You Are Not Your Name and Photo: A Call to Re-Imagine Identity, “Twitter handles identity better than Facebook, because it allows for handles, multiple accounts, fake accounts and other features that keep Twitter interest-driven, not identity-driven.”
New Altair 8800 Kit! Timeless classic.
TRESOR Runs Encryption Securely Outside RAM, “All computations take place only on registers, no AES state is ever going to RAM. In particular, the x86 debug registers are misused as secure key storage.”
An anecdote about ML type inference, by Andrew Koenig (1994). Nice example of how type checking helps find bugs.
CXTeX, a hand-written port of TeX in C. (LuaTeX uses CWEB.)
CryptDB is a database that operates on encrypted data. Rather amazing.
webmachine-ruby is a port of Webmachine, which is written in Erlang. The goal of both projects is to expose interesting parts of the HTTP protocol to your application in a declarative way.
KNC is Kerberised NetCat. It works in basically the same way as either netcat or stunnel except that it is Kerberised. Lovely.
IM (Internet Message) are MH-compatible mail/news handling commands and Perl modules.
5 – a stack-based array language, by Bernd Ulmann. Marrying Forth and APL.
Darts, Dice, and Coins: Sampling from a Discrete Distribution, nice exposition.
Internet Protocol Design and Implementation, nice material collection.
APL is more French than English, by Alan J. Perlis.
On rainbows and their calculation.
Pipe Logic, “Suppose the null-byte is an electron. Then, /dev/zero provides an infinite supply of electrons and /dev/null has an infinite appetite for them. Let’s call these devices Vss and Vdd, respectively.”
Samegame Fighter, nice little Flash game.