Sources & Bibliography
References, deep dives, and further reading for Vol 1: Foundations of the Digital World.
About Link Rot
Link rot is the phenomenon where hyperlinks break or disappear over time.
To mitigate this, the following steps have been taken:
- Every source includes an “Accessed” date indicating when the author last verified the link.
- Whenever technically possible, an “Archive” link (hosted by the Wayback Machine) is provided. Note that some modern websites block archival bots.
00
2 sources
- Hansard (UK Parliament) 1955 Accessed: 2025-12-14
Report of the Court of Inquiry into the Accidents to Comet G-ALYP and Comet G-ALYY.
- Wikipedia Accessed: 2025-12-14
2 sources
- Military.com 2022 Accessed: 2025-12-14
- Improbable Research 2006 Accessed: 2025-12-14
2 sources
- FAA Advisory Circular 21-16G 2011 Accessed: 2025-12-14
- Duncan Aviation 2023 Accessed: 2025-12-14
3 sources
- Proclipse Consulting 2023 Accessed: 2025-12-14
- Emergn.com 2021 Accessed: 2025-12-14
- Online PM Courses - Mike Clayton 2022 Accessed: 2025-12-14
1 sources
- Harvard Business Review Gary Klein 2007 Accessed: 2025-12-14
1 sources
- Incose.org Accessed: 2025-12-14
2 sources
- Google SRE Book John Lunney and Sue Lueder Accessed: 2025-12-14
I strongly recommend entire Google SRE Book to anyone interested in reliability engineering in general.
- Atlassian Blog Accessed: 2025-12-14
01
3 sources
- NASA John Uri 2022 Accessed: 2025-12-14
- Smithsonian Magazine Billy Goodman Accessed: 2025-12-14
- Mental Floss Chris Higgins 2023 Accessed: 2025-12-14
4 sources
- ESA 1996 Accessed: 2025-12-14
Official press release summarizing the failure.
- University of Minnesota Prof. J. L. Lions 1996 Accessed: 2025-12-14
Full text of the Inquiry Board Report.
Hosted by University of Minnesota.
- D-RisQ Accessed: 2025-12-14
- INRIA Jean-Jacques Lévy Accessed: 2025-12-14
A detailed technical presentation (in French) on the Ariane 5 failure.
4 sources
- Lynchburg College (Archive) Dr. Thomas Nicely 2011 Accessed: 2025-12-14
Dr. Nicely was the mathematician who discovered the bug.
- Intel (via Ardent Tool) H. P. Sharangpani & M. L. Barton, Ph.D. 1994 Accessed: 2025-12-14
The original 'Official' White Paper released by Intel to explain error rates.
- New York Times John Markoff 1994 Accessed: 2025-12-14
The article that broke the story to the general public.
- Righto.com Ken Shirriff 2024 Accessed: 2025-12-14
Modern technical retrospective with die photos.
2 sources
- Journal of Economic Literature Kevin Quinn Accessed: 2025-12-14
See Reference #25 in the PDF for the original WSJ citation.
Reproduces the graph of the index drop.
- Ever Had Problems Rounding Off Figures? This Stock Exchange HasThe Wall Street Journal 1983
Date: November 8, 1983. Page: 37.
Original article is not available online without a paid subscription (ProQuest ID: 1983-11-08).
2 sources
- IEEE Xplore 2019 Accessed: 2025-12-14
The official standard defining how computers handle real numbers.
- Oracle / Sun Microsystems 1991 Accessed: 2025-12-14
The 'Bible' of FP math. Essential reading.
2 sources
- MITRE CWE 2006 Accessed: 2025-12-14
Formal definition of the weakness that destroyed Ariane 5.
- Ada-lang.io Accessed: 2025-12-14
Explains the mechanics of Constraint_Error on overflow in Ada.
Ada was the language used in Ariane 5's software.
2 sources
- Oracle Docs 1991 Accessed: 2025-12-14
Specifically explains the bias introduced by truncation (as seen in the Vancouver Stock Exchange case).
