Skip to content
- Why I am voting for Elizabeth Warren
- Iron and cheese: how I used lactoferrin to treat iron overload (part 4)
- In case of authoritarian takeover, break glass
- Why climate change and the decline of democracy are happening at the same time
- Why you shouldn’t trust people who support sexual predators
- How to avoid supporting sexual predators
- Goth fashion tips for Ehlers-Danlos Syndrome
- Signs that you might be an advice columnist
- Iron and cheese: how I used lactoferrin to treat iron overload (part 3)
- Iron and cheese: how I used lactoferrin to treat iron overload (part 2)
- Iron and cheese: how I used lactoferrin to treat iron overload
- Choosing which consulting services to offer
- Repost: How calls for “civility” are harming tech companies
- Clarification of Double Union post
- What I learned writing my first non-fiction book
- Finding food allergies and sensitivities
- Double Union is dead, long live Double Union!
- Something is rotten in the Linux Foundation
- Living in a collapsing democracy
- Bryan Cantrill has been accused of verbal abuse by at least seven people
- Yesterday’s joke protest sign just became today’s reality
- In praise of the 30-hour work week
- Cross-post: Alcohol and Inclusivity: Planning Tech Events with Non-Alcoholic Options
- Advice for women in tech who are tired of talking about women in tech
- Getting free of toxic tech culture
- Repealing Obamacare will repeal my small business
- What white supremacists don’t want you to know: the Paradox of Tolerance
- The Al Capone theory of sexual harassment
- Miss Marple investigates Trump/Russia
- Preventing jet lag, one hour per day
- HOWTO make easy readable protest signs
- Yes, Trump does hate puppies
- Update on signs of fascism in the U.S.
- One way to resist Trump: become an Ally Skills Workshop teacher
- Fighting American fascism depends on understanding American anti-Black racism
- Why tech worker resistance is crucial to preventing large-scale human rights abuses in the U.S.
- Radical self-care for activists in the time of Trump
- A post-election guide to changing hearts and minds
- Spreadsheet of signs of fascism
- When is naming abuse itself abusive?
- Why I won’t be attending Systems We Love
- Crosspost: No more rock stars: how to stop abuse in tech communities
- HOWTO therapy: what psychotherapy is, how to find a therapist, and when to fire your therapist
- Between the spreadsheets: dating by the numbers
- How to eat paleo at Trader Joe’s (mostly)
- The Ada Initiative is ending, but our work continues on
- More ways to fight white supremacy
- Ban boring mike-based Q&A sessions and use index cards instead
- Donating $1,000 to fight white supremacy
- Greatest hits
- Starting your own feminist backchannel
- Operating systems war story: How feminism helped me solve one of file systems’ oldest conundrums
- Handy tips for my Internet harassers
- Here’s my favorite operating systems war story, what’s yours?
- I am much less disabled!
- Deleting Ada Lovelace from the history of computing
- Rebooting the Ada Lovelace Mythos
- Ball lightning: the coolest thing you’ve never heard of
- Suicide and society: Where does responsibility for preventing suicide lie?
- Lifetimes of cryptographic hash functions table updated
- Wednesday Geek Woman: Ada Lovelace, the world’s first computer programmer
- DEFCON: Why conference harassment matters
- I am disabled
- Example conference anti-harassment policy turns one year old
- Ada Lovelace Day: Sandra K. Johnson
- Ada Initiative seed funding round successful
- Updating “Lifetimes of cryptographic hash functions”
- Ada Initiative Seed 100 donation drive opens
- The Ada Initiative launches: promoting women in open technology and culture
- DARPA contracts vs. dreams
- Get your conference anti-harassment policy here!
- RFC: Draft conference anti-harassment policy
- Grand Canyon trip report
- Nuclear reactors washing up on beaches
- SHA-1 collision expected within a year
- Detecting fraud with math
- readdir() cookie requirements
- Relatime Recap
- Ada Lovelace Day: Pauline Middelink
- Name change
- First major public exploitation of a compare-by-hash based system
- FAST ’09
- HOWTO debug silent data corruption
- Keith Henson is a child molester
- Sex(ual harassment) in the City
- The code monkey’s guide to cryptographic hashes for content-based addressing