Category: hacks
Oct
03
**Warning:** The following assumes that you have a 2G iPhone, a Mac laptop or desktop and some familiarity with the command-line.
I just had perhaps the most painless iPhone OS upgrade from 3.0.1 to 3.1. (here is [the last installment on upgrading to… more »
Oct
02
***Note: this applies to Leopard (10.5), not Snow Leopard (10.6); SL apparently has its own [serious guest account problems](http://news.bbc.co.uk/2/hi/technology/8304229.stm). (Thanks, [Harlan](http://www.cs.princeton.edu/~harlanyu/))***
Today, a f… more »
Sep
10
Occasionally, if you use LaTeX, you might find that a BiBTeX style file (a `.bst` file) replaces the name of duplicate authors with a dash. For example:
> J. Doe. Anonymity. *Anonymity Times* 1(1) Nowhere, U.S.A., Jan. 2009.
> ?. Pseudonymity.… more »
Aug
12
Day 2 of [EVT/WOTE 2009][3] was on the highly mathematical side. The cryptographic papers and auditing papers were presented on Day 2. We started off with a superb tutorial by [Ben Adida] entitled "Voting Cryptography for Non-Cryptographers". Ben sta… more »
Aug
11
We had a wonderful first day at [EVT/WOTE 2009][2], yesterday. More than 80 of the best thinkers in voting technology are here mixing it up in Montreal. We have computer scientists, usability experts, legal experts, advocates and voting system vendors… more »