- University of Alberta Accessed: 2025-12-14
02
2 sources
- U.S. Senate Special Committee Accessed: 2025-12-14
Official US government report summarizing costs, preparations, and actual impact.
- IEEE Xplore P. Ainsworth Accessed: 2025-12-14
4 sources
- FDA Accessed: 2025-12-14
Legal basis for software validation (including date/time).
- InfoWorld Paul Krill Accessed: 2025-12-14
- G-Loaded Journal Accessed: 2025-12-14
Analysis of the Regex failure that flagged legitimate emails as spam.
- eWeek Accessed: 2025-12-14
Confirms the 'Eraser' engine update bug.
1 sources
- The Guardian Kate Connolly Accessed: 2025-12-14
Affected 30 million cards. The chip software couldn't handle the year 2010 (hex 0x10).
2 sources
- PlayStation Blog Patrick Seybold, Sr. Director, Corporate Communications & Social Media 2010 Accessed: 2025-12-14
Sony's official admission of the clock bug (Error 8001050F).
- The Guardian Keith Stuart Accessed: 2025-12-14
3 sources
- CBS New York Accessed: 2025-12-14
Meters had a 'hard end date' set to January 1, 2020.
- Wccftech Nathan Birch Accessed: 2025-12-14
- Sekurak.pl Accessed: 2025-12-14
Date bug caused fiscal printers in Poland to stop working.
2 sources
- Bit Player Brian Hayes Accessed: 2025-12-14
Definitive analysis of the infinite loop driver bug on leap year day 366.
- Leancrew Dr. Drang Accessed: 2025-12-14
Explanation of the issue in more digestible form
2 sources
- LWN.net Jonathan Corbet Accessed: 2025-12-14
Technical analysis of the futex livelock in the kernel.
- Wired Cade Metz Accessed: 2025-12-14
2 sources
- Swinburne University (COSMOS) Accessed: 2025-12-14
Explicitly compares Sidereal (~365.256) vs. Tropical (~365.242), validating the '20-minute difference' footnote.
- The Durango Herald Charles Hakes Fort Lewis College Accessed: 2025-12-14
2 sources
- Legislation.gov.uk Accessed: 2025-12-14
The primary legislation for the 11-day shift in UK/US.
- TimeAndDate Konstantin Bikos ^ Aparna Kher Accessed: 2025-12-14
2 sources
- NASA GISS Accessed: 2025-12-14
Validates the Martian Sol duration (24h 39m 35.244s).
- Marsti.me Accessed: 2025-12-14
Interactive Mars clock and date converter.
1 sources
- BIPM Accessed: 2025-12-16
The official decision to stop adjusting UTC with leap seconds by 2035.
1 sources
- The Open Group Accessed: 2025-12-14
Defines time_t and the Epoch.
3 sources
- Python.org Patrick Maupin Accessed: 2025-12-14
Explains the syntax change from 010 to 0o10 in Python.
- Princeton University Accessed: 2025-12-14
- Computer Organization and DesignArchive.org David A. Patterson & John L. Hennessy Accessed: 2025-12-14
Full book hosted by Archive.org covering number systems in Chapter 2.
03
2 sources
- Chromium.org Accessed: 2025-12-14
Quote: 'The Chromium project finds that around 70% of our serious security bugs are memory safety problems.'
- Google The Keyword Blog Mark Chang 2022 Accessed: 2025-12-14
Official announcement of Memory Saver Mode.
3 sources
- Wikipedia / Microsoft Support Archive Accessed: 2025-12-14
Original Microsoft KB articles are offline. This confirms the two blocks of 64KB memory regions for GDI and heap resources.
- AppTools Accessed: 2025-12-14
- IBM Support 2019 Accessed: 2025-12-14
3 sources
- MeltdownAttack.com Accessed: 2025-12-14
Central hub for all Meltdown and Spectre information.
- Google Project Zero Blog Jann Horn 2018 Accessed: 2025-12-14
The original disclosure.
- Intel.com 2025 Accessed: 2025-12-14
Details the L1/L2/L3 hierarchy, proving this memory is distinct, hardware-managed, and invisible to the OS.
