‘end-to-end’ directory
- See Also
- Gwern
-
Links
- “100× Defect Tolerance: How Cerebras Solved the Yield Problem ”, Wang 2025
- “Laziness, Impatience, Hubris: The 3 Programmer Virtues ”, WikiWikiWeb 2025
- “How the Hourglass Won: Competition on the Information Superhighway ”, Davie 2024
- “The Long Shadow of Checks § Check Settlement in the Pre-Computer-Era ”, McKenzie 2023
- “The Forecast Trap ”, Boettiger 2022
- “Proper Value Equivalence ”, Grimm et al 2021
- “The Value Equivalence Principle for Model-Based Reinforcement Learning ”, Grimm et al 2020
- “Communication and Code Dependency Effects on Software Code Quality: An Empirical Analysis of Herbsleb Hypothesis ”, Majumder et al 2019
- “Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture ”, Zonenberg 2015
- “The Operating System: Should There Be One? ”, Kell 2013d
- “The Thermodynamics of Prediction ”, Still et al 2012
- “Observations on Errors, Corrections, & Trust of Dependent Systems ”, Hamilton 2012
- “STEPS Toward Expressive Programming Systems: "A Science Experiment" ”, Ohshima et al 2012 (page 2)
- “Playing to Win Overview ”, Sirlin 2006
- “Bow Ties, Metabolism and Disease ”, Csete & Doyle 2004
- “Crash-Only Software ”, Candea & Fox 2003
- “The British Navy Rules: Monitoring and Incompatible Incentives in the Age of Fighting Sail ”, Allen 2002
- “Exokernel: An Operating System Architecture for Application-Level Resource Management ”, Engler et al 1995
- “End-To-End Arguments In System Design ”, Saltzer et al 1984
- “Fixing the Internet for Real Time Applications: Part I ”
- “Fixing the Internet for Real Time Applications: Part II ”
- “Fixing the Internet for Real-Time Applications: Part III ”
- “Education of a Programmer. When I Left Microsoft in October 2016 ”, Crowley 2025
- “The Law of Leaky Abstractions ”
- “The Internet Was Designed With a Narrow Waist ”
- “My History With Forth & Stack Machines ”
- Sort By Magic
- Wikipedia
- Miscellaneous
- Bibliography
See Also
Gwern
“Why Do Hipsters Steal Stuff? ”, Gwern 2022
Links
“100× Defect Tolerance: How Cerebras Solved the Yield Problem ”, Wang 2025
100× Defect Tolerance: How Cerebras Solved the Yield Problem
“Laziness, Impatience, Hubris: The 3 Programmer Virtues ”, WikiWikiWeb 2025
“How the Hourglass Won: Competition on the Information Superhighway ”, Davie 2024
How the Hourglass Won: Competition on the Information Superhighway :
“The Long Shadow of Checks § Check Settlement in the Pre-Computer-Era ”, McKenzie 2023
The Long Shadow of Checks § check settlement in the pre-computer-era :
“The Forecast Trap ”, Boettiger 2022
“Proper Value Equivalence ”, Grimm et al 2021
“The Value Equivalence Principle for Model-Based Reinforcement Learning ”, Grimm et al 2020
The Value Equivalence Principle for Model-Based Reinforcement Learning
“Communication and Code Dependency Effects on Software Code Quality: An Empirical Analysis of Herbsleb Hypothesis ”, Majumder et al 2019
“Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture ”, Zonenberg 2015
Antikernel: A decentralized secure hardware-software operating system architecture
“The Operating System: Should There Be One? ”, Kell 2013d
“The Thermodynamics of Prediction ”, Still et al 2012
“Observations on Errors, Corrections, & Trust of Dependent Systems ”, Hamilton 2012
Observations on Errors, Corrections, & Trust of Dependent Systems
“STEPS Toward Expressive Programming Systems: "A Science Experiment" ”, Ohshima et al 2012 (page 2)
STEPS Toward Expressive Programming Systems: "A Science Experiment"
“Playing to Win Overview ”, Sirlin 2006
“Bow Ties, Metabolism and Disease ”, Csete & Doyle 2004
“Crash-Only Software ”, Candea & Fox 2003
“The British Navy Rules: Monitoring and Incompatible Incentives in the Age of Fighting Sail ”, Allen 2002
The British Navy Rules: Monitoring and Incompatible Incentives in the Age of Fighting Sail
“Exokernel: An Operating System Architecture for Application-Level Resource Management ”, Engler et al 1995
Exokernel: An Operating System Architecture for Application-Level Resource Management
“End-To-End Arguments In System Design ”, Saltzer et al 1984
“Fixing the Internet for Real Time Applications: Part I ”
“Fixing the Internet for Real Time Applications: Part II ”
“Fixing the Internet for Real-Time Applications: Part III ”
“Education of a Programmer. When I Left Microsoft in October 2016 ”, Crowley 2025
Education of a Programmer. When I left Microsoft in October 2016
“The Law of Leaky Abstractions ”
The Law of Leaky Abstractions :
View External Link:
https://www.joelonsoftware.com/2002/11/11/the-law-of-leaky-abstractions/
“The Internet Was Designed With a Narrow Waist ”
“My History With Forth & Stack Machines ”
Sort By Magic
Annotations sorted by machine learning into inferred 'tags'. This provides an alternative way to browse: instead of by date order, one can browse in topic order. The 'sorted' list has been automatically clustered into multiple sections & auto-labeled for easier browsing.
Beginning with the newest annotation, it uses the embedding of each annotation to attempt to create a list of nearest-neighbor annotations, creating a progression of topics. For more details, see the link.
thermodynamics-prediction software-dependency empirical-analysis gaming-strategy code-quality
value-equivalence
system-architecture research-systems application-level design-endpoints resource-management error-observations analysis
Wikipedia
Miscellaneous
Bibliography
-
https://arxiv.org/abs/2106.10316#deepmind
: “Proper Value Equivalence ”, -
https://arxiv.org/abs/2011.03506#deepmind
: “The Value Equivalence Principle for Model-Based Reinforcement Learning ”, -
2004-csete.pdf
: “Bow Ties, Metabolism and Disease ”, -
2002-allen.pdf
: “The British Navy Rules: Monitoring and Incompatible Incentives in the Age of Fighting Sail ”,