The Demise of the Mildly Dynamic Website

A game for learning C operator precedence

Linux's GPLv2 licence is routinely violated (2015)

I Don't Like Smartphones

Phone Numbers Must Die

How the K-line got its name: history of IRC daemon configuration

Freenode commits suicide, is no longer a serious IRC network

Freenode IRC operators now engaging in routine abuses of power

Show HN: Live Feed of the HN Top 30 as an IRC Channel

Patterns in application-layer protocol design

Go modules considered harmful

In the future, even your RAM will have firmware; and the subject of POWER10 blobs

The PowerPC AS Tagged Memory Extensions

Attributes of configuration languages

Modifying and running a binary by recompiling a reverse engineered disassembly

USB Mass Storage and USB-Attached SCSI Are Both SCSI

The different kinds of authentication protocols

Serial Attached SCSI (SAS) is a circuit switched computer network

A brief introduction to SCSI

Myths about USB NKRO and how USB HID works

Psychological effects of coding style (2016)

Embedding of binary data into programs

Mis-fitted USB ports, an epidemic

Total Advertising Denial

On Nexuses

Cloudflare Considered Harmful

XML is almost always misused

The evolution of the web, and a eulogy for XHTML2

The PowerPC AS Tagged Memory Extensions

On the opening of the Power ISA, and the chilling effects of proprietary ISAs

More →