3 sources
- Carnegie Mellon University Yoongu Kim et al. (CMU) 2014 Accessed: 2025-11-28
The original paper describing the discovery.
- ACM Digital Library Yoongu Kim et al. (CMU) 2014 Accessed: 2025-12-16
At the time of compiling this source list, original CMU link (above) was offline, so this is an alternative link.
ACM Digital Library is blocking access for WaybackMachine, so use archive link for the CMU resource instead.
- Google Project Zero Blog Mark Seaborn & Thomas Dullien 2015 Accessed: 2025-12-14
Official exploit demonstration.
2 sources
- MITRE CWE 2006 Accessed: 2025-12-14
The formal definition of a memory leak.
- Kitt Digital 2023 Accessed: 2025-12-14
04
3 sources
- Cornell University Glenn Reeves (Pathfinder Software Team Lead) 1997 Accessed: 2025-12-14
Primary engineer account confirming the priority inversion mechanism.
- Rapita Systems 2013 Accessed: 2025-12-14
Detailed breakdown of the VxWorks scheduler issue.
- Chalmers University Risat Mahmut Pathan Accessed: 2025-12-14
Spider-Man: No Way Home (2021) Ticket Frenzy
No specific report due to distributed nature of the failure. Sources confirm the incident happening and discuss the technical causes.
4 sources
Spider-Man: No Way Home (2021) Ticket Frenzy
No specific report due to distributed nature of the failure. Sources confirm the incident happening and discuss the technical causes.
- Quartz Adario Strange 2022 Accessed: 2025-12-14
Confirms the crash, the 86,000 NFT number, and the speculator-driven load.
- Carbonteq Ali Ahmad 2024 Accessed: 2025-12-14
Explains the thundering herd problem underlying the failure.
- Percona Nickolay Ihalainen 2018 Accessed: 2025-12-14
Describes how database row-level locks can lead to contention under high concurrency.
- Medium (Nurture Farm) Harsh Tiku, Technical Lead at nurture.farm 2024 Accessed: 2025-12-14
Discusses strategies to handle high concurrency and inventory management during flash sales.
2 sources
- Jamf Blog Jaron Bradley 2021 Accessed: 2025-12-14
Detailed analysis of the race condition vulnerability.
- Apple Support Accessed: 2025-12-14
Confirms the patch for CVE-2021-30713.
2 sources
- Gemini Cryptopedia 2025 Accessed: 2025-12-14
Covers the reentrancy vulnerability and the timeline.
- QuickNode 2025 Accessed: 2025-12-14
Technical deep dive into the recursive withdrawal pattern.
1 sources
- Columbia University (Mirror) Nancy Leveson & Clark Turner 1993 Accessed: 2025-12-14
The definitive academic paper on the software race condition and removed hardware interlocks.
2 sources
- Safety Research & Strategies 2013 Accessed: 2025-12-14
Summarizes the Barr Group's findings on the 11,000 global variables and stack overflow.
- Slashdot Accessed: 2025-12-14
1 sources
- Operating System ConceptsAbraham Silberschatz, Peter B. Galvin, Greg Gagne
Standard textbook definition of Process Control Blocks (PCB) and Context Switching overhead.
2 sources
- MITRE CWE 2006 Accessed: 2025-12-14
Formal definition of the 'Check-Then-Act' flaw.
- Imperva Accessed: 2025-12-14
Accessible industry explanation.
05
3 sources
- Department of Transportation (OIG) 2005 Accessed: 2025-12-14
Confirms the 'monthly transaction limit' in the crew scheduling system caused the shutdown.
- Toledo Blade 2004 Accessed: 2025-12-14
- Datamation Jim Wagner 2004 Accessed: 2025-12-14
3 sources
- The Register Chris Williams 2021 Accessed: 2025-12-14
Detailed breakdown of the unsigned 32-bit integer limit and the scale factor.
- Slashdot Accessed: 2025-12-14
- Nasdaq Accessed: 2025-12-14
Included for context; the Class A glitch caused the suspension, leading people to trade Class B.
