Skip to main content
Random links that do long belong elsewhere.

Items

Added 3 months ago
I was sending an email when a little magic wand popped up that said "Polish" ...
Plain Vanilla (plainvanillaweb.com)
Added 3 months ago
An explainer for doing web development using only vanilla techniques.
Metaheuristics—the metaphor exposed (onlinelibrary.wiley.com)
Added 3 months ago
Kenneth Sörensen (2013) https://doi.org/10.1111/itor.12001
Kunlei Lian (kunlei.github.io)
Added 3 months ago
OR/ML Scientist
Added 3 months ago
The Deathbed Fallacy (hjorthjort.xyz)
Added 3 months ago
This topic has bothered me for years. So now, in a moment of inspiration instigated by Wait But Why1 and drinking a glass or two of bourbon, I want to hash i...
Task estimation: Conquering Hofstadter's Law (thesearesystems.substack.com)
Added 3 months ago
How to turn your time estimates into reliable predictions — and communicate them.
Darij Grinberg: Problem Solving (Math 235), Fall 2020
Software security is dire, which is a function both of the quality of the code and the sheer amount of it.
Added 3 months ago
Niklaus Wirth, 1995. Software's girth has surpassed its functionality because hardware makes this possible. https://doi.org/10.1109/2.348001

Discover more

Collection timeline

Created: April 28, 2025 Updated: August 16, 2025

Starred by
Similar collections

No similar collections were found.