|
You are here |
tomforsyth1000.github.io | ||
| | | | |
jackrusher.com
|
|
| | | | | [AI summary] The speaker discusses various interactive and visual programming environments, emphasizing the importance of live coding, immediate feedback, and the integration of programming with visualization tools. They highlight systems like Clerk, which allows for real-time data inspection and notebook-based development, and mention projects like Enso and others that use projectional syntax and dynamic visualization. The talk also touches on educational tools for teaching programming through music and visual interfaces, and the speaker thanks the organizers and sponsors for their support. | |
| | | | |
randomascii.wordpress.com
|
|
| | | | | Is IEEE floating-point math deterministic? Will you always get the same results from the same inputs? The answer is an unequivocal "yes". Unfortunately the answer is also an unequivocal "no". I'm afraid you will need to clarify your question. My hobby: injecting code into other processes and changing the floating-point rounding mode on some threads... | |
| | | | |
www.smashcompany.com
|
|
| | | | | [AI summary] The essay explores the broader implications of containerization technologies like Docker, comparing them to past programming paradigms such as object-oriented programming (OOP). It argues that while Docker and similar tools offer flexibility and modernization, they also introduce complexity and may become overhyped, much like OOP did in the past. The author suggests that the tech industry should be cautious about adopting new paradigms without fully understanding their long-term consequences. The piece also touches on the potential for future simplifications, such as separating compute from other aspects of computing, and references historical and theoretical frameworks like RINA to suggest alternative approaches. | |
| | | | |
blog.torproject.org
|
|
| | | In the past few years, a technique called browser fingerprinting has received a lot of attention because of the risks it can pose to privacy. What is it? How is it used? What is Tor Browser doing against it? In this blog post, I'm here to answer these questions. | ||