10‑25:
More Google Print satire.
- 2005‑10‑24:
Causes of resonance in London's Millennium Footbridge.
- 2005‑10‑24:
Torotrak continuously-variable transmission.
- 2005‑10‑24:
Greenspun's Tenth Rule of Programming used against Lispers.
- 2005‑10‑24:
Tim O'Reilly on Google Print.
- 2005‑10‑24:
Stanford on iTunes.
- 2005‑10‑24:
John C. Dvorak on the Mac-biased tech media.
- 2005‑10‑24:
MICROS~1 research tutorial on filtering spam.
- 2005‑10‑24:
Student-oriented information about computing facilities at Cambridge.
- 2005‑10‑21:
Fallbrook Technologies NuVinci continuously variable planetary transmission.
- 2005‑10‑21:
Rogue banks and phantom withdrawals.
- 2005‑10‑21:
Sadly, I can never un-read anything.
- 2005‑10‑20:
Recordings of seminars hosted by the Long Now Foundation.
- 2005‑10‑20:
C#: Yesterday, Today, and Tomorrow: An Interview with Anders Hejlsberg, Part 1.
- 2005‑10‑20:
Messaging anti-abuse working group: managing port 25.
- 2005‑10‑20:
Andy Oram: Why they are talking about "Internet governance".
- 2005‑10‑20:
Interview with Larry Wall.
- 2005‑10‑19:
OSCON 2005 keynote from Dick Haardt about Identity 2.0.
- 2005‑10‑19:
Composable transations for concurrent programming in Haskell.
- 2005‑10‑19:
Maurice Herlihy's composable transactions for C#.
- 2005‑10‑19:
Company-wide instant messaging with jabberd.
- 2005‑10‑19:
Efficient software transactional memory.
- 2005‑10‑19:
The Gmail trademark dispute gets nastier.
- 2005‑10‑18:
Tact filters.
- 2005‑10‑17:
Reverse engineered colour laser printer watermarks.
- 2005‑10‑17:
Ozgur Simsek and David Jensen: Decentralized search in networks using homophily and degree disparity.
- 2005‑10‑17:
Pedestrian == terrorist.
- 2005‑10‑17:
Tim O'Reilly: What is web 2.0?
- 2005‑10‑13:
Google 2084.
- 2005‑10‑13:
How to write like a wanker.
- 2005‑10‑11:
The 1986 Domesday project.
- 2005‑10‑10:
DHCP and OS fingerprinting for campus network security.
- 2005‑10‑07:
The canonical Internet vs X.400 debate.
- 2005‑10‑07:
Smack my bitch up / Orinoco flow.
- 2005‑10‑07:
BCP 78 is broken.
- 2005‑10‑07:
A natural history of the @ sign.
- 2005‑10‑06:
Optimising for fun.
- 2005‑10‑06:
(Re-)Recordable DVD compatibility.
- 2005‑10‑04:
Alphamail - webmail software that doesn't hammer the IMAP server.
- 2005‑10‑04:
Cyrusoft, producers of Mulberry, go bankrupt.
- 2005‑10‑04:
Rodney Haywood's anti-Outlook page.
- 2005‑10‑04:
Lots of stuff about UW Pine.
- 2005‑10‑04:
Design patterns for hiagh availability.
- 2005‑10‑04:
Architecture of safety-critical systems.
- 2005‑09‑30:
PBS: a class divided - a documentary of Jane Elliott's brown eyes / blue eyes racism teaching exercise.
- 2005‑09‑30:
Satellite photo with tube map superimposed.
- 2005‑09‑30:
A live chat with Rod Chavez of Google Talk.
- 2005‑09‑29:
List of zip codes, including international codes.
- 2005‑09‑29:
Say no to 0870 - translate expensive phone numbers into geographical numbers.
- 2005‑09‑28:
Continuations from Generalized Stack Inspection.
- 2005‑09‑27:
Another kind of pump-and-dump spam.
- 2005‑09‑26:
Web 2.0 is here - tags, ajax, blogs, wikis.
- 2005‑09‑26:
Theiving Bromptons and fencing them via eBay.
- 2005‑09‑26:
Absurd multi-wheeled cycles.
- 2005‑09‑23:
Choose your secondary nameservers carefully.
- 2005‑09‑22:
The law of standards.
- 2005‑09‑16:
Failure to Thrive: QoS and the Culture of Operational Networking
- 2005‑09‑16:
The New Highway Code.
- 2005‑09‑16:
East Coast Main Line strategic review.
- 2005‑09‑15:
ARPA-DARPA-Internet: a history of the introduction of TCP/IP.
- 2005‑09‑15:
RFK 821: SMTP polymorph command
- 2005‑09‑13:
Google - Extracting knowledge from the WWW.
- 2005‑09‑12:
Documentation for CompleteWhois DNS IP lists.
- 2005‑09‑12:
DNS blacklist accuracy, Aug 2005, according to SpamAssassin.
- 2005‑09‑12:
20 years ago in the IETF.
- 2005‑09‑12:
"Botnets are a kind of industrial revolution in hacking."
- 2005‑09‑09:
Why architectural complexity is like body fat.
- 2005‑09‑09:
Bit-twiddling powers of 2.
- 2005‑09‑09:
Salon.com: Religious right would kill to stop safe sex
- 2005‑09‑08:
Survey of uses of the word "envelope" in the RFCs.
- 2005‑09‑08:
A survey of bad science reporting.
- 2005‑09‑06:
Dynamic cyclic data structures in lazy functional languages.
- 2005‑09‑06:
Burwell to Wicken Fen cycle route - council press release.
- 2005‑09‑05:
New Orleans is vital to the US economy.
- 2005‑09‑05:
Object-oriented programming in ANSI C.
- 2005‑08‑30:
MD5 collision, visualized.
- 2005‑08‑30:
GNU mailutils.
- 2005‑08‑30:
libEtPan - email access library.
- 2005‑08‑30:
IETF 63 survey results.
- 2005‑08‑30:
Inductive graphs and functional graph algorithms.
- 2005‑08‑30:
Rugby MSF slow code.
- 2005‑08‑26:
Java sucks.
- 2005‑08‑26:
(dot)local: developer resources for zeroconf, mDNS, and DNS-SD.
- 2005‑08‑26:
DNS service discovery.
- 2005‑08‑25:
Brad Fitzpatrick's disk cache checker.
- 2005‑08‑24:
Vulnerabilities in tamper-evident PIN letters.
- 2005‑08‑20:
A Google programming language for large-scale data mining.
- 2005‑08‑20:
Breakdancing Transformers.
- 2005‑08‑18:
Revised Report on the Algorithmic Language ALGOL 68.
- 2005‑08‑18:
Algol 68 genie.
- 2005‑08‑18:
Damian Conway's papers, including SPECS: an alternative syntax for C++.
- 2005‑08‑18:
Infixing operators in SML.
- 2005‑08‑18:
Comparing implementations of a ray tracer in different languages.
- 2005‑08‑17:
Red car / black car.
- 2005‑08‑16:
A Dictionary of units of measurement.
- 2005‑08‑15:
Knot hacks.
- 2005‑08‑15:
SGO party calendar.
- 2005‑08‑15:
Some non-spam stats.
- 2005‑08‑12:
Building a monocycle for Scrapheap Challenge.
- 2005‑08‑12:
Google factory tour.
- 2005‑08‑12:
A board game based on cat chess.
- 2005‑08‑12:
Cat chess.
- 2005‑08‑11:
Where are all the three button mice?
- 2005‑08‑11:
User interface design for secure systems.
- 2005‑08‑11:
Why type systems are interesting.
- 2005‑08‑11:
Photograph taken at the instant of destruction of the camera.
- 2005‑08‑11:
A FAQ about spinning pens.
- 2005‑08‑10:
Efficient submatch addressing for regular expressions.
- 2005‑08‑10:
The TRE regex library.
- 2005‑08‑08:
Using Exim and LDAP to query an Active Directory for valid users.
- 2005‑08‑08:
A profile of Andrew Ritchie.
- 2005‑08‑08:
Bike speed and power calculator.
- 2005‑08‑08:
Digital Needle: a virtual gramophone.
- 2005‑08‑03:
SPF loses mindshare.
- 2005‑08‑02:
Alt-N Technologies.
- 2005‑08‑02:
DKIM implementation from Alt-N Technologies.
- 2005‑07‑29:
Suresh Ramasubramanian on SPF.
- 2005‑07‑29:
DDOS mitigation techniques.
- 2005‑07‑28:
"email is something you use with old people"
- 2005‑07‑28:
Personal Offshoring.
- 2005‑07‑27:
Podsafe music links.
- 2005‑07‑27:
DSN support for Exim.
- 2005‑07‑27:
Cisco remote-code-execution hole cover-up?
- 2005‑07‑27:
Pay and Grading graces.
- 2005‑07‑27:
Pay and Grading notice.
- 2005‑07‑27:
Proposed amendments to the Pay and Grading graces.
- 2005‑07‑26:
Jezlife.
- 2005‑07‑26:
Completewhois multi-rbl lookup.
- 2005‑07‑26:
MAAWG SPF & SID white paper.
- 2005‑07‑26:
DHTML Lemmings.
- 2005‑07‑26:
Blame-shifting and credit-stealing in ICMP vulnerability disclosure.
- 2005‑07‑25:
Conference on email and anti-spam 2005 papers.
- 2005‑07‑25:
Spread: high-performance reliable multicast.
- 2005‑07‑25:
Microsoft explains how to ask for help.
- 2005‑07‑25:
Photographs of my wedding.
- 2005‑07‑25:
Blogging survey results.
- 2005‑07‑07:
Type system support for units of measurement. (Andrew Kennedy)
- 2005‑07‑06:
The design of C++0X.
- 2005‑07‑05:
Precision sundials.
- 2005‑07‑04:
A talk about problems with software patents, by Wookie from Aleph-1.
- 2005‑07‑04:
SRP: Secure Remote Password.
- 2005‑07‑04:
TV-B-Gone.
- 2005‑07‑04:
Automatic coin sorter.
- 2005‑07‑03:
Design Concepts in Programming Languages - draft of book.
- 2005‑06‑28:
The successor to C99: working document.
- 2005‑06‑28:
Grammatical errors in "The New C Standard".
- 2005‑06‑28:
FTC spam zombie recommendations.
- 2005‑06‑26:
Risk factors in cycling.
- 2005‑06‑26:
On some broken email auto-responders.
- 2005‑06‑24:
De facto standards are more effective than de jure.
- 2005‑06‑24:
Live lightning map.
- 2005‑06‑24:
Logicalware mailmanager: email response management software.
- 2005‑06‑24:
Popular spellings of braaaaaaaaaains.
- 2005‑06‑23:
FTC email authentication feedback.
- 2005‑06‑23:
Rambling Rosa "Kiftsgate".
- 2005‑06‑23:
PSP grey imports are illegal.
- 2005‑06‑23:
Fast queue runner for Exim.
- 2005‑06‑22:
Inside a Sturmey-Archer 8-speed hub gear.
- 2005‑06‑22:
An RSS-to-email gateway.
- 2005‑06‑21:
All about the TGV.
- 2005‑06‑21:
Trains are better than planes.
- 2005‑06‑21:
"The New C Standard - An Economic and Cultural Commentary" complete PDF.
- 2005‑06‑21:
"The New C Standard - An Economic and Cultural Commentary" will not be published.
- 2005‑06‑20:
SUSE packaging conventions.
- 2005‑06‑20:
Cambridge makes you happy and Oxford makes you sad.
- 2005‑06‑18:
The importance of RSS.
- 2005‑06‑18:
Open-air art and sculpture in Cambridge.
- 2005‑06‑17:
Oxford and Cambridge cycling survey results.
- 2005‑06‑16:
Linux syslogd sometimes hangs and wedges the whole machine.
- 2005‑06‑16:
IRC in Latin.
- 2005‑06‑16:
Bottom-Up Beta-Substitution: Uplinks and Lambda-DAGs.
- 2005‑06‑15:
Concepts, Techniques, and Models of Computer Programming by Peter Van Roy and Seif Haridi (pub. MIT Press).
- 2005‑06‑15:
USA to ban flag-burning.
- 2005‑06‑15:
Digital TV broadcast from a monitor.
- 2005‑06‑15:
Music radio broadcast from a monitor.
- 2005‑06‑14:
Fight over LEMONADE and the Multimedia Messaging Service.
- 2005‑06‑14:
Group authentication for the web (see also OpenID).
- 2005‑06‑14:
"I will refuse to register for an ID card and will donate £10 to a legal defence fund but only if 10,000 other people will also make this same pledge."
- 2005‑06‑13:
Where is London Underground under the ground?
- 2005‑06‑13:
Geek Image: display an updating image on the Mac OS X dashboard.
- 2005‑06‑13:
Some behind-the-scenes Mac OS X options.
- 2005‑06‑13:
CLIX Mac OS X power tool.
- 2005‑06‑13:
SSH key chain for Mac OS X.
- 2005‑06‑13:
London cycling design standards.
- 2005‑06‑10:
Funniest wikipedia edit wars ever.
- 2005‑06‑08:
Team Cymru / NSP-sec network health reports.
- 2005‑06‑08:
NSP-sec NANOG BOF.
- 2005‑06‑08:
NSP-security mailing list.
- 2005‑06‑03:
Ajax Reconsidered.
