Issue #140
Learning TLA+, Stable Diffusion, Control theory and full video of Dsysphile expisode 1.
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.
— Ken Thompson
Posts
Learn TLA+ - #HillelWayne
Classic SE Mistakes by Steve McConnell - reproduced by - #JonathanCook
Why Mastering Language Is So Difficult for AI - #DanFalk in an interview with #GaryMarcus
Stateless — your new state of find with Elasticsearch - #LeafLin #TimBrooks #QuinHoxie on Evolving the architecture of Elasticsearch to simplify your deployment.
Vectors are over, hashes are the future of AI - #HamishOgilvy
Burned Out Tech CEO → Warehouse Associate - #JasonShen
How fateful? - #ChannonPerry
When I met my boyfriend, I sometimes felt a tinge of regret that we never got to make an adorable meet-cute story, despite living in the same city for five years and attending the same university. Our story isn’t unique from many couples in 2020- in a trough between COVID waves, we started speaking online, on Bumble, a dating app.
Thanks to Google’s location history quietly ticking away collecting GPS data in the background I thought that I could potentially find an answer to how fatefully our paths criss-crossed before we met. Just how closely did we come to potentially having an eyes-meet-across-the-room moment?
The Illustrated Stable Diffusion - #JayAlammar
It’s a UNIX system! I know this! - #ElaineCao
Surely, “just whip up a solution in an hour” doesn’t ever happen in reality.
Right? …right?
On Saturday, September 24, I had the opportunity to do something that most programmers only fantasize about. And it worked.
Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life - #niconiconi
Downturn career decisions. - #WillLarson
Someone is pretending to be me. - #ConnorTumbleson
Aging programmer - #JorgeManrubia
Books
The Fundamentals of Control Theory - #BrianDouglas
I'm writing an eBook. I started my YouTube channel because I was frustrated by the lack of straightforward and easy to understand videos on the topic and felt that what some students needed was a more practical and intuitive approach to understanding the material. This book is an extension of that idea. I’m releasing it under the Creative Commons License and giving the book out for free.
National Security Agency (NSA)
Cybersecurity Directorate Endpoint Security Cybersecurity and Infrastructure Security Agency (CISA)
NSA and CISA developed this document in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Videos
First episode of Dsysphile with transcript is now available on Youtube and Vimeo
Please reach out to me if you would be interested in having candid conversation about your work, engineering topics, distributed systems or anything in general. Looking forward to talk to more readers.
Happy weekend!