Sublime
An inspiration engine for ideas

The sophistication in advanced analytics is in the algorithms and methods applied to the data, not in the structure of the data itself. Such
Bill Franks • Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics (Wiley and SAS Business Series)
Workflow Modeling: Tools for Process Improvement and Application Development, Second Edition
amazon.com
Design Vulnerability Implementation Vulnerability Configuration Vulnerability
Douglas Jacobson • Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
“singular value decomposition,” an algorithmic strategy grouping together movies that shared specific qualities, like romances or comedies.
Kyle Chayka • Filterworld
Are Blockchains Decentralized? Unintended Centralities in Distributed Ledgers
The report investigates the true decentralization of blockchains, highlighting various forms of centralization, vulnerabilities in consensus protocols, and the implications for security and immutability in networks like Bitcoin and Ethereum.
blog.trailofbits.comScrolling social media makes it harder to read books because it trains your brain to discard previous context in order to understand the next thing, whereas understanding the next thing in a book requires retaining previous context.
Dan Allisonx.com