Groklaw - 1 1 (pat. pending) — Mathematics,... →
This article provides a detailed factual explanation of why software is mathematics, complete with the references in mathematical and computer science literature. It also includes a detailed factual explanation of why mathematics is speech, complete once again with references. My hope is that it will help patent lawyers and judges handling patent litigation understand these fundamental truths, so...
Richard Feynman on education in Brazil →
The Principle of a Qualified Yes
So the principle is easy: Set the conditions of “yes” such that: If they say “yes,” you’re happy because the terms or money are so good, it more than compensates for the distraction, possibly even funding the thing you really want to do. If they say “no,” you’re happy because it wasn’t a great fit anyway, so it’s not worthwhile for a small return on your time and effort.
There Is No Magic | Deconstructing "Genius" →
Big companies spend months on marketing research. We go much faster —...– How Badoo built a billion-pound social network… on sex (Wired UK)
1. The network is reliable. 2. Latency is zero. 3. Bandwidth is infinite. 4....– Fallacies of Distributed Computing - Wikipedia, the free encyclopedia
The House Republican budget adds $6 trillion to the debt in the next decade yet...– ‘The Shining’ — national debt edition - The Washington Post
How to scale writes with master-master replication... →
This post is SEO bait for people trying to scale MySQL’s write capacity by writing to both servers in master-master replication. The short answer: you can’t do it. It’s impossible.
Hacking The Status Game | Amir Khella →
Life diversifies its own portfolio by giving us various roles to play. But we are not the roles we play, and we shouldn’t get our sense of self-worth from them.
The Lisp Curse →
Real Hackers, of course, have long known that object-oriented programming is not the panacea that its partisans have claimed. Real Hackers have moved on to more advanced concepts such as immutable data structures, type inferencing, lazy evaluation, monads, arrows, pattern matching, constraint-based programming, and so forth. Real Hackers have also known, for a while, that C and C are not...
The Lisp Curse →
Documentation may be lacking. Being essentially a project done in the hacker’s copious free time, the program is liable to suffer should real-life responsibilities intrude on the hacker. As Olin Shivers noted, this means that these one-man-band projects tend to solve eighty-percent of the problem.
As you can see, things in this country are getting worse and not better and the...– Why I Am So Bearish: Time to Be a Deep Value Investor, Part II - Seeking Alpha
Release Easy Release Often →
Create a task list, say in Excel. Anything not on the list doesn’t exist. Requests to add features by the coffee machine definitely do not count, let alone meetings, or contracts. If you’re anal about this, managers will conform because it’s not a bad idea anyway. You ought to break the task list amongst three tabs: Active, Completed, Deferred.
Winning a Nobel Prize is no big deal, but winning it with an IQ of 124 is really...– Feynman
William Wilkinson: I just got a prestigious invite... →
willw: I just got a prestigious invite to the CIO Summits! On behalf of our Board, I wanted to personally invite you into The CIO Summits because of your key role and experience. The CIO Summits is an invitation-only group comprised of the very best executives and visionaries in the technology…
I speak to people in the business world and the technology world, but I...– Rob Kalin