- 2005‑06‑02:
Logo hell.
- 2005‑06‑02:
The Invisible Train: augmented reality on handhelds.
- 2005‑06‑02:
So does Norman Foster.
- 2005‑06‑02:
James Dyson loves Alex Moulton's bikes.
- 2005‑06‑01:
A list of latin phrases.
- 2005‑06‑01:
Philip Hazel's music typesetting software.
- 2005‑05‑30:
Find fonts by sight.
- 2005‑05‑29:
ID cards will be expensive.
- 2005‑05‑27:
ZMail easy secure email.
- 2005‑05‑27:
Pen: a load balancer for "simple" tcp based protocols.
- 2005‑05‑27:
You and your research - Richard Hamming.
- 2005‑05‑27:
Long hours don't work.
- 2005‑05‑27:
Suresh Ramasubramanian on Spam for the OECD.
- 2005‑05‑26:
Swatch: log watcher.
- 2005‑05‑26:
Some cycling rules.
- 2005‑05‑26:
RFC 3339: Date and time on the Internet: Timestamps.
- 2005‑05‑26:
Jef Poskanzer on spam filtering.
- 2005‑05‑25:
Other Jim Austen computers.
- 2005‑05‑25:
Where Phoenix went after Cambridge.
- 2005‑05‑19:
Google content blocker.
- 2005‑05‑19:
mIDm self-identification on the world wide web.
- 2005‑05‑19:
OpenID distributed identity system.
- 2005‑05‑16:
TV piracy.
- 2005‑05‑13:
The Pedersen bicycle.
- 2005‑05‑12:
The Laws of Identity.
- 2005‑05‑11:
[Exim] exilimit.c
- 2005‑05‑11:
Living in the future.
- 2005‑05‑10:
Julian Wiseman on financial markets and electoral systems.
- 2005‑05‑08:
The Algol Bulletin.
- 2005‑05‑08:
Die Homepage von W.B.Kloke - Algol 68 stuff.
- 2005‑05‑05:
Estimated constituency result declaration times.
- 2005‑05‑05:
Time series analysis.
- 2005‑05‑05:
On the effectiveness of rate-limiting mechanisms.
- 2005‑05‑05:
DNS root anycast stability.
- 2005‑05‑05:
Smoothing of data.
- 2005‑05‑05:
Usenet poster rate limiting.
- 2005‑05‑04:
A cycling glossary.
- 2005‑05‑04:
Interdoc: The first international non-governmental computer network.
- 2005‑05‑04:
llama llama llama
- 2005‑05‑03:
GCC 3.4 vs. GCC 4.0.
- 2005‑05‑03:
[Exim] Deferring email when clamd is down.
- 2005‑05‑03:
On the analysis of anti-spam software performance.
- 2005‑05‑02:
Building a free PVR.
- 2005‑05‑02:
The Monad Reader - a Haskell web mag.
- 2005‑04‑29:
Email performance and reliability testing.
- 2005‑04‑29:
Bit twiddling hacks.
- 2005‑04‑28:
USB Ethernet on Macs.
- 2005‑04‑27:
About Bagle (3).
- 2005‑04‑27:
About Bagle (2).
- 2005‑04‑27:
About Bagle (1).
- 2005‑04‑27:
Combating Web Spam with TrustRank.
- 2005‑04‑27:
Mac Mini accessories.
- 2005‑04‑27:
Dictionary of idioms.
- 2005‑04‑27:
Rewards are punishments.
- 2005‑04‑27:
DNS zone checker.
- 2005‑04‑27:
TLD configuration problem checker.
- 2005‑04‑27:
Snails faster than ADSL.
- 2005‑04‑21:
The root of the matter: hints or slaves.
- 2005‑04‑20:
Greylisting CVS.
- 2005‑04‑20:
DNS cacheing and performance analysis.
- 2005‑04‑20:
MIT Disco Dance Floor.
- 2005‑04‑19:
Messaging hygiene at Microsoft.
- 2005‑04‑19:
Bridge of CRTs.
- 2005‑04‑15:
Spoof papers for fraudulent "scientific" conferences.
- 2005‑04‑13:
Mad bike.
- 2005‑04‑12:
Systems analysis of spam by Gabriel Weinberg.
- 2005‑04‑12:
Joe on Zombies.
- 2005‑04‑12:
Joe St Sauver - uoregon mail admin.
- 2005‑04‑12:
Excellent port 25 blocking advocacy.
- 2005‑04‑11:
Over-engineered bike lights.
- 2005‑04‑11:
Simon Moore's University house style LaTeX macros.
- 2005‑04‑10:
Poke the penguin.
- 2005‑04‑09:
Another view of a Moebius strip with a circular edge.
- 2005‑04‑09:
Maple code for drawing Moebius strips.
- 2005‑04‑09:
Moebius strips with circular edges.
- 2005‑04‑08:
Sennheiser HD 212 Pro specifications.
- 2005‑04‑08:
The lies of the RIAA.
- 2005‑04‑07:
Green electricity supplier.
- 2005‑04‑07:
Domestic wind power.
- 2005‑04‑07:
Rack mounted wine storage.
- 2005‑04‑05:
The Manchester/Ferranti Atlas and the Cambridge Titan/Atlas 2.
- 2005‑04‑04:
The Concrete Jungle by Charlie Storss.
- 2005‑04‑03:
Anti-hagiography.
- 2005‑04‑01:
Charlie Stross trancends.
- 2005‑03‑29:
Interview with Robin Milner.
- 2005‑03‑29:
Haskell Quotes.
- 2005‑03‑29:
DNS Anycast at Berkeley.
- 2005‑03‑29:
ISC DNS Anycast.
- 2005‑03‑29:
Deploying IP Anycast at CMU.
- 2005‑03‑25:
Fractal borders between the Netherlands and Belgium.
- 2005‑03‑24:
V.A.T. and food.
- 2005‑03‑22:
Funky time signatures.
- 2005‑03‑21:
Haskell Users' Operating System and Environment.
- 2005‑03‑20:
The Third International Conference on Trust Management.
- 2005‑03‑18:
FreeBSD PXE boot guide.
- 2005‑03‑02:
A celebration of David Wheeler.
- 2005‑02‑28:
Unitarians of Transylvania.
- 2005‑02‑18:
A fluffy guide to hash algorithms.
- 2005‑02‑17:
CodeWorker: A universal parsing tool and a source code generator.
- 2005‑02‑16:
JWZ on groupware.
- 2005‑02‑16:
Cryptographic hash function lounge.
- 2005‑02‑11:
SSL considered harmful.
- 2005‑02‑09:
An SMTP daemon written in Haskell.
- 2005‑02‑04:
The Porter Stemming Algorithm.
- 2005‑02‑04:
hOp: Haskell operating system.