4 sources
- FBI Accessed: 2025-12-14
- Purdue University Eugene H. Spafford Accessed: 2025-12-16
The definitive technical paper dissecting the code and the 1-in-7 reinfection mechanism.
At the time of compiling this source list, original PU link was offline, so the live link points to ResearchGate version, while the archive link points to CMU-hosted PDF.
- Wikipedia Accessed: 2025-12-14
- YouTube Computerphile 2020 Accessed: 2025-12-14
3 sources
- CAIDA David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver 2003 Accessed: 2025-12-14
Confirms the 376-byte size and the 10-minute saturation speed.
- SecLists (CERT Archive) 2003 Accessed: 2025-12-14
- WeLiveSecurity 2016 Accessed: 2025-12-14
4 sources
- The Risks Digest Don H Kemp 1990 Accessed: 2025-12-14
- The Risks Digest Peter G. Neumann 1990 Accessed: 2025-12-14
Root cause analysis.
- MIT / Bruce Sterling Accessed: 2025-12-14
- YouTube Dave's Garage 2024 Accessed: 2025-12-14
3 sources
- Stack Overflow Outage PostmortemStackStatus Accessed: 2025-12-14
Official analysis of the Catastrophic Backtracking regex.
- ADTMag David Ramel 2016 Accessed: 2025-12-14
- Mamchenkov.net Leonid Mamchenkov 2016 Accessed: 2025-12-14
1 sources
- Clever Learning Accessed: 2025-12-14
3 sources
- Mathematical Association of America (MAA) Teo Paoletti 2011 Accessed: 2025-12-14
- Wikipedia Accessed: 2025-12-14
- YouTube Explained By Cats 2024 Accessed: 2025-12-14
Alternative explanation of factorial growth using card shuffling in very imaginative way.
06
3 sources
- Cloudflare Blog Tom Strickx 2019 Accessed: 2025-12-14
- ThousandEyes Alex Henthorn-Iwane 2019 Accessed: 2025-12-14
- PacktPub Savia Lobo 2019 Accessed: 2025-12-14
4 sources
- Facebook Engineering Santosh Janardhan 2021 Accessed: 2025-12-14
- Wikipedia Accessed: 2025-12-14
- Cloudflare Celso Martinho & Tom Strickx 2021 Accessed: 2025-12-14
- NBC News David K. Li, Olivia Solon, and Kevin Collier 2021 Accessed: 2025-12-14
3 sources
- CBC News Peter Zimonjic 2024 Accessed: 2025-12-14
- City of Toronto Accessed: 2025-12-14
- Cloudflare João Tomé, Tom Strickx, and Mingwei Zhang 2022 Accessed: 2025-12-14
3 sources
- IETF 2006 Accessed: 2025-12-14
The current 'constitution' of BGP.
- IETF 2006 Accessed: 2025-12-14
Outlines trust issues and inherent vulnerabilities (like route leaks).
- IANA Accessed: 2025-12-14
The official 'phone book' of ASNs.
4 sources
- MIT OpenCourseWare Hari Balakrishnan 2009 Accessed: 2025-12-14
Breakdown of BGP's design philosophy and scalability vs. policy tension.
- Flavio Luciani, Antonio Prado, and Tiziano Tofoni Accessed: 2025-12-14
- Cloudflare Learning Accessed: 2025-12-14
Uses accessible analogies like the 'postal service' metaphor.
- KTH Royal Institute of Technology Olof Hagsand 2009 Accessed: 2025-12-14
Visualizes the hierarchy of Tier 1, 2, and 3 providers.
07
3 sources
- ThousandEyes Nick Kephart 2016 Accessed: 2025-12-14
Definitive breakdown of the attack phases and the 'TCP SYN flood' mechanism.
- The Guardian 2016 Accessed: 2025-12-14
- Help Net Security Zeljka Zorz 2016 Accessed: 2025-12-14
2 sources
- IANIX Accessed: 2025-12-14
Caused by the 'missing dot' script error.
