Sublime
An inspiration engine for ideas
rôle décisif au cours de la seconde guerre mondiale dans le décryptage des codes d’Enigma, la machine à écrire sophistiquée qui servait aux Nazis pour encoder et déchiffrer les commandements militaires et autres messages
Nicholas Carr • Internet rend-il bête ? (French Edition)
Firth had just begun to study programming, but the error was “just obvious” to him. Remembering this incident years later, Firth said that the engineer had probably been “programming by rote. He wanted to make his program look like programs he’d seen before, and that clearly wasn’t gonna work.” Firth always tried to avoid such an approach. “I like
... See moreTracy Kidder • The Soul of A New Machine
When technological conditions raised the returns to violence, they doomed societies that were not organized to channel large resources into making war.
James Dale Davidson, Lord William Rees-Mogg • The Sovereign Individual: Mastering the Transition to the Information Age
GIVEN THE GREAT diversity
Steve Brusatte • The Rise and Reign of the Mammals: A New History, from the Shadow of the Dinosaurs to Us
much better bug-munchers
Steve Brusatte • The Rise and Reign of the Mammals: A New History, from the Shadow of the Dinosaurs to Us
In the high-stakes competition between weapons and counterweapons, the weak link was not the supply of new ideas. It was the transfer of those ideas to the field.
Safi Bahcall • Loonshots: How to Nurture the Crazy Ideas That Win Wars, Cure Diseases, and Transform Industries
the formula number for the resulting version of the formula is none other than . . .
Stephen Budiansky • Journey to the Edge of Reason: The Life of Kurt Gödel
Unsurprisingly, the Human Genome Project also exhibited a bubble dynamic, driven as it was by an ambitious vision and characterized by excessive government overinvestment.
Byrne Hobart • Boom: Bubbles and the End of Stagnation
The megapolitical logic of cyberspace suggests that central command-and-control systems that currently dominate the world’s large-scale infrastructure will have to be replaced by multicentric models of security with distributed capabilities so they cannot be easily captured or blocked by a computer virus.