Saltzer & Schroeder’s The Protection of Information in Computer Systems
McCarthy Dijkstra etc.
RamPlan, a theory of types
Incipient intro to Linking and Loading
Affine Subscripts,
Dope Vectors
The Mind Meld Pattern
Unix Threads,
applied
Installing software: How to vs. What is
Short note on Invariants
A Pattern for explaining Contexts
Programs as graphs, or trees?
Augment and Hierarchies,
Nexus
Computer proofs about programs: Some Notes and a Rant.
An early program checking program
IBM’s Virtual Machine Software, VM/370
The security of IBM’s VM370
Some virtual offerings
Theory of Virtualization
A Bone Simple ISA;
Simple Now
The Java Muffin Saga
Java Locks
A trivial JNI demo
How to Document
Reliability Tradeoffs
Organizing Disaster
A RAID like idea
Floating Precision
Notes and proposals on JavaScript
A Question of Fluid Variables
Sloppy terminology, Pedantic or Clear?
Ruminations on backing store over radio link.
Unicode characters in web pages using utf-8
Apache on OS X
Vtables
Kernel Styles
Reference Counting vs. GC
A ‘Quine’ in C
Instances
Instantiation
Scraps
Licenses
Being vulnerable to what you read
Monads, sort of.
Dependent Compilation
Sorting as an Early and Modern(?) Software Paradigm
Parallel Processing
Rationale for Object Orientation
Redundant Formats
Installing Lion and Xcode 4
Early experience with Mavericks 10.9.4
Pixel Quest
Compiling a Functional Language (Lexical scope)
Persisting functions
Scope of Floating Modes
Throwing an Exception in Assembler
Miscellaneous bugs
Kernel Debug Plan
The Lambda Calculus as foundation of computing.
Apple iOS Security
Trusting Trust
Chrome browser security
See some notes on connections between
computer languages and capabilities.
On the basis of two security bug descriptions I record this link because I could actually understand the nature of the bugs.
This is very rare for security bug reports, even those designed for programmers.
Late 20th century notes on ‘Distributed Development’
External:
A really small executable
Software History
A promising computer course;
intro
Apple’a KeyNote lore
McCarthy’s Reminiscences on Timesharing
OS
My Firefox bug
On AI
Lamport’s writings
Dijkstra’s On the cruelty of really teaching computing science
Google Browser Security Handbook
Google’s Chrome Security Architecture
What could possiblt go wrong?
Great Hackers
Opaque systems?
(x)
Zalewski (tools & notes)
Technology of Regular Expressions
Mac OS 10 sandbox
Mac OS 10 rootless