- The Register John Oates 2009 Accessed: 2025-12-14
3 sources
- Slack Engineering Rafael Elvira & Laura Nolan 2021 Accessed: 2025-12-14
Official Post-Mortem detailing the DNSSEC Rollout and DS record failure.
- Catchpoint Karthik Suresh 2021 Accessed: 2025-12-14
- Geoff Huston 2021 Accessed: 2025-12-14
2 sources
- Internet Society Dan York 2012 Accessed: 2025-12-14
Explains how Comcast's strict validation correctly blocked NASA's broken keys.
- NASA Watch Keith Cowing 2012 Accessed: 2025-12-14
Context on user confusion regarding SOPA/PIPA at the time.
2 sources
- CBC News Pete Evans 2021 Accessed: 2025-12-14
Confirmed as a bug in 'Edge DNS' service, not an attack.
- AppleInsider Wesley Hilliard 2021 Accessed: 2025-12-14
2 sources
- IETF 1987 Accessed: 2025-12-14
- Shoppe Black / Bloomberg Tony O. Lawson Accessed: 2025-12-14
Illustrates the economic value of TLDs (~20% of Anguilla's government revenue).
1 sources
- IETF 2005 Accessed: 2025-12-14
08
3 sources
- Cloudflare Blog John Graham-Cumming 2017 Accessed: 2025-12-14
- Wired Lily Hay Newman 2017 Accessed: 2025-12-14
- Hacker News Accessed: 2025-12-14
3 sources
- University of Michigan / Inria Accessed: 2025-12-14
Original research website detailing the Factoring RSA Export Keys vulnerability.
- Washington Post 2015 Accessed: 2025-12-14
- Forbes Thomas Brewster 2015 Accessed: 2025-12-14
3 sources
- Operation Black Tulip (Official Audit)Fox-IT 2011 Accessed: 2025-12-14
The definitive forensic report on the compromise.
- The Guardian Charles Arthur 2011 Accessed: 2025-12-14
- Wired Kim Zetter 2011 Accessed: 2025-12-14
3 sources
- Google Security Blog Devon O’Brien, Ryan Sleevi, and Andrew Whalley 2017 Accessed: 2025-12-14
- Ars Technica Dan Goodin 2017 Accessed: 2025-12-14
- ZDNet Chris Duckett 2017 Accessed: 2025-12-14
3 sources
- Sectigo Knowledge Base 2020 Accessed: 2025-12-14
- The Register Thomas Claburn 2020 Accessed: 2025-12-14
- UC Berkeley 2020 Accessed: 2025-12-14
2 sources
- IETF 1999 Accessed: 2025-12-14
- Wikipedia Accessed: 2025-12-14
2 sources
- NIST Kerry McKay ^ David Cooper 2019 Accessed: 2025-12-14
- IETF 2008 Accessed: 2025-12-14
09
3 sources
- Cloudflare Blog John Graham-Cumming 2019 Accessed: 2025-12-14
The famous 'CPU exhaustion caused by a single regex' incident.
- Rosie Pattern Language 2019 Accessed: 2025-12-14
- YouTube ThePrimeagen 2024 Accessed: 2025-12-14
2 sources
- Slack Engineering Laura Nolan 2021 Accessed: 2025-12-14
Detailed engineering breakdown of the scaling issues.
- ZDNET Larry Dignan 2021 Accessed: 2025-12-14
2 sources
- Roblox Blog Daniel Sturman in collaboration with Scott Delap, Max Ross, & many others from Roblox and HashiCorp 2022 Accessed: 2025-12-14
Deep dive into the Consul consensus failure that took down the platform for days.
- Pingdom 2022 Accessed: 2025-12-14
3 sources
- Google Cloud Blog Benjamin Treynor Sloss 2019 Accessed: 2025-12-14
- YouTube (More than Certified) More than Certified 2024 Accessed: 2025-12-14
- Google Cloud Status 2020 Accessed: 2025-12-14
Azure Front Door (October 29, 2025)
Azure status page is rollingly updated and no hard link to specific report is available. As of preparing it's still visible but will dissapear over time
2 sources
Azure Front Door (October 29, 2025)
Azure status page is rollingly updated and no hard link to specific report is available. As of preparing it's still visible but will dissapear over time
- Medium Tahir Balarabe 2025 Accessed: 2025-12-14
Medium article summarizing the incident containing screenshot of Azure Status page.
