Skip to main content
Random links that do long belong elsewhere.

Items

Metaheuristics—the metaphor exposed (onlinelibrary.wiley.com)
Added 1 month ago
Kenneth Sörensen (2013) https://doi.org/10.1111/itor.12001
Kunlei Lian (kunlei.github.io)
Added 1 month ago
OR/ML Scientist
Added 1 month ago
The Deathbed Fallacy (hjorthjort.xyz)
Added 1 month ago
This topic has bothered me for years. So now, in a moment of inspiration instigated by Wait But Why1 and drinking a glass or two of bourbon, I want to hash i...
Task estimation: Conquering Hofstadter's Law (thesearesystems.substack.com)
Added 1 month ago
How to turn your time estimates into reliable predictions — and communicate them.
Darij Grinberg: Problem Solving (Math 235), Fall 2020
Software security is dire, which is a function both of the quality of the code and the sheer amount of it.
Added 2 months ago
Niklaus Wirth, 1995. Software's girth has surpassed its functionality because hardware makes this possible. https://doi.org/10.1109/2.348001
Added 2 months ago
A reflection on control, burnout, and the strange weight of technical fluency.
We Are Sorry to Inform You ... (wp.doc.ic.ac.uk)
Added 2 months ago
Rejecting famous computer science papers.

Discover more

Collection timeline

Created: April 28, 2025 Updated: June 28, 2025

Starred by

No users have starred this collection yet.

Similar collections

No similar collections were found.