(Ciprian) Reading queue
(See also my writings, presentations, or notes.)
2016
August
2016-08-21
2015
December
2015-12-25
2015-12-12
2015-12-06
October
2015-10-22
2015-10-08
2015-10-06
September
2015-09-27
2015-09-25
June
2015-06-06
2015-06-01
March
2015-03-29
Go Static or Go Home -- In the end, dynamic systems are simply less secure;
HTTP/2.0 -- The IETF is Phoning It In -- Bad protocol, bad politics;
Bugs and Bragging Rights -- It's not always size that matters;
February
2015-02-25
January
2015-01-19
How to Keep Your AWS Credentials on an EC2 Instance Securely;
Securing the Cloud: Part 2 -- Managing Security Around Remote Login and Development;
Securing the Cloud: Part 3 -- Credentials and Password Policies;
2015-01-05
2014
December
2014-12-27
2014-12-09
November
2014-11-20
2014-11-14
Project health, and why it's important -- part of the #shellshock afterwords;
JavaScript is Assembly Language for the Web: Part 2 - Madness or just Insanity?;
October
2014-10-16
2014-10-05
September
2014-09-17
2014-09-06
August
2014-08-19
July
2014-07-17
2014-07-07
June
2014-06-27
2014-06-24
2014-06-19
May
2014-05-14
2014-05-11
2014-05-10
2014-05-09
April
2014-04-02
March
2014-03-29
2014-03-28
If GCHQ wants to improve national security it must fix our technology;
Which data does the Guardtime signature provider transfer to external parties?;
why does the world need another syslogd? (aka rsyslog vs. syslog-ng);
2014-03-25
2014-03-23
2014-03-21
2014-03-20
2014-03-19
2014-03-18
2014-03-15
2014-03-13
2014-03-06
2014-03-05
February
2014-02-28
Ripoff nation: How Verizon and AT&T stacked the deck against cellphone users;
Finding People's Locations Based on Their Activities in Cyberspace;
2014-02-20
2014-02-11
2014-02-13
What happens with digital rights management in the real world?;
International Principles on the Application of Human Rights to Communications Surveillance;
January
2014-01-29
2014-01-27
2014-01-21
Center Wheel for Success --- "Not invented here" syndrome is not unique to the IT world;
This is the Foo Field --- The meaning of bits and avoiding upgrade bog downs;
The Road to SDN --- An intellectual history of programmable networks;
2014-01-16
2014-01-15
Bug#727708: init system other points, and conclusion -- from Ian Jackson;
Bug#727708: init system other points, and conclusion -- from Russ Allbery;
2014-01-02
2013
December
2013-12-30
2013-12-23
Bad Science vs. Good Science: A Guide for the Layperson (Part 2);
Bad Science vs. Good Science: A Guide for the Layperson (Part 1);
2013-12-21
2013-12-19
2013-12-18
A (relatively easy to understand) primer on elliptic curve cryptography;
David Brin Rebuts Schneier In Defense of a Transparent Society;
2013-12-12
2013-12-06
2013-12-05
PaaS Under the Hood, Episode 5: Distributed Routing with Hipache;
PaaS Under the Hood, Episode 6: How to Optimize the Memory Usage of Your Apps;
2013-12-03
2013-12-02
November
2013-11-12
2013-11-10
October
2013-10-22
2013-10-17
2013-10-11
2013-10-09
Edward Snowden’s E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Documents Show;
Government Announces Steps to Restore Confidence on Encryption Standards;
2013-10-05
NSA and GCHQ target Tor network that protects anonymity of web users;
New Snowden Documents Show NSA Deemed Google Networks a "Target";
2013-10-04
2013-10-03
September
2013-09-27
Revealed: how US and UK spy agencies defeat internet privacy and security;
Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security;
What Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?;
The Real, Terrifying Reason Why British Authorities Detained David Miranda;
David Miranda: 'They said I would be put in jail if I didn't co-operate';
Reddit: Lessons Learned from Mistakes Made Scaling to 1 Billion Pageviews a Month;
2013-09-26
The US government has betrayed the internet. We need to take it back;
NSA: Possibly breaking US laws, but still bound by laws of computational complexity;
Re: [Cryptography] Opening Discussion: Speculation on "BULLRUN";
August
2013-08-09
Now That It’s in the Broadband Game, Google Flip-Flops on Network Neutrality;
FSFE objects to claims of 'predatory pricing' in Free Software;
2013-08-02
July
2013-07-25
2013-07-23
2013-07-19
Google told to find new solution for European search antitrust row;
Spygate Lawsuit Accuses NSA of Unconstitutional ‘Dragnet Electronic Surveillance’;
2013-07-18
2013-07-16
2013-07-12
2013-07-06
2013-07-04
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program;
Misinformation on classified NSA programs includes statements by senior U.S. officials;
NSA collected US email records in bulk for more than two years under Obama;
2013-07-02
June
2013-06-26
2013-06-25
2013-06-23
2013-06-20
2013-06-19
2013-06-17
2013-06-07
2013-06-06
Turkish demonstrations using social media despite censorship;
Disclosure timeline for vulnerabilities under active attack;
Rebooting Responsible Disclosure: a focus on protecting end users;
2013-06-05
May
2013-05-31
2013-05-25
2013-05-24
2013-05-17
2013-05-16
2013-05-09
2013-05-07
2013-05-01
April
2013-04-19
2013-04-17
2013-04-16
2013-04-15
2013-04-12
2013-04-11
2013-04-10
2013-04-08
2013-04-06
2013-04-04
2013-04-03
March
2013-03-30
2013-03-29
2013-03-28
2013-03-26
2013-03-22
2013-03-18
2013-03-16
2013-03-14
2013-03-11
2013-03-10
Building A Node.JS Server That Won’t Melt -- A Node.JS Holiday Season, part 5;
Taming Configurations with node-convict – A Node.JS Holiday Season, part 7;
2013-03-07
2013-03-05
2013-03-04
February
2013-02-28
2013-02-27
2013-02-25
2013-02-21
2013-02-20
2013-02-07
January
2013-01-31
2013-01-30
2013-01-27
2013-01-26
2013-01-23
2013-01-22
2013-01-19
2013-01-15
2013-01-13
2013-01-11
2013-01-09
Patterns For Large-Scale JavaScript Application Architecture;
The truth about Goobuntu: Google's in-house desktop Ubuntu Linux;
2013-01-08
CPC: programming with a massive number of lightweight threads;
Continuation Passing for C: A space-efficient implementation of concurrency;
2013-01-07
2013-01-05
2013-01-04
2013-01-03
2012
December
2012-12-22
2012-12-21
2012-12-20
2012-12-19
2012-12-18
2012-12-17
2012-12-14
2012-12-13
November
2012-11-30
2012-11-22
When Will our Email Betray Us? An Email Privacy Primer in Light of the Petraeus Saga;
Surveillance and Security Lessons From the Petraeus Scandal;
2012-11-20
LCE: The failure of operating systems and how we can fix it;
My First Recommendation to New Scientific Coders: Learn Visualization;
2012-11-17
2012-11-15
2012-11-10
2012-11-08
October
2012-10-28
2012-10-24
2012-10-23
2012-10-21
2012-10-19
2012-10-18
2012-10-17
2012-10-16
2012-10-15
Passwords in the wild, part I: the gap between theory and implementation;
Passwords in the wild, part III: password standards for the Web;
Password cracking, part II: when does password cracking matter?;
2012-10-12
2012-10-11
2012-10-07
September
2012-09-25
2012-09-22
2012-09-21
Web Sites with Embedded Command Lines: You got your Command Line in my Internet;
