Newest Stories by kel
Home
Recent
Comments
Search
Login
2
Raytheon - Proof By Games (2013)
☶
pdf
formalmethods
games
dtic.mil
via
kel
5 months ago
|
cached
|
4 comments
4
9
Proofsweeper: Play Minesweeper by formally proving your moves in Idris
formalmethods
github.com
via
kel
8 months ago
|
cached
|
no comments
0
1
Security In Wireless Cellular Networks
networking
security
cse.wustl.edu
via
kel
8 months ago
|
cached
|
1 comment
1
8
Worker's enquiry in the cynical mode: the unrevolutionary working life of the web developer (2010)
culture
web
endnotes.org.uk
via
kel
8 months ago
|
cached
|
no comments
0
55
Advice for a Junior Developer
☶
ask
person
authored by
kel
12 months ago
|
33 comments
33
13
What are you working on this week?
☶
ask
authored by
kel
1 year ago
|
14 comments
14
12
Developer tablets?
☶
ask
authored by
kel
1 year ago
|
16 comments
16
4
Gnome's Librsvg gets Rusty
graphics
rust
people.gnome.org
via
kel
1 year ago
|
cached
|
2 comments
2
24
Announcing Rust 1.12.1 - The Rust Programming Language Blog
release
rust
blog.rust-lang.org
via
kel
1 year ago
|
cached
|
no comments
0
12
.Net's new Span<T> memory abstraction
dotnet
github.com
via
kel
1 year ago
|
cached
|
no comments
0
9
The Voodoo of Elevation Gain and Strava (and How I Get Around It) (2015)
debugging
reversing
regex.info
via
kel
1 year ago
|
cached
|
no comments
0
8
Why Writing Correct Software Is Hard
compsci
historical
math
blog.paralleluniverse.co
via
kel
1 year ago
|
cached
|
no comments
0
22
The adblock arms race has began.
browsers
web
adblockplus.org
via
kel
2 years ago
|
cached
|
26 comments
26
3
Who Stole the Four-Hour Workday? (2014)
culture
finance
vice.com
via
kel
2 years ago
|
cached
|
1 comment
1
6
Transforming Data with ClojureScript
☶
book
lisp
programming
langintro.com
via
kel
2 years ago
|
cached
|
no comments
0
10
HTTP/2: In-depth analysis of the top four flaws of the next generation web protocol
pdf
networking
security
imperva.com
via
kel
2 years ago
|
cached
|
8 comments
8
1
Citibank IT guy deliberately wiped routers, shut down 90% of networks
culture
historical
security
tripwire.com
via
kel
2 years ago
|
cached
|
no comments
0
3
Implementation of RFC 1149, aka IP over Avian Carriers (2001)
☶
historical
networking
science
blug.linux.no
via
kel
2 years ago
|
cached
|
no comments
0
5
Five CVE's patched in March 11th Chrome stable release
browsers
security
googlechromereleases.blogspot.
com
via
kel
2 years ago
|
cached
|
no comments
0
19
Oh, a UNIX shell built around Scheme
go
lisp
unix
github.com
via
kel
2 years ago
|
cached
|
12 comments
12
15
Abusing Floating Point Casts To Beat A SM64 Level In Half An "A" Press
☶
video
games
reversing
youtube.com
via
kel
2 years ago
|
cached
|
3 comments
3
2
Open Design Foundation
culture
design
opendesign.foundation
via
kel
2 years ago
|
cached
|
1 comment
1
2
How Soviets used IBM Selectric keyloggers to spy on US diplomats
hardware
security
arstechnica.com
via
kel
2 years ago
|
cached
|
2 comments
2
16
Electron microscope slow-motion video of vinyl LP
video
art
hardware
youtube.com
via
kel
2 years ago
|
cached
|
no comments
0
5
cjdrs – cjdns implementation in Rust
distributed
networking
rust
web
github.com
via
kel
2 years ago
|
cached
|
1 comment
1
Page 2 >>