Review of “The Lifecycle of a Programming Language” by Jaagup Averin, a paper I chose due to the similarities, yet important differences with my own.
A big companies hold their heads up high and only collaborate to avoid someone taking over their market, a piece of the tech world does the opposite. Thankfully, the legendary Bell labs were part of the latter team.
In an age of computers, the smallest signals are being used to affect input. Computers can be controlled in the most elaborate ways, and are also used to make this control possible. A key field of application? Neuroscience.
Review of Jonathan Barlett’s “Programming from the ground up” 2003 book on basics of assembly and programming.
Book review of “Defeating the Hacker: A non-technical guide to computer security by Robert Schifreen.
A review of Joe Navarro’s book “The Dictionary of Body Language”
For many, the purpose of the language is secondary and what matters is the reputation of the language itself. However others see those differences as features separating “worthy” languages from “unworthy” ones.
In the world of Linux, it’s easy to get lost in the middle of all the different distributions or “flavours”. However, there are two which make up an interesting part of the community: Arch and Manjaro.
Hackers, be it white hats or black hats seem to have some common principles under which they operate. How much of them are followed in practice are however an other story.
Internet censorship is a tool for propaganda at immense scale. Governments use it to restrict and shape what the users can see. Others not seek to control as much as they seek to see themselves, and privacy is a concept foreign to them.