- 2005‑02‑03:
The New York Review of Books on the US versus the EU.
- 2005‑02‑03:
IMAP products database.
- 2005‑02‑01:
RFC errata.
- 2005‑01‑30:
EU news fact-check.
- 2005‑01‑27:
A modern Newspeak dictionary.
- 2005‑01‑27:
A Newspeak dictionsry.
- 2005‑01‑26:
Some Mac software recommendations.
- 2005‑01‑24:
Paper Enigma machine.
- 2005‑01‑24:
Online form for reporting non-dangerous highway defects.
- 2005‑01‑24:
Cambridgeshire County Council highways maintenance.
- 2005‑01‑24:
Anti-spam news archive (subscribers only).
- 2005‑01‑21:
Spheres of Chaos.
- 2005‑01‑21:
M$ Outlook Live.
- 2005‑01‑21:
Apatheism.
- 2005‑01‑19:
Ian's shoelace site.
- 2005‑01‑18:
John Perry's small discoveries.
- 2005‑01‑18:
The social life of paper.
- 2005‑01‑18:
Who Can Name the Bigger Number?
- 2005‑01‑18:
History of the logarithmic slide rule.
- 2005‑01‑18:
Most persistent bugs.
- 2005‑01‑18:
Bayesian Noise Reduction.
- 2005‑01‑18:
Honeypot project: Life expectancy of unpatched Linux increasing.
- 2005‑01‑16:
Ben Hamilton-Baillie's humanist road designs.
- 2005‑01‑10:
Pew Internet Report on Internet Evolution.
- 2005‑01‑10:
Apple support for old products.
- 2005‑01‑10:
Old Apple software downloads.
- 2005‑01‑06:
The Edge annual question 2005.
- 2005‑01‑05:
Google MapReduce.
- 2005‑01‑05:
"I will suck the smell of grilled moron greedily down into my lungs."
- 2005‑01‑04:
Some other linguistic devices.
- 2005‑01‑04:
More zeugmata.
- 2005‑01‑04:
Zeugma or syllepsis.
- 2005‑01‑04:
Schneier on illegal aliens, drivers licences, and security.
- 2005‑01‑04:
Sugar! Gosh darn it to heck!
- 2005‑01‑04:
Linotype maintenance and operation.
- 2005‑01‑04:
A description of the Linotype machine.
- 2005‑01‑01:
Where to buy a large tippe-top.
- 2005‑01‑01:
A nice large tippe-top.
- 2005‑01‑01:
Hand-drawn holograms.
- 2005‑01‑01:
Levitron: an amazing invention and a patent failure.
- 2005‑01‑01:
Levitron: spin-stabilized magnetic levitation.
- 2005‑01‑01:
A big tippe-top.
- 2005‑01‑01:
The Science Museum large object archive at Wroughton.
- 2005‑01‑01:
Tippe-top inversion as a dissipation-induced instability.
- 2005‑01‑01:
The "tippe-top": a self-inverting spinning toy.
- 2005‑01‑01:
The rigid body dynamics of unidirectional spin.
- 2005‑01‑01:
The "rattleback": a self-reversing spinning toy.
- 2004‑12‑22:
HEFCE self-assessment tool for people management in HEIs.
- 2004‑12‑22:
Graham Higgins on the Apple web site.
- 2004‑12‑22:
Thank Poland for stopping the EU software patents directive.
- 2004‑12‑22:
The creation of the Apple Mac graphing calculator.
- 2004‑12‑17:
A blog about RSS bandwidth management.
- 2004‑12‑15:
Rechargeable LED lights.
- 2004‑12‑15:
The creation of Kerberos in four scenes.
- 2004‑12‑15:
More cycle farcilities.
- 2004‑12‑15:
Watching a genius laying down the very foundations of science.
- 2004‑12‑13:
Berkeley email namespace policy.
- 2004‑12‑13:
HP Labs qprof.
- 2004‑12‑13:
Another death waltz.
- 2004‑12‑13:
A death waltz.
- 2004‑12‑13:
Online Etymological Dictionary.
- 2004‑12‑13:
Python Warts.
- 2004‑12‑13:
Eric Mayer's S5: A Simple Standards-Based Slide Show System.
- 2004‑12‑10:
Cycling Farcility of the Month.
- 2004‑12‑08:
Tim Hunkin's web page.
- 2004‑12‑06:
MIME message/partial vulnerabilities.
- 2004‑12‑06:
IP over DNS.
- 2004‑12‑03:
Excellent Tube map links.
- 2004‑12‑03:
PowerPoint Centimeters Different from Actual Centimeters.
- 2004‑12‑03:
Requirements for Morality Sections in Routing Area Drafts.
- 2004‑11‑25:
The Home Computer in 2004.
- 2004‑11‑23:
Le Guin on the Earthsea film.
- 2004‑11‑22:
Disclaimer stickers for school textbooks.
- 2004‑11‑22:
Google tech talk at Imperial College next week.
- 2004‑11‑22:
Kit Williams and Masquerade.
- 2004‑11‑22:
Omniglot: a guide to writing systems.
- 2004‑11‑18:
Emperor Norton Utilities.
- 2004‑11‑16:
The EFF on anti-spam collateral damage.
- 2004‑11‑15:
Crash Bonsai.
- 2004‑11‑11:
Illiterate?
- 2004‑11‑11:
Something worth having in Cambridge too.
- 2004‑11‑09:
Another asynchronous resolver library.
- 2004‑11‑09:
Drinking doesn't affect my driving?
- 2004‑11‑06:
A compendium of US election maps.
- 2004‑11‑04:
Another MUA configuration guide.
- 2004‑11‑03:
NSA guide to OS X security.
- 2004‑10‑31:
Cambridge Monopoly.
- 2004‑10‑29:
Wooden mirror.
- 2004‑10‑27:
The film "Rogue Farm" from the story by Charlie Stross.
- 2004‑10‑26:
List of email DNS black and white lists.
- 2004‑10‑21:
IMHO Webmail.
- 2004‑10‑18:
Perl DNS server framework.
- 2004‑10‑18:
Two pound coins.
- 2004‑10‑16:
Security considerations for impersonation and identiry in messaging systems.
- 2004‑10‑15:
Department of Cryptozoology, University of Birmingham.
- 2004‑10‑15:
St. Mischa's College, University of Oxford.
- 2004‑10‑15:
Turing Equivalence in Automated Systems Administration.
- 2004‑10‑14:
Flash guide to electronic music genres.
- 2004‑10‑14:
Big Ben.
- 2004‑10‑14:
DNS resources directory.
- 2004‑10‑14:
Ethical approaches to postmastering.
- 2004‑10‑07:
osx2x
- 2004‑10‑07:
Weapons of mass destruction.
