Skip to main content
Proper hash tables written by careful, smart engineers avoid quadratic behavior. Well,
almost. Machine learning
The Distribution of Users' Computer Skills: Worse Than You Think. Accompanying HN thread.
Gamified Hacking Site Promises Prizes And Points For DDoS Attacks. If you guessed that the hacking tool also installs a trojan, give yourself a prize.
Why is NTSC 29.97 fps? (video)
Niceware can also be used to convert existing cryptographic keys and other random bytes into human-readable phrases. Chernobyl is now
better-contained. There's a new instruction set in town: RISC-V. There's a small, $59 arduino-compatible
HiFive1 ( HN comments) and soon a larger, linux-compatible SoC called LowRISC ( HN comments). See LowRSIC's blog for coverage of the recent RISC-V workshop: day 1, day 2. In a move that surprises exactly no-one,
RIP Solaris. Don't miss the HN thread. "Daddy, what's a
'miner'?" Finally, my productivity probllems
An entertainingly-written account of a future 5AU-aperture telescope. From the well-known robotics experts at CNN Style:
driverless police superbikes.
"The Development and Application of NASA's First Standard Spacecraft Computer" and video. A really cool detective story about trains and python:
Catching the Circle Line Rogue Train. How safe is that
gun safe? Security Engineering, the book,
free. (h/t you know who you are).