I was just watching this video of Fall 1983 COMDEX made by Dan Bricklin and Cheryl Moreau, when I noticed the Apricot PC with keyboard top row soft programmable function keys with an LCD label display: youtube.com/watch?v=1VNS8TE4Xh As pointless in 1983 as the Apple "touch bar" in 2016.

vas boosted

finally have a very rough draft of a paper about JACL, my #lisp, for ELS. check it out, thanks in advance for feedback! tailrecursion.com/~alan/docume

Pondering this question from 1991: “Can America afford to take the "high" out of high technology?” ralph-abraham.org/interviews/i

vas boosted

Once again, XKCD cuts through all the arguments. The decade start is officially resolved. Done. Finito!


Came across this post while reading about : news.ycombinator.com/item?id=2 "A slight performance gain of 1% by using Fortran has a noticeable effect on long-term economic gains" because bank is doing 100 million transactions a second. Can someone explain how is supposed to handle this transaction volume? Also, I want to learn FORTRAN now. What are your favorite FORTRAN books?

vas boosted

Want a clock visible while you edit text in ed(1)? 

@raspberry_boy (format nil "~80:@<foobar~>")

Also, death to LOOP. DO

Info if you are interested in Gorgon Stare

SRI ImagCalc project on automated surveillance in 1982, later added video and ran until 2017.



At 2007 ILC, Connolly and Quam demoed automated tracking on aerial and CCTV video. By that time the problem was long solved; they were working on automated event detection.

Also 2007, Connolly et al Recovering
Social Networks From Massive Track Datasets


New FSF @fsf@status.fsf.org website for Respect Your Freedom hardware certification lists: ryf.fsf.org/

@cwebber @emsenn From what I understand, if you can give the wrong string length, there may be ways to put undesired effects in the verbatim string, without buffer overflows.

@emsenn @cwebber Is that based on Lampson and Rivest's protocol? people.csail.mit.edu/rivest/Se I thought that length prefixes are considered potential sources of security holes in network protocols today.

human trafficking, phone apps 

vas boosted

"The fight isn't just in the streets, it's important to resist fascists online."
Like... probably sorta true.

But the fact that fascists claim space by getting you to debate them hasn't changed. And they get that space regardless of who wins the debate.

You wanna deny fascists space? Get them banned. Get them blocked. Get them demonetized and defunded. Hack them. Infiltrate them. Undermine them.

But. deny. them. space.

Wondering what to do with all those bits in your address? How about encoding mnemonic strings (hostnames, people names, whatever) in the interface identifier? oneofus.la/have-emacs-will-hac

@technomancy Don't forget about how Google Groups killed Usenet.

Show more
Mastodon @ SDF

"I appreciate SDF but it's a general-purpose server and the name doesn't make it obvious that it's about art." - Eugen Rochko