avatarharuki zaemon

Don’t Info Op Until You See The Whites of Their Eyes

Shared by

Why the anti-Macron influence op should start now

Calculus Made Easy

Shared by

Being a very-simplest introduction to those beautiful methods of reckoning which are generally called by the terrifying names of the Differential Calculus and the Integral Calculus.

16 Signs Your Child is a Cyber Bikie on the Information Super Highway

Shared by

Charity to help talented disadvantaged youths get infosec jobs

Spring Cleaning for the Mind

Shared by

Information overload has reached an all time high. Is there a way to stay-up-to-date without losing your mind? Yes. We call it “single-tasking.” Here’s a reminder of what multi-tasking does to your brain plus a proven way to find focus.

John Deere just told the copyright office that only corporations can own property, humans can only license it / Boing Boing

Shared by

GM went so far as to argue locking people out helps innovation.

Red Team Penetration Testing

Shared by

From minimal information about the client to complete and total compromise of the entire environment In just under 13 hours.

The bizarre biology of the naked mole rat means oxygen is a bonus

Shared by

Naked mole rats can survive 18 minute stretches without any oxygen because of a weird metabolic switch.

Patrick Winston Explains Deep Learning

Shared by

Patrick teaches 6.034, the undergraduate introduction to AI at M.I.T. and a recent set of his lectures is available as videos.

Hiring Engineering Managers: Screening for Potential

Shared by

Overall, when screening for potential, look for signs of stepping up, caring about the people on the team, and thoughtfulness about the processes.

Google Site Reliability Engineering

Shared by

Fundamentally, it’s what happens when you ask a software engineer to design an operations function.

How Slack Supports Junior Engineers

Shared by

Mentorship, Impact, and a Culture of Growth

Life Beyond Distributed Transactions

Shared by

Building distributed transactions to support highly available applications is a great challenge that has inspired excellent innovation and great technology. Unfortunately, this is not broadly available to application developers.

Quantum-Safe Crypto Why & How?

Shared by

What’s a quantum computer? How broken are your public keys? AES vs. quantum search. Hidden quantum powers. Defeating quantum computing. Hash functions to the rescue.

Donkey code

Shared by

The profound impact the language we use has on thought, discussion and ultimately code.

Modern garbage collection

Shared by

Garbage collection is a hard problem, really hard, one that has been studied by an army of computer scientists for decades. So be very suspicious of supposed breakthroughs that everyone else missed.

Learning From A Year of Security Breaches

Shared by

300 hours responding to security incidents and data breaches this year as a consultant or volunteer.

How Dropbox securely stores your passwords

Shared by

Secure hashing functions like SHA have a critical flaw for password hashing: they are designed to be fast. A modern commodity CPU can generate millions of SHA256 hashes per second. Specialized GPU clusters allow for calculating hashes at a rate of billions per second.

The chilling stories behind Japan’s ‘evaporating people’

Shared by

Since the mid-1990s, it’s estimated that at least 100,000 Japanese men and women vanish annually. They are the architects of their own disappearances, banishing themselves over indignities large and small: divorce, debt, job loss, failing an exam.

A big discovery in a tiny package

Shared by

Researchers have developed a way to radically miniaturise a MRI machine, using atomic-scale quantum computer technology.

Asymmetric Warfare

Shared by

Asymmetric warfare is where the attack is cheap but the defense is expensive. It is very difficult to win in this situation; the attacker can wage a war of attrition at much less cost than the defender.