- YouTube Microsoft Reactor 2025 Accessed: 2025-12-14
Video retrospective of the incident by Microsoft Reactor team.
3 sources
- 1994 Accessed: 2025-12-14
The official standard defining the 7-layer model.
- AWS Documentation Accessed: 2025-12-14
7 sources
- Cloudflare Learning Accessed: 2025-12-14
Accessible (Pop-Sci) introduction.
- ResearchGate Marc Leshner, Michelle Devine, Gregory W Roloff, and Lawrence D True 2015 Accessed: 2025-12-14
Academic/theoretical perspective.
- IBM Documentation 2021 Accessed: 2025-12-14
Technically Link Aggregation/Bonding, acting like a 'Switch with Ambition'.
- Juniper Networks 2024 Accessed: 2025-12-14
Documentation on Equal-Cost Multi-Path routing ('Routing Roulette').
- HAProxy Blog Baptiste Assmann 2011 Accessed: 2025-12-14
Comparison of 'The Bouncer' (L4) and 'The Receptionist' (L7).
- NGINX Glossary Accessed: 2025-12-14
- YouTube Cloudflare 2020 Accessed: 2025-12-14
Practical demo of a modern L7 load balancer with health checks and geo-routing.
10
3 sources
- AWS Post-Event Summaries 2017 Accessed: 2025-12-14
- The Verge Casey Newton 2017 Accessed: 2025-12-14
- Ars Technica Jon Brodkin 2017 Accessed: 2025-12-14
3 sources
- AWS Post-Event Summaries 2025 Accessed: 2025-12-14
The 'Race Condition' incident.
- ThousandEyes 2025 Accessed: 2025-12-14
- Ismail Kovvuru 2025 Accessed: 2025-12-14
3 sources
- Fastly Engineering Blog Nick Rockwell 2021 Accessed: 2025-12-14
- BBC News Jane Wakefield 2021 Accessed: 2025-12-14
- The Guardian Alex Hern 2021 Accessed: 2025-12-14
3 sources
- Google Cloud Status 2020 Accessed: 2025-12-14
- TechCrunch Ingrid Lunden 2020 Accessed: 2025-12-14
- NBC News Rachel Elbaum 2020 Accessed: 2025-12-14
2 sources
- Microsoft Learn / Azure Status Marilee Turscak 2021 Accessed: 2025-12-14
Official engineering breakdown released during the event.
- ZDNet Llam Tung 2021 Accessed: 2025-12-14
2 sources
- GitHub (CNCF) 2024 Accessed: 2025-12-14
- CNCF Accessed: 2025-12-14
A dedicated website explaining the Cloud Native Maturity Model.
1 sources
- NIST Peter Mell & Timothy Grance 2011 Accessed: 2025-12-14
1 sources
- IETF 2003 Accessed: 2025-12-14
11
4 sources
- JEDEC Accessed: 2025-11-10
Defines the 3-month retention @ 40°C standard.
Note: File became gated at the time between writing of the book and compiling this summary (late 2025). Please refer to JEDEC for access.
- Carnegie Mellon University / Facebook Justin Meza, Qiang Wu, Sanjeev Kumar, and Onur Mutlu 2015 Accessed: 2025-12-14
- ResearchGate Preeti Gupta, Avani Wildani, Ethan L. Miller, and David S H Rosenthal 2016 Accessed: 2025-12-14
- ACM Digital Library Jalil Boukhobza, Pierre Olivier, Wen Sheng Lim, Liang-Chi Chen, Yun-Shan Hsieh, Shin-Ting Wu, Chien-Chung Ho, Po-Chun Huang, and Yuan-Hao Chang 2025 Accessed: 2025-12-14
3 sources
- Google Cloud Status 2015 Accessed: 2025-12-14
- BBC News 2015 Accessed: 2025-12-14
- SiliconANGLE Mike Wheatley 2015 Accessed: 2025-12-14
2 sources
- YouTube Open Compute Project (OCP Summit V) / Jay Parikh 2014 Accessed: 2025-12-14
Parikh discusses the infrastructure design philosophy ('Efficiency is Profitable') and the Prineville rain incident resulting from aggressive energy conservation.
