You Are Not Your Name and Photo: A Call to Re-Imagine Identity,
“Twitter handles identity better than Facebook, because it allows for
handles, multiple accounts, fake accounts and other features that keep
Twitter interest-driven, not identity-driven.”
New Altair 8800 Kit! Timeless classic.
TRESOR Runs Encryption Securely Outside RAM,
“All computations take place only on registers, no AES state is ever
going to RAM. In particular, the x86 debug registers are misused as
secure key storage.”
An anecdote about ML type inference, by Andrew Koenig (1994).
Nice example of how type checking helps find bugs.
CXTeX, a hand-written port of TeX in C.
(LuaTeX uses CWEB.)
CryptDB is a database that operates on encrypted data.
webmachine-ruby is a port of
Webmachine, which is written
in Erlang. The goal of both projects is to expose interesting parts of
the HTTP protocol to your application in a declarative way.
KNC is Kerberised NetCat. It works in basically the same way as either
netcat or stunnel except that it is Kerberised. Lovely.
IM (Internet Message) are MH-compatible mail/news handling commands
and Perl modules.
5 – a stack-based array language, by Bernd Ulmann. Marrying Forth and APL.
Darts, Dice, and Coins: Sampling from a Discrete Distribution,
Internet Protocol Design and Implementation, nice material collection.
APL is more French than English, by Alan J. Perlis.
On rainbows and their calculation.
Pipe Logic, “Suppose the null-byte is an electron. Then, /dev/zero
provides an infinite supply of electrons and /dev/null has an infinite
appetite for them. Let’s call these devices Vss and Vdd,
Samegame Fighter, nice little Flash game.
Watch me SOLVE a 20x20x20 cube
Ending the Infographic Plague