Blog Archives 2020 Jun 12 Understanding and Visualizing Covid Growth in the US Apr 08 Covid-19 Data Sources for Programmers 2018 Jan 17 iPhones, Armed Robbery, and Hacking Jan 11 Goto and the folly of dogma 2016 Jun 21 Grokbit 2014 Nov 24 Home Row Computing on Macs Nov 06 System Calls Make the World Go Round Oct 29 What does an idle CPU do? Oct 28 When Does Your OS Run? Oct 27 Closures, Objects, and the Fauna of the Heap May 23 Tail Calls, Optimization, and ES6 Apr 10 Recursion: dream within a dream Mar 19 Epilogues, Canaries, and Buffer Overflows Mar 10 Journey to the Stack, Part I 2009 Feb 11 Page Cache, the Affair Between Memory and Files Feb 04 The Thing King Feb 04 How The Kernel Manages Your Memory Jan 27 Anatomy of a Program in Memory Jan 15 Getting Physical With Memory Jan 12 Cache: a place for concealment and safekeeping Jan 06 Counting Infinity 2008 Dec 18 Performance is a Science Dec 15 Home Row Computing Dec 01 What Your Computer Does While You Wait Aug 28 First Recorded Usage of "Hacker" Aug 25 Richard Feynman's Modest Science Aug 20 CPU Rings, Privilege, and Protection Aug 12 Memory Translation and Segmentation Jul 14 Lucky to be a Programmer Jun 23 The Kernel Boot Process Jun 05 How Computers Boot Up Jun 04 Motherboard Chipsets and the Memory Map May 21 Of Aviation Crashes and Software Bugs Feb 20 Richard Feynman, the Challenger Disaster, and Software Engineering