YaK:: 2WiMC (GLEET) [Changes]   [Calendar]   [Search]   [Index]   [PhotoTags]   






https://github.com/HeyPuter/puter Puter ( https://news.ycombinator.com/item?id=39597030 ) https://dustinbrett.com/ ( DaedalOS ) [ 1. https://news.ycombinator.com/item?id=33838179 2. https://news.ycombinator.com/item?id=38830132 & https://news.ycombinator.com/item?id=29779753 3.https://news.ycombinator.com/item?id=35896505 ]

https://arxiv.org/pdf/1312.3824.pdf Introduction to Spinors, Andrew M. Steane, 2013

https://github.com/jhuangtw-dev/xg2xg ( by ex-googlers, for ex-googlers - a lookup table of similar tech & services )


0 75 144 20 97 0

/subsection GLEET

  • http://www.doxpara.com/ (Dan Kaminsky)
  • http://llvm.cs.uiuc.edu/ ( The LLVM Compiler Infrastructure )


    * http://www.mw2600.org/zine/mwa.txt

  • http://hyperphysics.phy-astr.gsu.edu/hbase/nuclear/nucstructcon.html


  • http://webster.cs.uga.edu/~purser/rangefinder.html
  • http://www.arches.uga.edu/~cygnusx5/hci/

  • http://www.albinoblacksheep.com/flash/piehole.php

    http://home.cogeco.ca/~ve3ll/jstutorh.htm <---- Javascript Classes

    static uint_fast32_t
    dl_new_hash (const char *s)
      uint_fast32_t h = 5381;
      for (unsigned char c = *s; c != '\0'; c = *++s)
        h = h * 33 + c;
      return h & 0xffffffff;
    (Dan Bernstein's string hash function posted eons ago on comp.lang.c.)

    [ Sorry, all guestbooks disabled temporarily due to rampant spam :(   ]

  • quantum-reality.txt

  • Treasure Island Muni 108 Bus Schedule:

  • Treasure_Island_108.rtf
  • treasure_island_muni_108.txt

    A Plan for the Improvement of English Spelling

    by Mark Twain (?)

    For example, in Year 1 that useless letter "c" would be dropped to be replased either by "k" or "s", and likewise "x" would no longer be part of the alphabet. The only kase in which "c" would be retained would be the "ch" formation, which will be dealt with later. Year 2 might reform "w" spelling, so that "which" and "one" would take the same konsonant, wile Year 3 might well abolish "y" replasing it with "i" and Iear 4 might fiks the "g/j" anomali wonse and for all.

    Jenerally, then, the improvement would kontinue iear bai iear with Iear 5 doing awai with useless double konsonants, and Iears 6-12 or so modifaiing vowlz and the rimeining voist and unvoist konsonants.

    Bai Iear 15 or sou, it wud fainali bi posibl tu meik ius ov thi ridandant letez "c", "y" and "x"—bai now jast a memori in the maindz ov ould doderez—tu riplais "ch", "sh", and "th" rispektivli.

    Fainali, xen, aafte sam 20 iers ov orxogrefkl riform, wi wud hev a lojikl, kohirnt speling in ius xrewawt xe Ingliy-spiking werld.

  • http://iris.lib.virginia.edu/tibet/texts/reprints/jbs/JBS_02_01_04.pdf Yaks do not take salt voluntarily and it has to be fed forcefully. The head is secured to the post by a short rope. The front and hind legs are tied together and the yaks brought to the ground on their sides. While one person holds the head and turns the mouth upwards, another person pours the salt down the animal's throat and follows it up with a mouthful of water to wash it down. Salt is fed thus to every animal monthly at the rate of 300-350 g per adult and 150- 200 g for yearlings.

