Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
petergao
.
9
"This destroyes the RSA cryptosystem" (by proving polynomial time bound on integer factorization)
cryptography
math
eprint.iacr.org
via
petergao
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
23
Battle testing data integrity verification with ZFS, Btrfs and mdadm+dm-integrity
☶
osdev
performance
unixsheikh.com
via
petergao
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
0
Headache free setup of Elm 0.18 with Phoenix 1.3 using Brunch 2
elixir
elm
web
petergao.com
authored by
petergao
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Cuckoo Filter: Practically Better Than Bloom
pdf
compsci
cs.cmu.edu
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
How to not lie with statistics: The correct way to summarize benchmark results
pdf
math
cse.unsw.edu.au
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
me_cleaner: Tool for partial deblobbing of Intel ME/TXE firmware images
reversing
security
github.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Singletons Considered Harmful
practices
programming
object-oriented-security.org
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Architectural Styles and the Design of Network-based Software Architectures
api
networking
ics.uci.edu
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Simple Algorithms for Network Visualization: A Tutorial
pdf
programming
visualization
profs.etsmtl.ca
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Signing in to websites with SSH
security
web
vtllf.org
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
19
Stuff Goes Bad: Erlang in Anger
book
pdf
debugging
erlang
s3.amazonaws.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
4
A Rusting Rubyist - Embedding Rust in a Ruby module
programming
ruby
rust
medium.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Thinking in Erlang (2007)
pdf
erlang
programming
web.archive.org
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Reverse-Engineering a Proprietary Game Server with Erlang
erlang
games
networking
erlang-factory.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Myth of the Day: Functional Programmers Don't Use Loops
programming
two-wrongs.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
4
Static Program Analysis
pdf
compilers
compsci
programming
cs.au.dk
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Rethinking Text Input on Touch Screens
mobile
two-wrongs.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
15
Erlang and millions of concurrent gamers (2011)
☶
pdf
distributed
erlang
scaling
erlang-factory.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Approaching fairness in machine learning
law
philosophy
blog.mrtz.org
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Category Theory for the Working Hacker
video
math
programming
infoq.com
via
petergao
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
How I (try) to optimize my commute
math
visualization
medium.com
via
petergao
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
21
Illegal numbers
law
security
en.wikipedia.org
via
petergao
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5