andrewducker | A modest proposal on avoiding massive international computer failures I propose that if you supply software to more than X customers (say 10,000 but I'm totally open to discussion on this point) then you must have insurance that covers you for legal liability for damages.
Interface design in the age of qualiatech: Do you want to be a button? There have been many times in my life that I have felt at one with a computer screen, but one in particular stands out – when I discovered something called Max/MSP during one of my second-year classes at university. Max/MSP is a visual programming languag...
An interactive guide to x86-64 assembly - moving data This is the second part of a series of interactive articles on the x86-64 architecture. This part will focus on the first assembly instructions, visualizing the way data moves in memory when they are executed.
LLMs can solve hard problems We’re a couple of years into the LLM era now, and the Gartner hype cycle from last year seems relevant: Image credit: Gartner The purpose of this post is to share two hard problems (in the CS…
My first program ever coded This post is about one of my first encounters with programming, logic, variables & related.I came across my first computer in a computer training institute with a name I forgot, but it was a franchise chain in India, in 1999 Summer. It was a white CRT...
UI for sums must remember products (eighty-twenty news) I had a small insight yesterday while building a component for a small web app: the user interface for editing an incomplete value of sum type A+B needs to remember a product of input 2×A×B from the user:
4 years developing an API | Blog of Christian Felde In other words, a very slow process. And all just to be able to put some numbers in a table!?
Carving ELF Files Recently, I created a simple tool, Carve Exe, to carve executables from other files (e.g. memory dumps or network traffic). Carving executables from binary blobs is a common task in digital forensics and reverse engineering. For example, when analyzing ho...
How not to use box shadows So you think you know box shadows huh? I bet you didn't know they could do this.
Rockin’ the Code World Season 4: Wisdom from the Trenches: Navigating Career Longevity in Software Engineering Join the season 4 finale of C# Corner TV on September 7th, 2024, at 10:00 AM PST. Seasoned software engineers will share invaluable insights for beginners to navigate and future-proof their careers…
What is the significance of the character "j" at the end of a Roman Numeral? While using an old (1907) book of transcriptions (on-line) The Parish Register of Gargrave in the County of York , I was puzzled by the number of dates recorded in the 16th and early 17th centuries...
X. It’s what’s happening From breaking news and entertainment to sports and politics, get the full story with all the live commentary.
2024-07-20 minuteman missile communications A programming note: I am looking at making some changes to how I host things like Computers Are Bad and wikimap that are going to involve a lot more recurring expense. For that and other reasons, I want to see if y'all would be willing to throw some money...
Enhancing Class and Member Documentation: Leveraging InformationAttribute in Spargine for Improved Code Maintenance The author created the InformationAttribute to track changes in their open-source libraries. This article explains how the attribute is used and its properties, and provides examples of its usage. …
Butts Are Difficult | buttplug.io "… Society has put a lot of evils in our brains that we need to transcend before we make out."
latest, x86 64-bit, x86-64 ABI High-quality browsable Linux kernel syscall tables for multiple architectures
CrowdStrike broke Debian and Rocky Linux months ago, but no one noticed CrowdStrike recently caused a widespread Blue Screen of Death (BSOD) issue on Windows PCs, disrupting various sectors. However, this was not an isolated incident, CrowdStrike affected Linux PCs also.
Modchipping a fridge I own a fridge that has a really cool ‘feature’. It beeps if the door is open for more than 60 seconds. 95% of the time this is more annoying than it is helpful. In my opinion it should just shut up and trust that I know best.
Ansible at scale — working with multiple environments is easy How to introduce the concept of “environments” to effortlessly manage multiple different types of Ansible deployments at scale.
Scan HTML even faster with SIMD instructions (C++ and C#) – Daniel Lemire's blog Earlier this year, both major Web engines (WebKit/Safari and Chromium/Chrome/Edge/Brave) accelerated HTML parsing using SIMD instructions. These ‘SIMD’ instructions are special instructions that are present in all our processors that can process multiple ...
XD1 Log entries. Begin... · Against political realism With the recent developments in US politics, following the attempt on candidate Donald Trump's life there is renewed heated and polarised debate, if there wasn't such heat before. With this, something struck me as odd when talking to other people online, ...
Why disallow package within the class name? Motivation After opening a directory it is the developers job to filter out the files that are not relevant to their task at hand. The more words to filter, the more difficult it becomes to quickly orient themselves and start making changes. Disallowing p...
Buy or Rent? RaspberryPi vs VPS Recently I was planning to self host a service I'm using and I was immediately stuck on a decision: should I just buy a Raspberry Pi 5 or rent a VPS?
What is Entropy? I wrote a little book about entropy; here’s the current draft: • What is Entropy? If you see mistakes in it, please let me know! An alternative title would be 91 Tweets on Entropy, but p…
Why prefer unit testing through layer entrypoints? Status Quo There is significant artistic variance on how to craft tests which provide developers quick and useful feedback. A common point of contention is the number of files which should be included within these quick and useful tests. The most popular ...