The weakest passwords you can get away with
Or: why password strength checkers are useless.
Or: why password strength checkers are useless.
How long might this take, in the worst case?
Three approaches to solving problems on computers.
A model of the planets as black bodies is surprisingly accurate, except in one interesting case1.
Fog computing is like cloud computing except that no-one can see what you are doing.
Physicists seem still to be taught about tensors as being, essentially, multidimensional arrays with special transformation rules which must be learned by rote. So I wrote a document which tries to present a more useful approach.
Do not eat the free lunch: it has probably been poisoned.
I play the guitar. Something that has been fashionable for some time is what are often called ‘road worn’ guitars. In other words new (but vintage-spec) guitars which have been aggressed in various ways to make them look old.
How easy are physical systems to predict?
When I first used Lisp, the common refrain was that Lisp was dead.