Skip to main content
Proper hash tables written by careful, smart engineers avoid quadratic behavior. Well, almost .
Machine learning changes everything .
The Distribution of Users' Computer Skills: Worse Than You Think . Accompanying HN thread .
Gamified Hacking Site Promises Prizes And Points For DDoS Attacks . If you guessed that the hacking tool also installs a trojan, give yourself a prize.
Why is NTSC 29.97 fps? (video)
Niceware can also be used to convert existing cryptographic keys and other random bytes into human-readable phrases.
Chernobyl is now better-contained .
There's a new instruction set in town: RISC-V. There's a small, $59 arduino-compatible HiFive1 (HN comments ) and soon a larger, linux-compatible SoC called LowRISC (HN comments ). See LowRSIC's blog for coverage of the recent RISC-V workshop: day 1 , day 2 .
In a move that surprises exactly no-one, RIP Solaris . Don't miss the HN thread .
"Daddy, what's a 'miner'? "
Finally, my productivity probllems are solved!
An entertainingly-written account of a future 5AU-aperture telescope .
From the well-known robotics experts at CNN Style: driverless police superbikes .
1213486160 ? 1195725856 !
"The Development and Application of NASA's First Standard Spacecraft Computer" and video .
A really cool detective story about trains and python: Catching the Circle Line Rogue Train .
How safe is that gun safe ?
Security Engineering, the book, free . (h/t you know who you are).