Non-English-based programming languages

Non-English-based programming languages

Non-English-based programming languages are computer programming languages that, unlike better-known programming languages, do not use keywords taken from, or inspired by, the English vocabulary. There has been an overwhelming trend in programming languages to use the English language to inspire the choice of keywords and code libraries. In other words, over a third of all programming languages were developed in a country with English as the primary language.

Source: en.wikipedia.org

Microsoft’s Linux Kernel

Microsoft’s Linux Kernel

Linux kernel
============

There are several guides for kernel developers and users. The formatted documentation can also be read online at:

are various text files in the Documentation/ subdirectory,
several of them using the Restructured Text markup notation. Please read the file, as it contains the
requirements for building and running the kernel, and information about
the problems which may result by upgrading your kernel.

Source: github.com

GNU Linear Programming Kit

GNU Linear Programming Kit

Welcome to the Wikibook about GLPK, the GNU Linear Programming Kit for solving large-scale linear programming (LP), mixed integer programming (MIP), and other related problems. This Wikibook also covers a number of related initiatives (for instance, cross-platform model editors) which have clustered around the mainline GLPK project. Your participation in the writing and editing of the GLPK wikibook is highly appreciated.

Source: en.wikibooks.org

Microsoft Tells FTC Repair Poses a Cyber Risk. It Doesn’t

Microsoft Tells FTC Repair Poses a Cyber Risk. It Doesn’t

“The unauthorized repair and replacement of device components can result in the disabling of key hardware security features or can impede the update of firmware that is important to device security or system integrity,” Microsoft wrote. Specifically, Microsoft suggests that unscrupulous independent repair technicians with access to its devices could disable the Trusted Platform Module or other security protections. “If the TPM or other hardware or software protections were compromised by a malicious or unqualified repair vendor, those security protections would be rendered ineffective and consumers’ data and control of the device would be at risk,” the company wrote.

Source: securepairs.org

Why humans run the world (2015) [video]

Why humans run the world (2015)

Seventy thousand years ago, our human ancestors were insignificant animals, just minding their own business in a corner of Africa with all the other animals. But now, few would disagree that humans dominate planet Earth; we’ve spread to every continent, and our actions determine the fate of other animals (and possibly Earth itself). TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world’s leading thinkers and doers give the talk of their lives in 18 minutes (or less).

Source: www.youtube.com

Rethinking the Commodore 64 Memory Map (2018)

Rethinking the Commodore 64 Memory Map (2018)

How can you put an entire operating system, with keyboard and mouse drivers, memory management, string and math libraries, an event model, widget toolkit, menu system, screen compositor, and more, in just a handful of kilobytes such that you’ll still have most of the small space left over for an application’s own code and data? After some effort of writing a paged memory manager that would use bits to indicate used pages of memory, and then cramming a 32 byte bit-map under I/O space at $Dxxx, I realized you need more code to manipulate those bits than the number of bytes you save by using bits. It is actually possible to have two character sets coded up and stored in memory, each for different phases of the game.

Source: www.c64os.com

Microsoft’s eBook Apocalypse Shows the Dark Side of DRM

Microsoft’s eBook Apocalypse Shows the Dark Side of DRM

And while a handful of incidents have brought that reality into sharp relief over the years, none has quite the punch of Microsoft disappearing every single ebook from every one of its customers. John Sullivan, Free Software Foundation

Presumably not many people purchased ebooks from Microsoft; that’s why it’s pulling the plug in the first place. More than anything, Microsoft’s ebook rapture underscores the hidden dangers of the DRM system that underpins most digital purchases.

Source: www.wired.com

China pressured London police to arrest Tiananmen protester, says watchdog

China pressured London police to arrest Tiananmen protester, says watchdog

Police watchdog investigators then found evidence that the Met’s treatment of Shao, one of the last protesters in Tiananmen Square in 1989, was influenced by pressure from Beijing to ensure Xi was not “embarrassed” by protests during his visit. Following Chinese pressure, documents show UK government officials, understood to be from the Home Office, also made “unusual requests” to the police about managing the state visit, an intervention that one officer described as from the Independent Office for Police Conduct (IOPC) found proof that demands from Chinese officials, including its security service, may have informed the decision to arrest Shao for conspiracy. “There is evidence to indicate that these requests, together with their consideration of the ongoing risk to the CSV [Chinese state visit] and to Shao’s safety, thereby influenced the decision to arrest Shao for conspiracy,” stated an IPOC report.

Source: www.theguardian.com

Show HN: Web pages stored entirely in the URL

Show HN: Web pages stored entirely in the URL

As hinted by its name, URL Pages works by storing the entire contents of a web page in the URL. The rest of the URL Pages program is responsible for translating between web page code (HTML/CSS/JavaScript) and an “encoded” URL. Web pages in URLs are definitely not how things on the web were meant to be done, so don’t be surprised if trying to use URL Pages causes unexpected issues.

Source: github.com

Factoring may be easier than you think (2016)

Factoring may be easier than you think (2016)

Enough people have tried to find efficient factoring algorithms that we can be confident the problem isn’t easy, but there’s no reason to think it’s impossible. These functions interpolate between L (n) = nc and L (n) = (log n)c.

Until the 1970’s, the best algorithms known for factoring all had running times of the form L (n) for some constant c. Some people suspected that this was the true complexity of factoring, but in the late 1980’s the number field sieve reduced the running time to L (n).

Source: math.mit.edu