Researchers: Medical errors now third leading cause of death in US
A new study by patient safety researchers shows common medical errors may be the third leading cause of death in the U.S., after heart disease and cancer. (Deirdra O'Regan/The Washington Post)Nightmare...
View ArticleThe Best Way to Not Get Tenure
At the extremes, there are two ways to approach tenure. You can conform to the norms established for junior faculty. Or you can be yourself. I’m happy that I set my own course, and proud of the way...
View ArticleSymmetric multi-processing, multi-threading and synchronisation explained
Nowadays we have computers and phones equipped with multi-core processors. These computers can actually perform multiple computations in parallel. All the cores or processors share the same memory...
View ArticleElon Musk's finances
LIKE most technology tycoons, Elon Musk exudes disdain for finance. Convertible bonds and lease accounting are problems for Wall Street, while the visionaries in California focus on driverless cars and...
View ArticleThe Sad State of HTML Email Input Fields and IDNs
The current state of HTML email input fields is a bit of a mess when it comes to IDNs (Internationalised Domain Names). You would think it was as simple as:<input...
View ArticleIPFS is the distributed web
The web of tomorrow needs IPFS todayHTTP is inefficient and expensiveHTTP downloads a file from a single computer at a time, instead of getting pieces from multiple computers simultaneously. With video...
View ArticlePayPal 2FA Bypass
Recently I was in a hotel needing to make a payment, there was no phone signal so I could not receive my Two Factor Auth token. Luckily for me Paypal’s 2FA took less than five minutes to bypass.Step 1:...
View ArticleCongressman calls for probe into Valeant’s pricing of lead poisoning drug
The huge increase in the price of a lifesaving lead poisoning treatment has prompted a Michigan lawmaker to call for a congressional investigation into Valeant Pharmaceuticals.Two years ago, the drug...
View ArticleHN comments are underrated
HN comments are underratedHN comments are underratedHN comments are terrible. On any topic I’m informed about, the vast majority of comments are pretty clearly wrong. In many cases, there aren’t any...
View ArticleLiving in the Age of Software Fuckery
Ten Anti-patterns and Malpractices in Modern Software DevelopmentYour hopes? Your sanity? Your next code base.1) Business Thinking Favors the Short-Term — To an ExtremeAccording to Alan Kay, there are...
View ArticleIs Your Site Leaking Password Reset Links?
Self-service password resets are a common part of many web applications. The typical password reset link is emailed to the user and contains a unique token that in some manner identifies the user. By...
View ArticleHow to Write a Lisp Interpreter in Python (2010)
(How to Write a (Lisp) Interpreter (in Python)) This page has two purposes: to describe how to implement computer language interpreters in general, and in particular to show how to implement a subset...
View ArticleSSL Death Alert: OpenSSL (CVE-2016-8610)
oss-sec mailing list archivesCVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoSFrom: 石磊 <shilei-c () 360 cn>Date: Mon, 24 Oct 2016 07:44:27 +0000In August,...
View ArticleSmartAsset (YC S12) Is Hiring a Lead Data Engineer in NYC
Job DescriptionSmartAsset is quickly becoming the web’s default destination for personal finance advice. Our software integrates over 130 different data sources to provide automated answers to...
View ArticleIntroducing Initialized Capital
Welcome to Initialized Capital. We’re proud to announce we're investing out of a new $115M early stage seed VC fund. We’re founders who are engineers, designers, and product people. We’ve built...
View ArticleEx-Buzzfeeders make games out of news
“The world thinks America is weak. As Commander-In-Chief, it’s up to you to prove them wrong. By bombing…all of them.”The words appear on screen, accompanied by a portentous tune reminiscent of late...
View ArticleCapturing Millions of Packets per Second in Linux without Third-Party Libraries
My article will tell you how to accept 10 million packets per second without using such libraries as Netmap, PF_RING, DPDK and other. We are going to do this with Linux kernel version 3.16 and some...
View ArticleHow Snowden's Disclosures Made All Our Data Safer
As a result of the Snowden revelations, the tech community and industry have been forced to take security and privacy much more seriously. Our technology—and the intimate personal data it holds—is more...
View ArticleLiving in China’s Expanding Deserts
People on the edges of the country’s vast seas of sand are being displaced by climate change.This desert, called the Tengger, lies on the southern edge of the massive Gobi Desert, not far from major...
View ArticleBuilding a Bank with Kubernetes [slides]
the privacy settings on the video are pretty strict (no embedding either)..all I can suggest is that you send a tweet to @milosgajdos& @ipedrazas (it looks like they were involved in organizing...
View Article