  • fotodu.tcl


  • http://www.cs.ubc.ca/~murphyk/Bayes/bnintro.html (A Brief Introduction to Graphical Models and Bayesian Networks -- By Kevin Murphy, 1998)


  • "If you make gold out of lemons and lemonade, mean rude people will crush your gold and jewelry too. This is why the birds fly sometimes not." -Daxflame

    http://www.cfcl.com/vlb/weblog/archives/000538.html (inverse femtobarns)

  • Femtobarns.html
  • stanfordfemtobarn.html

    RE: IHNP4 ==> http://communication.ucsd.edu/bjones/Usenet.Hist/Nethist/0085.html


    Attack mitigation

    You'll want to use iptables u32 to skip over the IP and TCP headers of the packet, and match the first 4 bytes of the packet against "POST", like so:

    -m u32 --u32 0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0=0x504f5354 -m recent --set --name lastmeasure --rsource -j DROP One command. Seriously. Any linux machine you can drop in this single line into your iptables configuration and boom, you've stopped the attack. This is what EFnet did. This is what Buttesnet did (which has exactly ONE lazy stoner administrating it). You break out tcpdump, you look at what is going on, you block it in iptables. This is what Freenode could not do, because they don't know anything about anything. Also, you'll want a rule to make sure any subsequent traffic refreshes the drop entry:

    -m recent --update --seconds 86400 --name lastmeasure --rsource -j DROP

  • http://world.nycsubway.org/us/atlanta/marta-provisions.html



    http://forums.afterdawn.com/thread_view.cfm/704121 => mencoder -ovc x264 -oac faac -vf scale=320:240,dsize=320:240,harddup -x264encopts bitrate=448:vbv_maxrate=448:vbv_bufsize=2000:nocabac:threads=2:global_header:level_idc=30:me=umh -faacopts mpeg=4:object=2:br=128:raw -of lavf -lavfopts format=mp4 -o last-ever.mp4 9d98.last-ever.flv

    "Time flies like an arrow, but fruit flies like a banana." ( http://www.theregister.co.uk/2007/05/15/google_translation/ )



    An apparatus for use as a toy by an animal, for example a dog, to either fetch carry or chew includes a main section with at least one protrusion extending therefrom that resembles a branch in appearance. The toy is formed of any of a number of materials including rubber, plastic, or wood... Inventors: Ross Eugene Long, III Primary Examiner: Thomas Price


    bytecode interpreters for tiny computers by Kragen Javier Sitaker, 2007


    http://www.jfsowa.com/logic/math.htm Mathematical Background -- by John F. Sowa


    x86/x64 docs

    http://www.codemachine.com/article_x64deepdive.html -- X64 Deep Dive -- codemachine

    https://docs.google.com/gview?url=http://www.cs.usfca.edu/~cruse/cs686s07/lesson23.ppt&pli=1 -- special segment-registers -- how to utilize registers FS and GS

    http://siyobik.info/main/reference -- x86/x64 instruction set ref

    http://download.intel.com/design/intarch/papers/323246.pdf Minimal Intel Architecture Boot Loader

    CCC (Chaos Communications Camp) 2011 -- https://plus.google.com/photos/107725094985199419268/albums/5642455704953863937

    http://web.archive.org/web/20060813132807/http://www.research.ibm.com/journal/sj/032/falkoff.pdf -- A Formal Description of SYSTEM/360 by Adin D. Falkoff, Kenneth E. Iverson, and Edward H. Sussenguth, Jr., IBM Systems Journal, Volume 3, Number 3, 1964.

    http://www.jsoftware.com/papers/APLEvol1.htm -- The Evolution of APL, by Adin D. Falkoff and Kenneth E. Iverson. ACM SIGPLAN Notices 13, 1978-08.

    ( http://okmij.org/ftp/Computation/ -> . Programming_and_Computation )

    SVG http://srufaculty.sru.edu/david.dailey/svg/

    http://htwins.net/scale2/ <- scale of the universe (awesome)

    http://rtw.ml.cmu.edu/rtw/ <- NELL: Never-Ending Language Learning





    http://www.ft.com/cms/s/2/0ca06172-bfe9-11de-aed2-00144feab49a.html#axzz2KF8USa1z -- Soros

    http://haskell.cs.yale.edu/wp-content/uploads/2011/01/cs.pdf The Conception, Evolution, and Application of Functional Programming Languages Paul Hudak

    http://www.cypherpunks.ca/otr/Protocol-v2-3.1.0.html For the Diffie-Hellman group computations, the group is the one defined in RFC 3526 with 1536-bit modulus (hex, big-endian): and a generator (g) of 2.