- 2004‑10‑06:
AOL states that SPF can't be used to reject email.
- 2004‑10‑06:
AOL states that SPF doesn't work 20% of the time.
- 2004‑10‑06:
Binaries of Emacs for Mac OS X.
- 2004‑10‑04:
ESR in "loon" shocker.
- 2004‑10‑03:
Qmail anti bogus bounce system.
- 2004‑10‑01:
FIPR workshop in Cambridge.
- 2004‑09‑28:
Client SMTP validation.
- 2004‑09‑28:
Amusing satires.
- 2004‑09‑24:
Mezzo bike.
- 2004‑09‑23:
Death to Sender-ID.
- 2004‑09‑22:
Using OpenBSD's pf OS fingerprinting to throttle email from Windows boxes.
- 2004‑09‑22:
Misreading the Lord of the Rings.
- 2004‑09‑19:
Stanford WebAuth v3.
- 2004‑09‑19:
Another FTC spam summit link.
- 2004‑09‑19:
Pete Resnick on Resent-From and Sender-ID.
- 2004‑09‑17:
Anti-Spam Technical Alliance Statement of Intent.
- 2004‑09‑16:
The Microsoft Sender-ID patent application.
- 2004‑09‑16:
FTC email authentication summit.
- 2004‑09‑16:
AOL dumps Sender-ID.
- 2004‑09‑16:
Gates goes to Washington.
- 2004‑09‑14:
Internet Analysis Report 2004.
- 2004‑09‑07:
All about Support Vector Machines.
- 2004‑09‑06:
Retro phones of the future.
- 2004‑09‑03:
Drawing The Union Jack Accurately.
- 2004‑09‑03:
Links to style guides.
- 2004‑09‑03:
Furbeowulf.
- 2004‑09‑02:
Legalistic synonymy, etc.
- 2004‑09‑02:
Setting up and troubleshooting the GSSAPI authentication of SASL.
- 2004‑09‑02:
ARPANET network diagram.
- 2004‑08‑31:
Problems with the REPLY function in email.
- 2004‑08‑18:
David Wheeler's cool stuff.
- 2004‑08‑18:
Selecting cryptographic key sizes.
- 2004‑08‑17:
SRS in sendmail rulesets.
- 2004‑08‑12:
Live UK weather maps.
- 2004‑08‑12:
Hijacked IP address blocks.
- 2004‑08‑11:
Brown Bear web calendar software.
- 2004‑08‑10:
Sieve extensions support matrix.
- 2004‑08‑09:
One of my rants about why SPF et al. are bad ideas.
- 2004‑08‑06:
SubEthaEdit: real-time collaborative editing.
- 2004‑07‑26:
ATI Radeon 7000 PC to Mac conversion.
- 2004‑07‑24:
About the early development of TCP/IP.
- 2004‑07‑24:
Netizens: a book about the history of Usenet and the Internet.
- 2004‑07‑19:
Control Mac OS X iTunes from within emacs.
- 2004‑07‑15:
An excellent comparison of statistical spam classifiers.
- 2004‑07‑14:
ICANN Security and Stability Advisory Committee report on SiteFinder.
- 2004‑07‑11:
Chairman's report from the ITU WSIS spam meeting.
- 2004‑07‑11:
Spam filtering for MXs.
- 2004‑07‑09:
Unified SPF.
- 2004‑07‑07:
Virtual desktops for Mac OS X.
- 2004‑07‑06:
Even more maths jokes.
- 2004‑07‑06:
More maths jokes.
- 2004‑07‑06:
Maths jokes.
- 2004‑07‑05:
Consumer broadband and traffic shaping.
- 2004‑07‑05:
Rugby Radio station, including the recent demolition works.
- 2004‑07‑02:
Weather movie.
- 2004‑06‑25:
Steve Allen on leap seconds.
- 2004‑06‑25:
Proceedings of the ITU colloquium on UTC.
- 2004‑06‑25:
Markus Kuhn on leap seconds.
- 2004‑06‑25:
Metrologia on the history of the leap second.
- 2004‑06‑25:
Archives of the LEAPSECS mailing list.
- 2004‑06‑25:
Bus jam.
- 2004‑06‑25:
Greylisting with Exim and MySQL.
- 2004‑06‑23:
Japanese for programmers.
- 2004‑06‑18:
The NTP server pool project.
- 2004‑06‑17:
A good Cambridge History site.
- 2004‑06‑17:
Another email kook for your amusement.
- 2004‑06‑14:
The Chord p2p project.
- 2004‑06‑08:
Exchange 2003 SMTP-time recipient verification.
- 2004‑06‑07:
Internet-Draft archive.
- 2004‑06‑06:
What is the speed of an unladen swallow?
- 2004‑05‑20:
Solving CAPTCHAs by obtaining work from humans in return for porn.
- 2004‑05‑19:
Pretty Cambridge pictures.
- 2004‑05‑18:
The Merton Time Ceremony.
- 2004‑05‑18:
DomainKeys specification published.
- 2004‑05‑18:
Exploiting a JVM using a desk lamp to induce memory errors.
- 2004‑05‑17:
The Yost serial device wiring standard.
- 2004‑05‑15:
Common Errors in English Usage.
- 2004‑05‑13:
The Infinite Cat Project.
- 2004‑05‑13:
Coping with Windows.
- 2004‑05‑13:
Sieve tips.
- 2004‑05‑12:
The Arbory Trust -- woodland burial.
- 2004‑05‑12:
The Museum of Broken Packets.
- 2004‑05‑11:
Balkanized North America.
- 2004‑05‑11:
A guide to British Pub etiquette.
- 2004‑05‑11:
More graphics-related magic.
- 2004‑05‑11:
Fast inverse square root from Quake 3.
- 2004‑05‑11:
Base41 not usable everywhere.
- 2004‑05‑11:
Base41 for encoding 2 bytes in 3.
- 2004‑05‑10:
IMail <> bogosity.
- 2004‑05‑09:
European multi-language proverbs.
- 2004‑05‑05:
How the Wombles came to the New Museums Site, and other stories.
- 2004‑04‑29:
The gallery of regrettable food.
- 2004‑04‑27:
The Standards for Efficient Cryptography group.
- 2004‑04‑26:
You might be an anti-spam kook if...
- 2004‑04‑26:
The Great Satan is giving away vector graphics software for the Mac.
- 2004‑04‑26:
Chaos: World of Motion.
- 2004‑04‑26:
To or For By With or From Everybody: A Transport of Delight.
- 2004‑04‑23:
Hacker's Delight on the web.
- 2004‑04‑23:
Da Vinci does badgers.
- 2004‑04‑21:
Call-by-value is dual to call-by-name.
- 2004‑04‑21:
The discoveries of continuations.
- 2004‑04‑20:
Vacuum coffee brewers.