UPDATE: New York Judge Tries to Silence Twitter in Its Ongoing Battle to Protect User Privacy;
2012-09-17
2012-09-15
2012-09-14
2012-09-10
2012-09-04
2012-09-01
August
2012-08-30
2012-08-29
A Plea to Software Vendors from Sysadmins - 10 Do's and Don'ts;
The Game of Distributed Systems Programming. Which Level Are You?;
Introducing Gizzard, a framework for creating distributed datastores;
2012-08-28
2012-08-27
The birth of LISP -- a summary of John McCarthy's original paper;
Google CIO and others talk DevOps and "Disaster Porn" at Surge;
2012-08-24
2012-08-23
2012-08-22
2012-08-21
2012-08-20
2012-08-19
2012-08-15
2012-08-14
2012-08-13
2012-08-10
2012-08-09
2012-08-08
2012-08-04
2012-08-03
Careful, Twitter -- remember what happened to MySpace and Digg;
The $8 Billion Elephant in the Room: How to Understand the Future of Twitter;
July
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-07-27
2012-07-26
2012-07-25
2012-07-19
2012-07-18
2012-07-17
2012-07-16
2012-07-14
2012-07-13
Introducing MicroXML, Part 1: Explore the basic principles of MicroXML;
Introducing MicroXML, Part 2: Process MicroXML with MicroLark;
2012-07-11
2012-07-10
2012-07-09
2012-07-07
2012-07-05
2012-07-03
June
2012-06-30
2012-06-28
2012-06-26
2012-06-23
2012-06-21
Biometric National IDs and Passports: A False Sense of Security;
"Hacking" Strikes Fear in the Heart of Texas Bureau of Prisons;
2012-06-19
2012-06-18
2012-06-17
2012-06-16
2012-06-15
2012-06-14
2012-06-11
2012-06-06
2012-06-04
2012-06-01
May
2012-05-31
2012-05-30
2012-05-29
2012-05-28
2012-05-25
2012-05-23
2012-05-17
2012-05-15
2012-05-14
2012-05-04
2012-05-02
April
2012-04-25
2012-04-21
2012-04-20
March
2012-03-30
2012-03-24
2012-03-16
2012-03-13
2012-03-07
2012-03-01
February
2012-02-29
2012-02-23
2012-02-09
2012-02-07
2012-02-06
2012-02-05
2012-02-04
2012-02-03
2012-02-01
January
2012-01-30
2012-01-29
2012-01-24
2012-01-22
2012-01-21
2012-01-19
2012-01-14
2012-01-10
2012-01-07
2011
December
2011-12-31
2011-12-29
2011-12-20
2011-12-13
2011-12-09
2011-12-07
2011-12-06
2011-12-02
2011-12-01
November
2011-11-30
2011-11-24
2011-11-23
2011-11-18
2011-11-17
2011-11-14
2011-11-12
2011-11-09
2011-11-06
2011-11-05
2011-11-03
2011-11-02
2011-11-01
October
2011-10-31
2011-10-26
2011-10-25
2011-10-24
2011-10-21
2011-10-18
2011-10-17
2011-10-12
September
2011-09-29
2011-09-27
2011-09-26
2011-09-20
2011-09-18
2011-09-16
2011-09-15
2011-09-14
2011-09-08
2011-09-07
August
2011-08-29
2011-08-16
So sue me: are lawyers really the key to computer security?;
Deep packet inspection used to stop censorship in new "Telex" scheme;
2011-08-15
2011-08-13
2011-08-10
July
2011-07-27
2011-07-26
2011-07-22
2011-07-14
June
2011-06-28
2011-06-01
May
2011-05-25
2011-05-13
2011-05-08
2011-05-07
April
2011-04-25
2011-04-24
2011-04-23
2011-04-22
2011-04-10
March
2011-03-30
2011-03-26
2011-03-22
2011-03-20
2011-03-18
2011-03-17
February
2011-02-21
2011-02-17
2011-02-14
2011-02-13
Developing RESTful Web Services with Webmachine;
2011-02-04
2011-02-03
2011-02-01
January
2011-01-29
2011-01-18
2011-01-13
2011-01-09
2011-01-08
2011-01-04
2011-01-03
2011-01-02
2011-01-01
2010
December
2010-12-31
2010-12-27
2010-12-26
2010-12-25
2010-12-24
2010-12-22
WikiLeaks website pulled by Amazon after US political pressure;
Google's ChromeOS means losing control of data, warns GNU founder Richard Stallman;
Lessons from WikiLeaks: decentralize, decentralize, decentralize;
2010-12-17
2010-12-16
2010-12-15
2010-12-09
2010-12-08