    $ git remote -v
    remote        git@github.com:strickyak/AnttiYak.git (fetch)
    remote        git@github.com:strickyak/AnttiYak.git (push)
    $ git pull remote master
    $ git push remote master





    $ for x ; do echo $x ======== ; ffmpeg -i $x -an -b 600k -s 800x600 -r 10 /tmp/ptmp/$x.mp4 ; done

    mencoder -oac mp3lame -ovc x264 IN.xxx -o OUT.mp4 ### Transcoded old .MOV files, but Audio was skewed.


    final float densityMultiplier = getContext().getResources().getDisplayMetrics().density;
    final float scaledPx = 20 * densityMultiplier;
    final float size = paint.measureText("sample text");

    Why did my boss threaten to fire me over my 1 line sort? Is he jealous? for(int i=1,t,b=1,c=0,d=0,e=a.Length;c==0;t=d==1?a[i]:0,a[i]=d==1?a[i-1]:a[i],a[i-1]=d==1?t:a[i-1],b=d==1?0:b,i=i+1!=e?i+1:1,c=b==1&&i+1==e?1:0,b=i+1==e?1:b)d=a[i-1]>a[i]?1:0; (self.shittyprogramming) submitted 2 days ago by Lost4468



    http://bitjaruu.egloos.com/5138681 ( 내게 허락된 세상 ) http://cartoon.media.daum.net/webtoon/viewer/18083


    http://adi.is/s/cpunk20/#25 -- -- http://redecentralize.org/

    https://mywebspace.wisc.edu/lnmaurer/web/FloatingAway/FloatingAway.html -- -- http://amforth.sourceforge.net/

    https://github.com/dsmvwld/st76 (Smalltalk76)

    http://www.bradrodriguez.com/papers/moving1.htm (MOVING FORTH -- Part 1: Design Decisions in the Forth Kernel -- by Brad Rodriguez)

    http://copy.sh/v24/ (javascript x86)


    My Hero Chuck Moore -> http://blogs.msdn.com/b/ashleyf/archive/2013/09/21/chuck-moores-creations.aspx


    http://www.e-booksdirectory.com/mathematics.php -- Free Mathematics Books

    http://andhart.github.io/bijou/ A small (less than 2 kb) CSS framework


    http://robinhoksbergen.com/papers/howto_elf.html Manually Creating an ELF Executable

    http://orchardup.github.io/fig/? FIG: Fast, isolated development environments using Docker.


    http://blog.mist.io/post/82383668190/move-fast-and-dont-break-things-testing-with ; Testing with Jenkins, Ansible and Docker ; A big part of Mist.io is the web interface so we use tools like Selenium, Splinter and Behave for headless web interface testing.


    https://imgur.com/a/ajSwR ( Making a Tail from Yarn )

    http://www.cs.trinity.edu/~jhowland/math-talk/functional1/ ( Functional Programming and the J Programming Language )





    Formal Methods ( Coq , Frama-C , seL4 , KFramework.org )

    I/ContactLocale( 9281): AddressBook Labels [en_US]: [, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z, Α, Β, Γ, Δ, Ε, Ζ, Η, Θ, Ι, Κ, Λ, Μ, Ν, Ξ, Ο, Π, Ρ, Σ, Τ, Υ, Φ, Χ, Ψ, Ω, , А, Б, В, Г, Д, Е, Є, Ж, З, И, І, Ї, Й, К, Л, М, Н, О, П, Р, С, Т, У, Ф, Х, Ц, Ч, Ш, Щ, Ю, Я, , א, ב, ג, ד, ה, ו, ז, ח, ט, י, כ, ל, מ, נ, ס, ע, פ, צ, ק, ר, ש, ת, , ا, ب, ت, ث, ج, ح, خ, د, ذ, ر, ز, س, ش, ص, ض, ط, ظ, ع, غ, ف, ق, ك, ل, م, ن, ه, و, ي, , ก, ข, ฃ, ค, ฅ, ฆ, ง, จ, ฉ, ช, ซ, ฌ, ญ, ฎ, ฏ, ฐ, ฑ, ฒ, ณ, ด, ต, ถ, ท, ธ, น, บ, ป, ผ, ฝ, พ, ฟ, ภ, ม, ย, ร, ฤ, ล, ฦ, ว, ศ, ษ, ส, ห, ฬ, อ, ฮ, , ㄱ, ㄴ, ㄷ, ㄹ, ㅁ, ㅂ, ㅅ, ㅇ, ㅈ, ㅊ, ㅋ, ㅌ, ㅍ, ㅎ, , あ, か, さ, た, な, は, ま, や, ら, わ, #, ]



