(Untitled)

“Any sufficiently complex input format is indistinguishable from bytecode; the code receiving it is indistinguishable from a virtual machine.“ https://www.usenix.org/system/files/login/articles/login…

(Untitled)

It’s natural for programmers to view the executable binary generated from their programs through the prism of their source code https://www.usenix.org/system/files/login/articles/login_aug15_02_bratu…

(Untitled)

But the idea everyone should learn how to code is as plausible as saying that everyone should learn how to plumb. To me it just makes no sense. http://www.theguardian.com/technology/2013/mar/09/evgen…

(Untitled)

… They are ripe for ridiculing because they are ridiculous in many cases, and the only reason they are advancing is because they plug in the conceptual and theoretical holes in their theories with buz…

(Untitled)

a rebel spirit succumbing to perhaps the only force that could destroy it: gentrification Aeon Magazine, “How Yuppies Hacked the Original Hacker Ethos”…

Penzu. Use It.

No proselytizing here, I'll make it brief (140 characters, to be precise): I use Penzu, you should too. It is awesome. It gets you to do more writing. Your journal is private. Available on the we…

(Untitled)

Clarification requires insight, and acquiring insight is the primary creative act in programmingAnd those places are where the bugs live. https://people.csail.mit.edu/cph/community.html…