Newest Stories by bsima
Home
Recent
Comments
Search
Login
2
How To Become An Open-Source Contractor (2008)
practices
evanmiller.org
via
bsima
2 years ago
|
cached
|
1 comment
1
22
Wrestling With Inclusion at LambdaConf
culture
event
degoes.net
via
bsima
2 years ago
|
cached
|
52 comments
52
34
John Oliver Explains the Apple-FBI Encryption Debate
☶
video
security
youtube.com
via
bsima
2 years ago
|
cached
|
8 comments
8
5
Keys Under Doormats (2015)
☶
pdf
security
dspace.mit.edu
via
bsima
2 years ago
|
cached
|
2 comments
2
9
Shen: A Sufficiently Advanced Lisp (2014)
video
lisp
youtube.com
via
bsima
2 years ago
|
cached
|
no comments
0
10
Learning to Deal With the Impostor Syndrome
☶
cogsci
nytimes.com
via
bsima
2 years ago
|
cached
|
2 comments
2
18
Letter to SCOTUS from professional physicists
☶
law
science
docs.google.com
via
bsima
2 years ago
|
cached
|
14 comments
14
12
Chomsky Was Right, NYU Researchers Find: We Do Have a “Grammar” in Our Head
☶
cogsci
compsci
philosophy
science
nyu.edu
via
bsima
2 years ago
|
cached
|
no comments
0
17
Writes large correct programs (2008)
programming
testing
johndcook.com
via
bsima
2 years ago
|
cached
|
2 comments
2
15
I'm putting together a "hardware starter kit". What should I include?
☶
ask
hardware
authored by
bsima
2 years ago
|
10 comments
10
2
Understanding Libertarian Morality: The Psychological Dispositions of Self-Identified Libertarians
culture
journals.plos.org
via
bsima
2 years ago
|
cached
|
no comments
0
23
What is Homomorphic Encryption, and Why Should I Care?
☶
distributed
security
blogs.teamb.com
via
bsima
2 years ago
|
cached
|
6 comments
6
9
If Your Car Were Emacs
emacs
c2.com
via
bsima
2 years ago
|
cached
|
no comments
0
3
Data Scientists Create World’s First Therapeutic Venom Database
☶
databases
newsroom.cumc.columbia.edu
via
bsima
2 years ago
|
cached
|
no comments
0
2
Using AI to study ISIS
pdf
compsci
arxiv.org
via
bsima
3 years ago
|
cached
|
no comments
0
<< Page 4