05 Oct 20
This article discusses a relatively unknown data structure, the suffix tree, and shows how its characteristics can be used to attack difficult string matching problems.
This post explores whether we can ever trust machine-learned models for critical things, such as flying an airplane, driving a car, or algorithmic stock market trading.
A JavaScript library that makes working with the HTML5 Canvas element easy. Useful for creating games, generative art, and other highly graphical experiences.
A course aimed at people who have a strong sense that what Einstein did changed everything but do not know enough physics to understand what he did and why it was so important. The course presents just enough of Einstein’s physics to give students an independent sense of what he achieved and what he did not achieve.
04 Jul 20
A curated list of websites, web apps and portfolios which resemble desktop graphical user interfaces.
02 Jul 20
Quick tutorial on how to use vim-projectionist plugin to better navigate Elixir projects, and more specifically ones that use the Phoenix framework.
30 Jun 20
The tale of how birds evolved such an efficient respiratory system told in the style of Rudyard Kipling “Just So” stories.
27 Jun 20
Over 100 separate source files are concatenated into a single large files of C-code named sqlite3.c and called “the amalgamation”. Combining all the code for SQLite into one big file makes SQLite easier to deploy — there is just one file to keep track of. And because all code is in a single translation unit, compilers can do better inter-procedure optimization.
17 Jun 20
An open source password recovery tool. Supported hashing algorithms include: Microsoft LM hashes, MD4, MD5, SHA-family, Unix Crypt formats, MySQL, and Cisco PIX.
12 Jun 20
Browse and download high-resolution, public domain artworks.
10 Jun 20
Virtual tour of the tomb of Pharaoh Ramses VI
08 Jun 20
This 3-part article series, explain how to use io_uring — a new high performance interface for high performance I/O for Linux — to get the most common programming tasks done under Linux.
Grid is a game engine for Lua and designed for multiplayer-first game experiences.
06 Jun 20
Entry from the on-line hacker Jargon File about a mysterious magic switch.
This article explores what we have learned about dinosaurs since the Jurassic Park films landed in the ’90s.
The common methods of storing and sharing sensitive data with colleagues and partners have weak links. Today, files are often encrypted in transit and at rest, but decrypted while in use. This provides hackers and insiders with repeated opportunities to exfiltrate unencrypted data. FHE plugs these holes. It allows the manipulation of data by permissioned parties while it remains encrypted, minimizing the time it exists in its most vulnerable state. In conjunction with other techniques, FHE also makes it possible to selectively restrict decryption capabilities, so people can see only the portions of a file that they are entitled to, and are necessary for them to do their work.
30 May 20
A git repository that serves as a tutorial for analyzing a blocking queue implementation using TLA+, each git commit introduces a new concept.
29 May 20
Linus Torvalds on why he thinks limiting the line width of source code to 80 characters is no longer relevant.
02 Apr 20
This article will tell you how to implement a simple controller in software and how to tune it without getting into heavy mathematics and without requiring you to learn any control theory. The technique used to tune the controller is a tried and true method that can be applied to almost any control problem with success.
25 Feb 20
Amsterdam’s Ritman Library—a sizable collection of pre-1900 books on alchemy, astrology, magic, and other occult subjects—has been digitizing thousands of its rare texts