- 2004‑04‑19:
Anti-spam at Aberystwyth University.
- 2004‑04‑14:
The Lions Book on-line.
- 2004‑04‑13:
Not the American Psycho view of getting into a New York restaurant.
- 2004‑04‑13:
Comparing Hoare and Wirth.
- 2004‑04‑08:
A nicely altered Slashdot.
- 2004‑04‑07:
Why your solution to spam will not work.
- 2004‑04‑07:
Email disclaimers and the law.
- 2004‑04‑07:
ACAS document about email policies.
- 2004‑04‑07:
Sharpe drinking game.
- 2004‑04‑01:
Friendly-name email addresses considered harmful.
- 2004‑04‑01:
CCTLDs and their TLD-like subdomains.
- 2004‑04‑01:
Leap year FAQ.
- 2004‑03‑30:
The Guardian Underground Telephone Exchange.
- 2004‑03‑29:
War Rationale, version 10.0.
- 2004‑03‑26:
LOAF: Friend-of-a-friend information exchange for email.
- 2004‑03‑25:
Go to jail fast.
- 2004‑03‑24:
Curiosities of biological nomenclature.
- 2004‑03‑23:
Tube Prune.
- 2004‑03‑23:
213 things you are not allowed to do in the US Army.
- 2004‑03‑19:
Online Sieve script tester.
- 2004‑03‑18:
Paul Vixie's registry of personal colo providers.
- 2004‑03‑17:
RISKS on the source of semantic content in bit streams.
- 2004‑03‑16:
DocBook SGML and XML processing path.
- 2004‑03‑16:
Seeking science fiction citations for the Oxford English Dictionary.
- 2004‑03‑15:
A working postcode finder that does not require registration.
- 2004‑03‑15:
St Totteringham's day.
- 2004‑03‑09:
The Bovine Rectal Palpation Simulator.
- 2004‑03‑08:
Classic papers in Computer Science.
- 2004‑03‑08:
The International Journal of Unconventional Computing.
- 2004‑03‑08:
Bogon filtering templates.
- 2004‑03‑04:
The Burroughs B5000 - 40 years later and still ahead of the times?
- 2004‑03‑03:
Stripping down an anti-virus engine.
- 2004‑03‑03:
AV research weblog from F-Secure.
- 2004‑03‑03:
A faster CiteSeer mirror.
- 2004‑03‑03:
Decommissioned Halon fire suppression system control panel.
- 2004‑03‑03:
Van Jacobson's stillborn 4.4BSD network stack.
- 2004‑03‑02:
A WING and a cake.
- 2004‑03‑02:
CUDN border port blocks. (Cam only)
- 2004‑03‑01:
Military PKI usability and scalability.
- 2004‑03‑01:
Greylisting.
- 2004‑03‑01:
N1040: DTR 19769 - Extensions for new character data types
- 2004‑03‑01:
N1021: DTR 18037 - Extensions for Embedded-C
- 2004‑02‑24:
DSPAM server-side anti-spam filter.
- 2004‑02‑23:
End-to-end arguments in system design.
- 2004‑02‑23:
A BBC BASIC de-tokenizer.
- 2004‑02‑23:
Review of the Matrix Reloaded.
- 2004‑02‑23:
Cambridge and St. Ives guided busway Transport and Works Act order information.
- 2004‑02‑23:
Exim DATA ACL for Received: header DNSBL checks.
- 2004‑02‑23:
A legal lexicon with lots of latin translations.
- 2004‑02‑20:
Standard C Rationale.
- 2004‑02‑18:
IETF Calendaring and Scheduling working group.
- 2004‑02‑18:
Stopping spam text messages for Orange users.
- 2004‑02‑18:
Exim Wiki.
- 2004‑02‑18:
Exim web forums.
- 2004‑02‑13:
Virtual Matthew Garrett.
- 2004‑02‑12:
Selective spam filtering at Glasgow.
- 2004‑02‑12:
Selective spam filtering at Loughborough.
- 2004‑02‑12:
Some entertaining movie records.
- 2004‑02‑11:
What is yak-shaving?
- 2004‑02‑10:
Train departure information for Cambridge.
- 2004‑02‑10:
Ken Moody's continued enthusiasm for my Turing Machine.
- 2004‑02‑09:
A silly DHTML game.
- 2004‑02‑05:
BBC2 television channel idents.
- 2004‑01‑29:
The one-question test for email virus filter authors.
- 2004‑01‑28:
Robert Sedgewick analyses the Shell sort.
- 2004‑01‑26:
Project Evil.
- 2004‑01‑26:
CVS training manual.
- 2004‑01‑25:
The world's most accurate home clock.
- 2004‑01‑23:
OpenGroupware collaboration software.
- 2004‑01‑23:
Orca log statistics graphing software.
- 2004‑01‑21:
Berkeley troff -ms documentation.
- 2004‑01‑21:
UNIX Text Processing.
- 2004‑01‑21:
Forbes Magazine likes spammers.
- 2004‑01‑20:
Managing trolling in a feminist forum.
- 2004‑01‑19:
Qmail security broken.
- 2004‑01‑15:
Big box, small contents.
- 2004‑01‑13:
Showing full email headers with various software.
- 2004‑01‑12:
Q249 is also good for detecting collateral spam.
- 2004‑01‑12:
Some email verification links re: porkhash and q249.
- 2004‑01‑12:
A DNS checker.
- 2004‑01‑08:
All sorts of control sequences.
- 2004‑01‑08:
XTerm control sequences.
- 2004‑01‑08:
Mac OS X hacking tools.
- 2004‑01‑07:
Speed kills.
- 2004‑01‑07:
Louis Wain's psychotic cat pictures.
- 2004‑01‑07:
Drawing on an acid trip.
- 2004‑01‑06:
Tangerines and mandarins.
- 2004‑01‑05:
Greylisting using MySQL.
- 2004‑01‑05:
NASA report on clarity in technical writing.
- 2004‑01‑05:
Five geek social fallacies.
- 2004‑01‑05:
IEEE mass storage reference model.
- 2004‑01‑05:
FreeBSD remote installer.
- 2003‑12‑18:
Full-screen X display benchmarking.
- 2003‑12‑03:
My old BBC BASIC V and ARM assembler implementation of the Game of Life.
- 2003‑12‑03:
Real-life examples of apostrophe abuse.
- 2003‑12‑02:
C coding guidelines for the free thinker.
- 2003‑11‑26:
Antiword: a Microsoft Word file reader.
- 2003‑11‑26:
Egg-breaking machines.
- 2003‑11‑20:
The Finkelstein / Shattock report.
- 2003‑11‑19:
The eight fallacies of distributed computing.
- 2003‑11‑17:
Incompatibilities between C and C++.
