klittlepage / til

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Today I learned

2019

January

01

There's a variety of tricks for fast modulo reduction when the modulus is a Mersenne prime. Two approaches are here, and a third one leveraging SIMD instructions is here.

02

Simple topological counting rules can predict the mechanical stability of knots.

Wombat feces are cube shaped.

Eschatology is the word for the part of theology concerned with the final events of history.

Platypodes are not the only venomous mammal.

03

There's a rich history to a (now) well know approach to 2.5D rendering called voxel space. Sebastian Macke describes the history well.

The canonical book on missing data/data bias in general got an update in 2019: Statistical Analysis with Missing Data.

04

Australia is deploying the military to fight the 2019-2020 bushfire season.

05

Deterministic databases guarantee that given a defined set of input requests only one final state is possible. This is a stronger guarantee than serializability that makes replication trivial.

06

Orthodromic distance is the shortest distance between two points on the surface of a sphere.

07

The first chosen-prefix collision for SHA-1 came out today.

08

Google's library for GIS has a cool illustration of how a single space-filling curve covers the globe.

09

The Rete algorithm allows for fast pattern matching when implementing rule-based systems.

10

There's a fascinating mind map of symmetries in physics.

11

The generalization of real numbers, complex numbers, and quaternions, is a Clifford algebra.

12

The Trivers–Willard hypothesis suggests that female mammals are able to adjust offspring sex ratio in response to their maternal condition.

13

The tool used for generating The Rust Book is mdbook.

14

The Grossman-Stiglitz paradox refers to the observation that "if markets are efficient -- if market prices accurately reflect all the information in the world -- then there's no incentive for anyone to invest any time or money or effort into finding more information."

15

A critical security vulnerability in Windows allowed for spoofing of ECC certificates. The underlying cause had nothing to do with the cryptographic primitives themselves but highlighted an interesting property of ECC - constructing a private key $K'$ that matches the public key of another private key $K$ is trivial if you have control over the curve parameters.

16

The US struggled greatly with torpedo technology during WWII.

17

The syscall/sysret instructions found in x86-64 are 10x faster than software interrupts.

18

LISP had a wild ride at JPL.

About