As I was listening to Anil talk about daemons spawning processes and sysadmins killing them, I thought, "What a great user interface!" Imagine running around with a shotgun blowing away your daemons and processes, never needing to type kill -9 again.
Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for inte...
A Cocoa based wrapper for the OCaml toplevel environment. It was written to solve a number of the problems one usually runs into while running the toplevel under OS X's terminal.