- 2003‑11‑14:
DAB and Linux.
- 2003‑11‑14:
Animal noise onomatopoeia.
- 2003‑11‑14:
Stream mp3s over ethernet to the SLIMP3 player.
- 2003‑11‑12:
SMTP client for testing MTA configurations.
- 2003‑11‑06:
International E-road network.
- 2003‑11‑06:
The Art of Automounting.
- 2003‑11‑04:
Unix incompatibility notes.
- 2003‑10‑29:
The World Beard and Moustache Championships.
- 2003‑10‑22:
Computer Science Unplugged.
- 2003‑10‑17:
Silly London Underground maps.
- 2003‑10‑16:
How difficulties in recognizing one's own incompetence lead to inflated self-assessments.
- 2003‑10‑15:
Burnt-out UPS.
- 2003‑10‑15:
The Barefoot Doctor gets a close examination.
- 2003‑09‑29:
Dalek salt and pepper shakers.
- 2003‑09‑24:
Peugeot 404 not found.
- 2003‑09‑23:
Stack Computers: the new wave.
- 2003‑09‑15:
Angle-Grinder Man.
- 2003‑09‑11:
Some CompSci-ish quotations.
- 2003‑09‑11:
TAI, UTC, GPS, aargh.
- 2003‑09‑11:
Anti-Spam Research Group document tracking.
- 2003‑09‑09:
Large efficient diesel ship engines.
- 2003‑09‑03:
Magic Roundabouts.
- 2003‑08‑12:
"The New C Standard" book review material.
- 2003‑08‑11:
Live map of lightning in the British Isles.
- 2003‑08‑06:
ShortTalk: Dictation Made Rewarding.
- 2003‑08‑05:
Lithium-Ion battery FAQ.
- 2003‑07‑09:
The Battle of Imjin River.
- 2003‑07‑04:
Bell Labs and Hoare's CSP.
- 2003‑07‑03:
Joi Ito's Emergent Democracy.
- 2003‑07‑03:
Small Pieces Loosely Joined
- 2003‑07‑03:
An excellent essay on group dynamics and social software.
- 2003‑07‑03:
What does a GSR wish for?
- 2003‑07‑03:
On the usable bandwidth of Ethernet.
- 2003‑07‑02:
These weapons of mass destruction cannot be displayed.
- 2003‑07‑02:
Martijn Bevelander is a spammer.
- 2003‑07‑01:
Code bloat explored.
- 2003‑06‑30:
Improved data mark-up languages.
- 2003‑06‑30:
Books about climbing the buildings of Cambridge.
- 2003‑06‑17:
The theology of The Market.
- 2003‑05‑21:
The definition of "bikeshedding".
- 2003‑05‑20:
First mention of the Central Registration Service?
- 2003‑05‑20:
Clothes made out of duct tape.
- 2003‑05‑19:
An example Computer Science Tripos examination paper.
- 2003‑05‑12:
30th Cambridge Beer Festival.
- 2003‑05‑12:
How to construct a Limerick.
- 2003‑05‑08:
Live video from a model rocket.
- 2003‑04‑28:
The Lloyds Bank Turd.
- 2003‑04‑16:
Translucent windows in X using OpenGL (like Mac OS X).
- 2003‑04‑06:
History of computing at MIT.
- 2003‑03‑31:
CVStrac: bug and patch-set tracking software.
- 2003‑03‑28:
Cycling up-hill.
- 2003‑03‑28:
The Garbage Collection Page.
- 2003‑03‑27:
A brief history of spam.
- 2003‑03‑23:
The Gulf War II Drinking Game.
- 2003‑03‑21:
Patent-related subtleties of the GPL.
- 2003‑03‑19:
The Striker Scenario.
- 2003‑03‑15:
MHTML test messages.
- 2003‑03‑12:
Some more RPM spec files: exim, adns, userv, secnet.
- 2003‑03‑12:
A Cadbury's Creme Egg Car.
- 2003‑03‑12:
Another Cadbury's Creme Egg Car.
- 2003‑03‑10:
The Internet Health Report.
- 2003‑03‑10:
Seeing capillary circulation in one's own retina.
- 2003‑03‑10:
The Internet Storm Centre.
- 2003‑03‑09:
Schott's Original Miscellany.
- 2003‑03‑07:
USB toothbrush.
- 2003‑03‑07:
Exim RPM spec.
- 2003‑03‑04:
Bart's Internet punishment.
- 2003‑02‑28:
All your base are belong to terrorist.
- 2003‑02‑20:
Casting metal objects using a domestic microwave oven.
- 2003‑02‑13:
The Unix Haters' archive.
- 2003‑02‑07:
If you're happy and you know it, bomb Iraq.
- 2003‑02‑05:
Spam is the same thing lots and lots of times.
- 2003‑02‑04:
A call for the complete elimination of joke haiku production on the Internet.
- 2003‑02‑04:
A glossary of typography.
- 2003‑01‑30:
Photos at the top of the Telecom Tower in London.
- 2003‑01‑29:
I do not like green cards and spam!
- 2003‑01‑28:
Bedtime reading for George W. Bush.
- 2003‑01‑23:
What does that sideways eight mean?
- 2003‑01‑21:
A daemon made from balloons.
- 2003‑01‑15:
A computer accessory for smokers.
- 2003‑01‑09:
Entrances to Hell in the UK.
- 2003‑01‑07:
Paul Graham's list of spam filters.
- 2003‑01‑07:
SIMD within a register.
- 2003‑01‑07:
Magic algorithms and bit-twiddling hacks from The Aggregate.
- 2003‑01‑07:
Hacker's Delight by Henry S. Warren, Jr.
- 2003‑01‑06:
On the design of display processors.
- 2003‑01‑06:
Security problems associated with T/TCP.
- 2003‑01‑06:
How to disappear in America without a trace.
- 2002‑12‑31:
Lightbulb voltage regulators.
- 2002‑12‑31:
Student chemistry experiments.
- 2002‑12‑23:
The Spike Bike.
- 2002‑12‑20:
Confessions of a Local Authority Cycling Officer.
- 2002‑12‑19:
The "I'm Sorry I Haven't A Clue" ...while Samantha... page.
- 2002‑12‑19:
Stupid email disclaimers.
- 2002‑12‑18:
"So I decided to explore randomness and some of the principles of quantum mechanics, through poetry, using the medium of sheep."
- 2002‑12‑18:
BBC Variety Programmes Policy Guide for Writers and Producers.
- 2002‑12‑18:
The pencil-user's pencil.
- 2002‑12‑17:
Xeyes for the web generation.
- 2002‑12‑13:
Christopher Hitchens on Mother Theresa.
- 2002‑12‑09:
A Japanese guide to English football chants.
- 2002‑12‑09:
Some good C programming tips.
