Reading List

Find More Like

https://en.wikipedia.org/wiki/Elizabeth_Loftus#The_memory_wars

GPU Text Rendering

Design

Presentations

Theses

Reports

Papers

AI/CNN/ML PAPERS

Liskov’s “Must Read” For Computer Scientists (from here)

Dijkstra, E. W. (1968). Letters to the editor: go to statement considered harmful.Communications of the ACM, 11(3), 147-148.    
Wirth, N. (1971). Program development by stepwise refinement. Communications of the ACM, 14(4), 221-227.    
Parnas, D. L. (1971). Information distribution aspects of design methodology. 
Dahl, O. J., & Hoare, C. A. R. (1972). Chapter III: Hierarchical program structures (pp. 175-220). Academic Press Ltd..    
Morris Jr, J. H. (1973). Protection in programming languages. Communications of the ACM, 16(1), 15-21.   
Liskov, B., & Zilles, S. (1974, March). Programming with abstract data types. In ACM Sigplan Notices (Vol. 9, No. 4, pp. 50-59). ACM.    
Liskov, B. H. (1972, December). A design methodology for reliable software systems. In Proceedings of the December 5-7, 1972, fall joint computer conference, part I (pp. 191-199). ACM.    

Blog Posts

Books

Art

Business

Cooking

Cog Psy

Medical

Typography

  • http://practicaltypography.com/

Math

Descriptive Set Theory

Life of Godel (from U&I class)

Music

Autonomous Cars

Being a Professor

CS

Architecture

Systems

Theory

Graphics

https://www.jyotirmoy.net/posts/2015-12-29-springer-openaccess.html

Competitive Prog

  • https://cses.fi/book.pdf

Other People’s Reading Lists

Tutorials

other

Business

Courses

History

  • https://www.nytimes.com/2016/10/02/opinion/sunday/if-i-sleep-for-an-hour-30-people-will-die.html

Job

PM

  • https://hackernoon.com/acing-your-product-manager-interview-e4f163408cef

Compensation

  • http://fortune.com/2016/09/27/the-complete-guide-to-understanding-equity-compensation-at-tech-companies/

TODO

TO Read Eventually http://plindenbaum.blogspot.com/2012/11/visualizing-dependencies-of-makefile.html http://linux.die.net/lkmpg/x769.html [read write a proc file]

https://events.linuxfoundation.org/sites/events/files/slides/petazzoni-device-tree-dummies.pdf

https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2012/september/details-on-the-crime-attack/

http://googleprojectzero.blogspot.com/

http://wifi-insider.com/wlan/wmm.htm (wmm/802.11 primer)

https://fgiesen.wordpress.com/2014/07/07/cache-coherency/ (cpu cache coherency) and

Written on December 25, 2015