Not only older issues of the Numerical Recipes books, but also classics such as
Handbook Abramowitz and Stegun, Handbook of Mathematical Functions (10th corrected printing, 1972)
Bateman, Erdelyi et al. (Bateman Manuscript Project)
Higher Transcendental Functions (vols. 1, 2, and 3)
and
Encyclopaedia Britannica the great 11th Edition (1911)
PCG is a family of simple fast space-efficient statistically good algorithms for random number generation. Unlike many general-purpose RNGs, they are also hard to predict.
Interesting software, such as
unifdef selectively removes C preprocessor conditionals. My version of this program now shipped by all the BSDs (including Mac OS X) and is used by the Linux kernel build system.
regpg safely stores server secrets using gpg, so you can keep them in version control.
picoro - tiny coroutine implementations in pure C. I wrote an accompanying article, coroutines in 20 lines of standard C.
Counting the days - tiny routines for converting Gregorian dates into linear counts, like Julian day numbers or Unix time_t. The date of the count - a small routine for converting linear day counts into Gregorian dates. https://dotat.at/@/2016-04-22-synergy-vs-xmodmap-fight.html Why you can't use xmodmap to change how Synergy handles modifier keys https://dotat.at/@/2023-05-26-whence-time.html Where does my computer get the time from? https://dotat.at/@/2023-08-04-unix69.html a neat keyboard map https://dotat.at/@/2024-01-29-four-point-egg.html construct an egg shape with straightedge and compass
His log of links, https://dotat.at/:/ which I found on the TUHS mailing list is also worth reading. He explains a bit about this log on http://dotat.at/.
Joe Marshall's non-lisp blog. Lisp/Scheme are the subject of his other blog,
Abstract Heresies, Unorthodox opinions on computer science and programming. http://funcall.blogspot.com/
https://www.johndcook.com/blog/2022/10/21/math-origins/ explains V.I. Arnolds comment
"All mathematics is divided into three parts: cryptography (paid for by CIA, KGB and the like), hydrodynamics (supported by manufacturers of atomic submarines), and celestial mechanics (financed by military and other institutions dealing with missiles, such as NASA)."
The article https://www.johndcook.com/non_central_chi_square.pdf sounds interesting:
John D. Cook Upper bounds on non-central chi-squared tails and truncated normal moments (2010). UT MD Anderson Cancer Center Department of Biostatistics Working Paper Series. Working Paper 62.
Abstract. We show that moments of the truncated normal distribution provide upper bounds on the tails of the non-central chi-squared distribution, then develop upper bounds for the former.
A reading protocol is a set of strategies that a reader must use in order to benefit fully from reading the text. Poetry calls for a different set of strategies than fiction, and fiction a different set than non-fiction. It would be ridiculous to read fiction and ask oneself what is the author's source for the assertion that the hero is blond and tanned; it would be wrong to read non-fiction and not ask such a question. This reading protocol extends to a viewing or listening protocol in art and music. Indeed, much of the introductory course material in literature, music and art is spent teaching these protocols.
Mathematics has a reading protocol all its own, and just as we learn to read literature, we should learn to read mathematics. Students need to learn how to read mathematics, in the same way they learn how to read a novel or a poem, listen to music, or view a painting. Ed Rothstein’s book, Emblems of Mind, a fascinating book emphasizing the relationship between mathematics and music, touches implicitly on the reading protocols for mathematics.