Open in app

Sign In

Write

Sign In

Radu Zaharia
Radu Zaharia

307 Followers

Home

About

May 30

Away from trust-based application security: the operating system

We explored a bit previously what it would mean to have better overall security on a software system. We started by ranting about the current state of cybersecurity, a recent field that tries to invent security protocols to enhance the safety and privacy of software systems. Then we took the…

Operating Systems

6 min read

Away from trust-based application security: the operating system
Away from trust-based application security: the operating system
Operating Systems

6 min read


May 26

Let’s build an HTML5 music player using Web Components

I built a music player some time ago. I wanted a self-hosted web music player that would list my offline music collection and allowed me to play it on the different devices I have: phone, tablet, laptop and desktop. Of course, I could have used a ready-made solution like Plex…

Media Player

9 min read

Let’s build an HTML5 music player using Web Components
Let’s build an HTML5 music player using Web Components
Media Player

9 min read


May 9

What does privacy mean for artificial intelligence?

I guess such an article was bound to happen at some point on this blog. We talked a lot about artificial intelligence and the ways it can be implemented and designed, but until recently artificial intelligence was a technical topic, confined to a pre-determined problem, silently working on optimization in…

Privacy

7 min read

What does privacy mean for artificial intelligence?
What does privacy mean for artificial intelligence?
Privacy

7 min read


Apr 30

Safari and HTML5 Web Components

We talked a bit about web components in the past, together with a refresh on an initialization quirk that is often misinterpreted by developers and yields hours spent with misdirected debugging. But there is one more thing about HTML5 Web Components that will cause developers grief: the Safari browser. Specifically…

Web Components

5 min read

Safari and HTML5 Web Components
Safari and HTML5 Web Components
Web Components

5 min read


Apr 28

Proper HTML5 Web Component initialization

Here is a weird one I recently and painfully learned about. When writing HTML 5 web components, I would usually initialize it in the constructor: export class ArticleListItem extends HTMLLIElement { set data(newValue) { this.dataset.item = newValue.title; this.dataset.summary = newValue.summary…

Html5

4 min read

Proper HTML5 Web Component initialization
Proper HTML5 Web Component initialization
Html5

4 min read


Apr 14

MS-DOS applications: MemMaker

We will talk today about another forgotten MS-DOS application, available since MS-DOS 6.22: MemMaker. As the name suggests, it was an application that would fine-tune the MS-DOS configuration to allow more RAM to be available to running applications. That statement though will surely cause blank stares and shrugs for people…

Ms Dos

7 min read

MS-DOS applications: MemMaker
MS-DOS applications: MemMaker
Ms Dos

7 min read


Apr 11

Event based neural networks

Usually neural networks are treated like a set of mathematical operations, or a matrix of neuron weights. We receive an input and pass it through the whole network, layer by layer, ever adjusting it to create the final output. …

Artificial Intelligence

8 min read

Event based neural networks
Event based neural networks
Artificial Intelligence

8 min read


Apr 9

MS-DOS applications: XTreeGold

I wanted to take a break from security hallucinations and particle swarm optimization algorithms, so today I will try nostalgia. Specifically, another file manager for MS-DOS: XTreeGold. XTree has a fascinating history too, especially since it was the first competent file manager for MS-DOS ever built. …

Ms Dos

5 min read

MS-DOS applications: XTreeGold
MS-DOS applications: XTreeGold
Ms Dos

5 min read


Apr 2

Combining evolutionary algorithms with particle swarm optimization

We explored in the past two artificial intelligence algorithms that were both applying specific operators to a population of solutions: the genetic algorithm that was crossing parents and mutating children to improve the result, and the particle swarm optimization that was moving individuals ever closer to the required optimal. The…

Artificial Intelligence

6 min read

Combining evolutionary algorithms with particle swarm optimization
Combining evolutionary algorithms with particle swarm optimization
Artificial Intelligence

6 min read


Mar 17

Away from trust-based application security: the programming language

We started last time to talk about application security and we gave the usual reminder about the most common offender: inability to control, limit and audit project dependencies. But then we went further down the rabbit hole and talked about the insufficient transparency of the operating system on remote connections…

Application Security

10 min read

Away from trust-based application security: the programming language
Away from trust-based application security: the programming language
Application Security

10 min read

Radu Zaharia

Radu Zaharia

307 Followers

Still planning that trip to the Moon.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams