Tag: research

Ars answers my earlier question.

Tagged with: , , , , , ,
Posted in Business, Quick Posts, Technology
Short Link: http://jty.me/to6hpi

Essentially length of code tied with code metrics becomes a reasonable predictor of bugs.

Tagged with: , , , , , , ,
Posted in Programming, Quick Posts, Technology
Short Link: http://jty.me/npSfJi

Regardless of whether or not you agree with the idea of patents on genes, the fact that these patents are forcing patients to undergo a more expensive and less effective procedure should give anyone concern.

Tagged with: , , , , , , , ,
Posted in Business, Quick Posts, Science, Technology
Short Link: http://jty.me/quG4dM

It always astonishes how many people who use the computer every day for a large part of their daily lives know almost zero shortcuts.

Tagged with: , , , , ,
Posted in Quick Posts, Technology
Short Link: http://jty.me/oxJUA4

Perhaps the more interesting aspect is that most adoptions occur without a peer-to-peer influence or within one step of the original peer.

Tagged with: , , , , ,
Posted in Communication, Quick Posts, Science, Social Media
Short Link: http://jty.me/ovusSz

Even something as simple and low tech as bubble forms can’t be totally anonymous.

Tagged with: , , , ,
Posted in Quick Posts, Security
Short Link: http://www.yostivanich.com?p=3312

Impressive work.

Tagged with: , , ,
Posted in Quick Posts, Science, Technology
Short Link: http://jty.me/gx48AR

So has it, maybe, but it seems like the answer is leaning more towards no, as opposed to the yeses being heard in the media.

Tagged with: , , , , , , , ,
Posted in Quick Posts, Science
Short Link: http://jty.me/eufMEy

Something that I notice that non-scientists seem to make as an assumption about scientists is that it’s this static idea, ideas are rarely challenged and the big shots are always right and never assumed to be wrong.

Tagged with: , ,
Posted in Quick Posts, Science
Short Link: http://jty.me/i4ZQxQ

Oh silly companies, let’s attack security researchers for finding exploitable holes in our software/hardware.

Tagged with: , , , , , ,
Posted in Politics, Quick Posts, Security, Technology
Short Link: http://jty.me/eM8T0F