- 2002‑12‑09:
Hello Cthulhu.
- 2002‑12‑05:
Linux jeans in Istanbul.
- 2002‑12‑03:
Condorcet's voting system.
- 2002‑12‑03:
Atmospheric optics.
- 2002‑12‑02:
Some documents about ELF.
- 2002‑12‑02:
The perils of driving in Cambridge without due care and attention.
- 2002‑11‑29:
This mountain can only be seen for 12 days each year.
- 2002‑11‑20:
The comp.basilisk FAQ.
- 2002‑11‑20:
A nice collection of optical illusions.
- 2002‑11‑20:
So you want the moon on a stick?
- 2002‑11‑20:
Gulf Wars!
- 2002‑11‑15:
Une diablotine très coquine!
- 2002‑10‑17:
The telemarketing counterscript.
- 2002‑10‑16:
Picture an earworm.
- 2002‑10‑16:
The Downland Gridshell.
- 2002‑09‑26:
The Campaign for Cambridge Freedoms.
- 2002‑09‑26:
The Adelson checker-shadow illusion.
- 2002‑09‑23:
Death of Silly Putty.
- 2002‑09‑20:
If airlines sold paint...
- 2002‑09‑20:
Swirly rainbow cloud.
- 2002‑09‑19:
An interesting Project.
- 2002‑09‑12:
Parsons code music finder
- 2002‑09‑02:
An overview of the programming language C, more or less.
- 2002‑08‑12:
This is the house that Jack built.
- 2002‑08‑05:
Orkney's Italian Chapel.
- 2002‑07‑23:
Not Mr Bunny's Big Cup Of...
- 2002‑07‑17:
Problems of growth in development teams.
- 2002‑06‑28:
Looking back at Knuth.
- 2002‑06‑27:
Map of the world of spam.
- 2002‑06‑18:
Mechanical automatic gearing in Lego.
- 2002‑06‑18:
Cambridge Cycling Campaign Bike Week 2002.
- 2002‑06‑08:
The joy of making the world.
- 2002‑06‑05:
The world's flags given letter grades.
- 2002‑06‑05:
Smartsuite at Sourceforge.
- 2002‑06‑05:
UCSC SMART Suite seems to be the daddy of all this stuff, but their web site is broken.
- 2002‑06‑05:
The ide-smart tool does yet more diagnostic stuff.
- 2002‑06‑05:
IDE hard drive temperature reading under Linux.
- 2002‑06‑04:
A motherboard with an on-board valve amp.
- 2002‑06‑04:
Am I cute or not?
- 2002‑05‑31:
An excellent tour of typography in London.
- 2002‑05‑29:
A better syntax for exceptions in ML.
- 2002‑05‑28:
If you were a Debian package, what would you be called?
- 2002‑05‑28:
HAKMEM programming hacks in C.
- 2002‑05‑28:
HAKMEM programming hacks.
- 2002‑05‑28:
Alan Mycroft's clever programming tricks.
- 2002‑05‑28:
Design Patterns in Dynamic Programming.
- 2002‑05‑27:
RISC vs. CISC.
- 2002‑05‑23:
Bullshit generator.
- 2002‑05‑22:
IMAP/POP3 redirecting proxy.
- 2002‑05‑16:
Roads of Britain.
- 2002‑05‑15:
The emblem of the Univerity of Cambridge.
- 2002‑05‑15:
What copyright looked like to Macaulay in 1841.
- 2002‑05‑15:
Not all CDs are CDs.
- 2002‑05‑15:
When Pulp Fiction meets Star Wars.
- 2002‑05‑15:
The bomb-technician's T-shirt.
- 2002‑05‑15:
Learn what "begging the question" is and why you shouldn't refer to it when you've just thought of something to ask.
- 2002‑05‑15:
Top posters to new-httpd.
- 2002‑05‑14:
It's a while since I wrote this, but here's an amusing war story.
- 2002‑05‑14:
MacSween, the haggis specialists.
- 2002‑05‑14:
The great cheiftan o' the puddin' race.
- 2002‑05‑13:
The Waste Isolation Pilot Plant 10000 year marking system.
- 2002‑05‑13:
The principle of least astonishment.
- 2002‑05‑13:
Secure signal handling.
- 2002‑05‑10:
Some people need to learn about siphons.
- 2002‑05‑09:
An X server implemented as a Java applet.
- 2002‑05‑09:
Vippy helps with BGP configuration.
- 2002‑05‑08:
Caption competition.
- 2002‑05‑08:
The joy of #!
- 2002‑05‑08:
The shopping forecast.
- 2002‑05‑08:
No, it isn't ironic.
- 2002‑05‑07:
The story of Human evolution.
- 2002‑05‑07:
The New Scripting Language.
- 2002‑05‑07:
IP over DVB.
- 2002‑05‑03:
The BIOS from hell.
- 2002‑05‑02:
The Millennium Bridge problem.
- 2002‑05‑02:
Great Concert Disasters.
- 2002‑05‑02:
I see dead people.
- 2002‑05‑02:
Liberals winning at US political debate?
- 2002‑05‑02:
How to protest nicely on May Day.
- 2002‑05‑02:
Knit your own ITV Digital monkey.
- 2002‑05‑02:
Lisp: Good news; Bad news; How to win big. (Including The Rise of Worse is Better.)
- 2002‑05‑01:
MultiSensit: a tool for extracting emotions from plain text.
- 2002‑05‑01:
XCOM2002: Extreme computing -- the NTK/Mute festival of inappropriate technology.
- 2002‑05‑01:
The Open Source Heathcare Alliance.
- 2002‑05‑01:
Flame Warriors.
- 2002‑05‑01:
Netizens: On the History and Impact of Usenet and the Internet.
- 2002‑05‑01:
Squeeze++: post-link-time whole-program optimization.
- 2002‑04‑30:
info.eagle.current.status
- 2002‑04‑30:
info.world.current.status
- 2002‑04‑30:
info.us.election.current.status
- 2002‑04‑30:
Miscellaneous Phoenix stuff.
- 2002‑04‑30:
Adolf Hitler action figure.
- 2002‑04‑30:
Stephen Wright jokes.
- 2002‑04‑30:
Geek holiday destinations.
- 2002‑04‑29:
Learning to shag is learning to be a Southerner.
- 2002‑04‑29:
Wes and Sandra are current members of the Competitive Shagger's Association.
- 2002‑04‑26:
The four condiments of the apocalypse.
- 2002‑04‑25:
This page sucks and cannot be displayed.
- 2002‑04‑19:
The Mallard Society of All Souls College, Oxford.
- 2002‑04‑19:
By ye bloud of King Edward, it was a swapping, swapping mallard!
- 2002‑04‑19:
What makes a fuckhead?
- 2002‑04‑19:
What makes a fuckwit?