2010-12-07
2010-12-04
Common Sense and Security: Body Scanners, Accountability, and $2.4 Billion Worth of Security Theater;
November
2010-11-23
2010-11-21
Plan 9 –- an Integrated Approach to Grid Computing;
2010-11-20
2010-11-16
The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis;
2010-11-09
2010-11-04
2010-11-01
October
2010-10-30
2010-10-28
2010-10-27
2010-10-24
The way GitHub helped Erlang and the way Erlang helped Github;
Joe Armstrong and Simon Peyton Jones discuss Erlang and Haskell;
2010-10-23
2010-10-19
2010-10-18
2010-10-17
2010-10-14
2010-10-09
2010-10-02
2010-10-01
September
2010-09-17
2010-09-14
2010-09-13
2010-09-11
Hello! Students Have a Right to Keep Cell Information Private;
Overview to the OSS-QM project;
2010-09-03
August
2010-08-31
2010-08-22
EFF to Verizon: Etisalat Certificate Authority Threatens Web Security;
Mnesia A Distributed Robust DBMS for Telecommunications Applications;
2010-08-19
2010-08-12
2010-08-11
2010-08-08
July
2010-07-30
2010-07-10
2010-07-08
2010-07-02
2010-07-01
June
2010-06-30
2010-06-24
2010-06-23
2010-06-02
May
2010-05-27
2010-05-24
2010-05-19
2010-05-16
2010-05-15
2010-05-13
2010-05-07
2010-05-06
2010-05-04
2010-05-01
April
2010-04-29
Everyday mongoDB -- Open-source, high-performance, schema-free, document-oriented database;
Tin -- A database engine so tiny, its name had to be shortened;
2010-04-28
2010-04-24
Getting Things Done -- The Art of Stress-Free Productivity;
2010-04-23
2010-04-21
2010-04-18
2010-04-06
March
2010-03-31
2010-03-27
2010-03-24
2010-03-07
2010-03-06
2010-03-05
2010-03-03
February
2010-02-24
2010-02-21
2010-02-15
A Descent into Limbo;
The design of the Inferno virtual machine;
2010-02-14
Plan 9 From Bell Labs;
2010-02-13
2010-02-12
2010-02-10
2010-02-09
2010-02-07
2010-02-06
2010-02-05
January
2010-01-28
2010-01-25
2010-01-24
The Xcpu Cluster Management Framework;
XGet: A Highly Scalable and Efficient File Transfer Tool for Clusters;
The Use of Name Spaces in Plan 9;
A Unified Execution Model for Cloud Computing;
KvmFS: Virtual Machine Partitioning For Clusters and Grids;
2010-01-23
2010-01-22
2010-01-17
2010-01-16
2010-01-15
2010-01-07
2009
December
2009-12-31
2009-12-19
2009-12-18
2009-12-15
2009-12-14
2009-12-12
2009-12-06
2009-12-02
November
2009-11-25
2009-11-24
2009-11-20
October
2009-10-27
2009-10-24
2009-10-18
September
2009-09-23
2009-09-18
August
2009-08-23
2009-08-22
2009-08-21
2009-08-20
2009-08-19
2009-08-16
2009-08-15
2009-08-06
2009-08-04
2009-08-03
2009-08-02
July
2009-07-31
2009-07-26
2009-07-04
June
2009-06-23
2009-06-17
2009-06-16
May
2009-05-31
2009-05-29
April
2009-04-25
2009-04-20
2009-04-18
2009-04-10
2009-04-07
2009-04-06
2009-04-01
March
2009-03-28
2009-03-25
2009-03-21
2009-03-14
2009-03-08
2009-03-03
February
2009-02-26
2009-02-24
2009-02-20
2009-02-15
Probability lessons may teach children how to weigh life’s odds and be winners;
It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinct;
January
2009-01-03
2009-01-19
2009-01-16
2009-01-11
2008
December
2008-12-25
November
2008-11-29
2008-11-27
2008-11-06
October
2008-10-29
2008-10-15
2008-10-14
2008-10-11
2008-10-06
September
2008-09-24
2008-09-10
2008-09-09
2008-09-08
August
2008-08-28
2008-08-27
2008-08-24
2008-08-20
2008-08-17
2008-08-16
2008-08-15
2008-08-10
2008-08-07
2008-08-05
2008-08-02
July
2008-07-25
2008-07-20
2008-07-19
2008-07-18
2008-07-17
2008-07-16
2008-07-15
/2008 /2009 /2010 /2011 /2012 /2013 /2014 /2015 /2016 /History |