  • wordlist.txt



    http://www.tramm.li/i8080/emu8080.html ( CPM + 8080 )





    https://dynamicstory.org/ ( alex et al )

    http://design.perl6.org/Differences.html Differences between Perl 5 and Perl 6

    http://www.braeunig.us/space/orbmech.htm ORBITAL MECHANICS

    https://influxdb.com/docs/v0.9/concepts/storage_engine.html -- LevelDB doesn’t support hot backups. If you want to do a safe backup of the database, you have to close it and then copy it. The LevelDB variants RocksDB and HyperLevelDB fix this problem -- After struggling with LevelDB and its variants for a year we decided to move over to BoltDB, a pure Golang database heavily inspired by LMDB, a mmap B+Tree database written in C. It has the same API semantics as LevelDB: a key value store where the keyspace is ordered.

    https://gist.github.com/tqbf/be58d2d39690c3b366ad ( was http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html ) Cryptographic Right Answers

    http://brandonrose.org/clustering -- http://brandonrose.org/clustering

    http://www.dam.brown.edu/people/mumford/blog/2015/MathBeautyBrain.html -- equations in sidebar

    http://blogs.scientificamerican.com/roots-of-unity/creating-symmetry-frank-farris/ Frank Farris's "mystery curve." The formula is µ(t)=(cos(t)+cos(6t)/2+sin(14t)/3, sin(t)+sin(6t)/2+cos(14t)/3).

    http://comments.gmane.org/gmane.comp.hardware.tandy.coco/64887 -- no OS/9 6809 source code? (Feb 2013)

    https://github.com/petar/GoLLRB ( A Left-Leaning Red-Black (LLRB) implementation of balanced binary search trees for GoLang )

    "Secure" processors:

    vexillium.org/dl.php?confi2013_slides.pdf ( Beyond MOV ADD XOR - vexillium )




    https://www.youtube.com/watch?v=a9xAKttWgP4 (LIFE in APL) ( from https://news.ycombinator.com/item?id=7491519 )

    http://w3beinformed.org/index.html W3BE'S BE Informed!

    http://dev.stephendiehl.com/hask/ ( WHAT I WISH I KNEW WHEN LEARNING HASKELL )

    https://blog.apnic.net/2017/05/09/bbr-new-kid-tcp-block/ ( TCP flow control algorithms ) https://news.ycombinator.com/item?id=14298576

    http://www.navy-radio.com/manuals/acp/acp124d.pdf COMMUNICATION INSTRUCTIONS RADIO TELEGRAPH PROCEDURE

    http://www.gw3uep.ukfsn.org/100W_QTX/100W_QTX_Text_090711.htm ( 100W MF CW TX )

    http://electronics-diy.com/1watt-am-cw-transmitter-for-10-meterband.php (10m CW 1W)

    http://nmwilliam.tripod.com/el84.html ( single tube transmitter )

    Modal / Tense / Temporal Logic / D

    http://homepages.mcs.vuw.ac.nz/~rob/papers/modalhist.pdf ( p39: [Robert A.] Bull's Tense Algebra. "[Arthur N.] Prior called this logic D." )


    https://www.researchgate.net/profile/John_Burgess8/publication/38355634_Axioms_for_tense_logic_I_Since''_and_until''/links/56af58e608ae19a385174a2a.pdf ( Axioms for Tense Logic I. "Since" and "Until" JOHN P. BURGESS )

    Bull, R. A.: 1968, ‘An algebraic study of tense logic with linear time’, J. Symbolic Logic 33, 27–38.

    R. A. Bull, An Approach to Tense Logic ( https://projecteuclid.org/euclid.jsl/1183738968 )


    An Algebraic Study of Diodorean Modal Systems
    R. A. Bull
    The Journal of Symbolic Logic
    Vol. 30, No. 1 (Mar., 1965), pp. 58-64
    Published by: Association for Symbolic Logic
    DOI: 10.2307/2270582
    Stable URL: http://www.jstor.org/stable/2270582
    Page Count: 7




  • (unless otherwise marked) Copyright 2002-2014 YakPeople. All rights reserved.
    (last modified 2024-06-29)       [Login]
    This page is referenced by the following pages: