Friday, June 2, 2017

What was I reading in May 2017


- How to Read Mathematics
- Building a BlackBerry QNX 7 Desktop
- How to point GDB to your sources


- Getting Started with Headless Chrome - I'm thinking that this consume a sizable portion of my future.
- Why Walking Helps Us Think
- Programming as a Way of Thinking


- Kryptonite - the new home for your SSH private key. - I have this feeling that it's not an improvement of security. It's a convenience, therefore...
- evilsocket/opensnitch - One to watch?
- Fix your crappy ads and I'll stop blocking them - The author closes the browser tab. I go a bit further and inject code into my browser that highlights (in yellow) any link to the site, warning me that they have crappy ads. In short, I don't block the ads, I avoid the site altogether.
- Forensics - TeamViewer file extraction


- OpenSSH Removes SSHv1 Support


- Machine To Machine Talk Using ESP8266


- Thousands of Veterans Want to Learn to Code But Can't
- Avoid these 35 habits that lead to unmaintainable code
- Why Don't People Return Their Shopping Carts? - This is one of my peeves. We have strong winds here and my cars have had more than one scratch from these wheeled missiles.


- The hijacking flaw that lurked in Intel chips is worse than anyone thought
- WuTheFWasThat/vimflowy - This can also be used as typing practice for new Vi/Vim users.


- MTK51 8051 Microcontroller Trainer Kit
- A Lot of What Is Known about Pirates Is Not True, and a Lot of What Is True Is Not Known
- The Physicist Who Sees Crime Networks


- New device can harvest indoor light to power electronics
- Announcing SyntaxNet: The World's Most Accurate Parser Goes Open Source
- The Discipline of Chaos Engineering - Not only is it a good idea to know what "normal" looks like, you should be familiar with what "abnormal" looks like...
- Maintainers make the world go round
- Google releases DIY open source Raspberry Pi 'Voice Kit' hardware -- here's how to get it
- IPv6 as a metadata store


- KFUZZ, a fuzzer story.
- Amazon enables free calls and messages on all Echo devices with Alexa Calling


- “Google Is as Close to a Natural Monopoly as the Bell System Was in 1956″ - Complete and utter BS from another self-promoting armchair critic. Big != monopoly. He's also ignorant if he thinks that musicians don't make their primary income from touring.
- Lasp: a little further down the Erlang rabbithole. This is not a Monad tutorial
- SQL Notebook
- Exploiting the Linux kernel via packet sockets
- Get started Learning Music (Beta)
- Beware of Transparent Pixels


- dns-violations - Given the ways DNS has been "adapted" to support miscellaneous non-DNS services, I'm not sure that this is worth the time being put into it.
- Standing Up to a Dangerous New Breed of Patent Troll
- When Bash Scripts Bite


- Your Brain Can Only Take So Much Focus - Yeah, but it's like a muscle. With practice, you can focus longer. (Warning: Crappy ad website. Vertical reading area =~ 50% of browser.)


- The Tools We Use To Stay Afloat
- Rejection Letter - Could this be where the Iraqi Information Minister retired? (geesh)


- MP3 is dead missed the real much better story


- The Secret History of William Gibson's Never-Filmed Aliens Sequel
- Amazon Announces Notifications for Alexa' Feature Is Coming Soon Sign-Up to Stay Tuned


- Scientists Claim 'Cold Spot' In Space Could Offer Evidence of a Parallel Universe


- So You Want to Learn to Break Ciphers
- Algorithms and Data Structures
- PyCon 2017 - YouTube


- Building a legacy search engine for a legacy protocol
- Updating Logitech Hardware on Linux


- taviso/loadlibrary
- Don't use Hadoop - your data isn't that big
- US politicians think companies should be allowed to 'hack back' after WannaCry - If this becomes law, I'll attempt to corner the market on popcorn.


- MicroPython running "bare metal" in the browser via unicorn.js
- The Magic of XOR
- Little Things I Like to Do with Git
- Repurposing Thin Clients
- A brief history of IPv4 address space exhaustion
- 1922: Why I Quit Being So Accommodating
- Dirty COW and why lying is bad even if you are the Linux kernel


- The American Scholar: Writing English as a Second Language
- Reflections on reflection (attacks)
- firmware-security-training


- (Important: the reach of a patent) IMPRESSION PRODUCTS INC. v. LEXMARK INT'L INC.
- Overview of top cryptocurrencies
- Pipes - Watching this one. I miss Yahoo Pipes.
- Computer science students should learn to cheat not be punished for it - Uh. No. Doing so defeats the purpose of learning how to do something (which is why the school is there). In the long run, someone will be sued for misappropriating someone else's code.
- Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
- MySQL 8.0: Retiring Support for the Query Cache
- oss-security - Qualys Security Advisory
- Writing a Unix Shell - Part I
- Remaining Trouble Spots with Computational Thinking

Above was generated by a homegrown bolt-on script for Wallabag, which is a free utility for capturing web content so that it can be read later.