Waiting for Gödel: 2016
"A mathematician is said to be a machine for turning coffee into theorems, and at that Gödel excelled, although he said that the coffee in Vienna was wretched. For Peter O’Hearn, an engineering manager at Facebook and professor at University Col..."
J. Bradford Hipps
To Write Better Code, Read Virginia Woolf: 2016
"I’ve worked in software for years and, time and again, I’ve seen someone apply the arts to solve a problem of systems. The reason for this is simple. As a practice, software development is far more creative than algorithmic.
Raymond Tomlinson, Who Put the @ Sign in Email, Is Dead at 74: 2016
"Raymond Tomlinson [is] the computer programmer who in 1971 invented email as it is known today and in the process transformed the “at” sign--@--from a sparely used price symbol to a permanent fixture in the lives of millions of ..."
Donald E. Knuth
Things a Computer Scientist Rarely Talks About: 2001
"I have kind of a radical idea about this, but I’ve had it for 30 years now and still haven’t found anything wrong with it. Namely, suppose someone asks, “Why did computer science jell so fast during the 60s, all of a sudden becoming..."
J. Katz & Y. Lindell
Introduction to Modern Cryptography (2nd ed.): 2015
"A key intellectual contribution of modern cryptography has been the recognition that formal definitions of security are an essential first step in the design of any cryptographic primitive or protocol. The reason, in retrospect, is simple: if ..."
Alan Turing: The Enigma: 2014
"The same timelessness lies behind the central element of Alan Turing’s story: the universal machine of 1936, which became the general-purpose digital computer in 1945. The universal machine is the focal, revolutionary idea of Turing’s lif..."
Kenneth O. Stanley and Joel Lehman
Why Greatness Cannot Be Planned: 2015
"The hope is that peer review will reject or improve weak ideas, while the most important ideas will be published. Through publishing, these important ideas reach the top minds in the field--who can explore them further as stepping stones, and sc..."
I Can’t Let You Do That, Dave: 2015
"No matter how cleverly the operating system and its services monitor the user and hide the keys necessary to unlock files without permission, users will eventually find a flaw in the defenders’ code and use it to jailbreak the system, allowing ..."
The Coming Age of the Internet of Things: 2015
"So this evolving Internet is now having to adapt to many billions of new devices coming online, performing a variety of different functions. […] I certainly didn’t anticipate any of this in the 70s, when we were doing the original design."