About:

The metadata provided does not contain a summary about the author. Additional information from the website content would be needed to provide a summary.

Website:

Specializations:

Outgoing Links:

Gwern Branwen
Subscribe to RSS:
The post explores Functional Programming through simplicity dimensions, categorizing its characteristics and examining their implications for software engineering paradigms.
The blog post analyzes HOTP-based one-time passwords and their relationship with zero-knowledge proofs. It explains the characteristics of zero-knowledge proofs, including completeness, soundness, and proof of knowledge, while eva...
An extension to prefixed-compact encoding introduces a header-checksum-byte to enhance header integrity verification and early error detection.
A dialogue with AI Grok refines the definition of simplicity, exploring its structural dimensions and the implications of emergent behavior in complex systems.
A personal account of harassment at ASML, where false phishing claims are used as a pretext for retaliation and abuse, revealing deeper issues of social engineering.
The post discusses the challenges and issues faced by a team at ASML due to near-shoring practices, including productivity hacks, tax-related restrictions, and the impact of remote work on team dynamics. It highlights the difficul...
The article explores the distinctions between design and architecture, emphasizing the importance of understanding their boundaries. It defines design as inward-looking, focusing on specific solutions, while architecture is outwar...
The post discusses the concept of 'not taking things personal' in the context of feedback and criticism, emphasizing the importance of distinguishing between personal attacks and objective discussions. It argues against the misuse...
The author recounts their experience of prolonged harassment and false accusations, highlighting the struggle to discern truth amidst a campaign of abuse.
A practical guide to essential OpenSSL commands for generating certificates and cryptographic keys, aimed at simplifying SecureBoot-related tasks.
The author redacts licensing details at ASML's request, highlighting the need for transparency while addressing ongoing harassment and maintaining the integrity of the narrative.
The blog post discusses mental health strategies for individuals in toxic or abusive situations, emphasizing the importance of normalizing expectations of reasonable behavior. It includes various quotes and memes that provide wisd...
The text discusses various incidents of harassment and mistreatment experienced by the author at ASML, including interruptions and problems with Microsoft Teams, complaints by remote Romanian team members, and the use of AGPL-lice...
The text describes the author's experience of switching teams to join a high-priority project, the challenges faced, and the collaboration with other teams. It also discusses the author's efforts to get the team along and the pres...
The text discusses the author's experience with harassment and abuse at ASML, particularly related to the licensing mechanism used by the company. The author highlights problems and criticism related to the licensing mechanism, as...
The text discusses the abusive practices and circumvention of normal processes within the UX competence at ASML. It describes the experiences of the author in different teams and the challenges faced due to the behavior of the UX ...
The text discusses the author's experience of being harassed at ASML, particularly by a product owner who relentlessly pushes for new features. The author describes various incidents and interactions with colleagues and superiors,...
The text discusses the organization of 'Knowledge Sharing Sessions' at ASML, which were initially successful but faced challenges due to opportunistic behavior and eventually died out due to departmental changes and increased work...
The text discusses the author's experience with CDI (Contexts and Dependency Injection) at ASML, the limitations and complications of CDI, improvement working-groups, consequences of CDI, and different strategies. The author also ...
The text discusses the author's experience with obfuscation and Proguard at ASML, highlighting the challenges faced, the efforts made to fix the issues, and the impact on the development teams. It also touches on the importance of...
The text discusses the author's experience with a group lead who composed a problematic team against the advice of senior employees. The team was composed of Romanian developers and the author faced issues with lack of support, ha...
The article discusses the role of the STI department in application integration and release management, highlighting the challenges and complications that arise from their involvement. It also touches upon the impact of STI on the...
The text discusses the manual builds and continuous integration process at ASML, including early releases, trouble running a release-build, automated build infrastructure, build verification, and guards. It also mentions the chall...
The text discusses the conflicts and harassment faced by the author in the role of a team architect at ASML. It highlights the lack of clarity in the role, conflicts with other team members, and unjustified attacks faced by the au...