🦞🌯 Lobster Roll

Stories by mjturner

MIT Sells Half of /8 to Fund Move to IPv6 (gist.github.com)
The surprising struggle to get a UNIX Epoch time from a UTC string in C or C++ (berthub.eu)
Program design in the UNIX environment (1984) (harmful.cat-v.org)
A 35-year-old bug in patch found in efforts to restore 29 year old 2.11BSD (bsdimp.blogspot.com)
Acorn Archimedes (1987) (chrisacorns.computinghistory.org.uk)
> Fuelled by Acorn’s innovative ARM RISC processor, the Archimedes or ‘A’ series offer workstation power and spectacular graphics abilities at PC prices. With their place in education already assured, Dick Pountain believes their speed may also guarantee them entry into the business world.
Experiences from running a Tor Exit Node (blog.daknob.net)
Using YubiKey as a SmartCard for GPG and SSH (github.com)
1987 – 2017: SPARC Systems & Computing Epochs (renuraman.blog)
The Design of the NetBSD I/O Subsystems (2002) (arxiv.org)
(An ((Even Better) Lisp) Interpreter (in Python)) (2015) (norvig.com)
What are your favourite mailing lists?
I've always been a fan of discussion on mailing lists - I much prefer them to these new fangled web-based forums. What are your favourites? I guess I'm looking for those that may not be that well known, but which have good discussion about topics that interest Lobsters users. To get the ball ...
btrfs scrub sometime recalculates wrong parity in RAID5/6 (mail-archive.com)
Be sure to read the whole thread, starting [here](https://www.mail-archive.com/linux-btrfs@vger.kernel.org/msg55161.html). > So it sees the data strip corruption, uses good parity on disk to fix it, writes the fix to disk, recomputes parity for some reason but does it wrongly, and then overwrites...
The Imposter’s Handbook (bigmachine.io)
Not affiliated with the author in any way, just thought some here may be interested. > The Imposter's Handbook: a compendium of my year-long quest to fill the holes in my CS knowledge. Not a replacement for a degree, not an authoritative source for any of the concepts presented. Just a concise s...
Debian on Mellanox SN2700 (32x100G) (2023) (ipng.ch)
Deep C (and C++) (2011) (pvv.ntnu.no)
> Programming is hard. Programming correct C and C++ is particularly hard. Indeed, both in C and certainly in C++, it is uncommon to see a screenful containing only well defined and conforming code. Why do professional programmers write code like this? Because most programmers do not have a deep und...
Speed up your Python using Rust (developers.redhat.com)
Surf Demystified (troubleshooters.com)
> Surf is a simple, lightweight browser from Suckless Tools, the same people who brought you dmenu and dwm. When compiled and configured right, Surf is incredibly robust and stable, able to handle most websites extremely well, and it has a clean and simple layout without buttons and bars to encroach...
RFC 8620 - The JSON Meta Application Protocol (JMAP) (tools.ietf.org)
> This document specifies a protocol for clients to efficiently query, fetch, and modify JSON-based data objects, with support for push notification of changes and fast resynchronisation and for out-of-band binary data upload/download.
Using Let's Encrypt within FreeBSD.org - lessons learned and advice (2016) (blog.crashed.org)
CVE-2017-8301: TLS verification vulnerability in LibreSSL 2.5.1 - 2.5.3 (seclists.org)
Running Mac OS X 10.11.6 El Capitan on KVM + QEMU (github.com)
C: The Complete Nonsense (2012) (seebs.net)
See also Peter Seebach's comments about the [3rd edition](https://www.seebs.net/c/c_tcn3e.html) as well as a [critique](https://spinoza1111.wordpress.com/2010/04/03/in-the-matter-of-herb-schildt-an-analysis-of-c-the-complete-nonsense/) of Seebach's 3rd edition analysis.
m-cli: Swiss Army Knife for Mac OS X (github.com)
From the blurb: > **m-cli** differs from other mac command line tools in that: > > * Its main purpose is to manage administrative tasks and do it easier > * It doesn't install 3rd party tools because it doesn't have dependencies > * The installation is very easy and doesn't require intervent...
Patela: A basement full of amnesic servers (osservatorionessuno.org)
Judy Arrays (judy.sourceforge.net)
> Judy is a C library that provides a state-of-the-art core technology that implements a sparse dynamic array. Judy arrays are declared simply with a null pointer. A Judy array consumes memory only when it is populated, yet can grow to take advantage of all available memory if desired. > > Judy's ...
Onion mail delivery: so delicious! (github.com)
> Why deliver mail over Tor? > Even if you use TLS for your connections they are opportunistic. Even if you use OpenPGP for your connections, it is relatively easy for someone passively monitoring email traffic to correlate interesting metadata: who is communicating with whom, when and how much. ...
Advancing in the Bash Shell (samrowe.com)
Clockwise/Spiral Rule (1994) (c-faq.com)
Anti-If: The missing patterns (2016) (code.joejag.com)
VMS Software's OpenVMS AXP/IA64/x86-64 Rolling Roadmap, Updated for December 2017 (vmssoftware.com)