- The Register Jack Clark 2013 Accessed: 2025-12-14
2 sources
- Wrocław University of Science and Technology 2023 Accessed: 2025-12-14
- Gazeta Wyborcza Rafał Zieliński 2023 Accessed: 2025-12-14
3 sources
- NASA JPL 2024 Accessed: 2025-12-14
Details the FDS memory corruption.
- USA Today George Petras & Stephen J. Beard 2024 Accessed: 2025-12-14
- YouTube Coding with Dee 2025 Accessed: 2025-12-14
4 sources
- atsf.co.uk Accessed: 2025-12-14
Overview of the Domesday Project, its technology, and preservation efforts.
- University of Leeds / Ariadne Paul Wheatley 2001 Accessed: 2025-12-14
- The Guardian Robin McKie & Vanessa Thorpe 2002 Accessed: 2025-12-14
- The Centre for Computing History Accessed: 2025-12-14
This website is an archived copy of "Chris's Acorns", now hosted by The Centre for Computing History as part of The Chris Whytehead collection.
3 sources
- Qualys 2020 Accessed: 2025-12-14
- Microsoft Lifecycle 2020 Accessed: 2025-12-14
- Flashpoint Archive Accessed: 2025-12-14
Main page of the Flashpoint Archive project, a community effort to preserve Flash content.
4 sources
- Digital Preservation Coalition Accessed: 2025-12-14
Entire handbook dedicated to digital preservation concepts and practices. Bit Preservation is explained in the glossary section.
- Library of Congress Accessed: 2025-12-14
- TechTarget Rahul Awati & Kim Hefner 2024 Accessed: 2025-12-14
- Shelf.io Accessed: 2025-12-14
12
5 sources
- NASA 2009 Accessed: 2025-12-15
- Reuters 2009 Accessed: 2025-12-15
- Space.com Robert Z. Pearlman 2009 Accessed: 2025-12-15
- NASA.gov 2012 Accessed: 2025-12-15
Covers the data shortages during the Landsat program.
- Government Accountability Office (GAO) 1983 Accessed: 2025-12-15
Official report on the project budget.
5 sources
- SEC Filings 2022 Accessed: 2025-12-15
Warner Bros. Discovery, Inc. (2023), Form 10-K for the Fiscal Year Ended December 31, 2022, U.S. Securities and Exchange Commission.
In Note 4 (Restructuring and Other Charges) of the Notes to Consolidated Financial Statements (starting on page 68), the company lists "Content impairments, development costs and write-offs" totaling $3,133 million for the year ended December 31, 2022. This charge is explicitly attributed to "strategic content programming assessments" and the abandonment of certain content categories following the Merger.
- Variety Todd Spangler 2022 Accessed: 2025-12-15
- Variety Todd Spangler 2022 Accessed: 2025-12-15
- IndieWire Alison Foreman & Wilson Chapman 2023 Accessed: 2025-12-15
- CNBC Alex Sherman 2022 Accessed: 2025-12-15
11 sources
- Wikipedia Accessed: 2025-12-15
- BBC Archives Accessed: 2025-12-15
- New York Times Richard Sandomir 2016 Accessed: 2025-12-15
- Wikipedia (PL) Accessed: 2025-12-15
- NHK Accessed: 2025-12-15
A program of recovering lost NHK broadcasts. Sections About and Q&A clarifies officiaj reasons for missing archives
- Wikipedia (CS) Accessed: 2025-12-15
- SMS.cz Accessed: 2025-12-15
Explicitly states: 'Older records for this show are not available'.
- Wiped News Chris Jones 2010 Accessed: 2025-12-15
- YouTube ABS Australia 2022 Accessed: 2025-12-15
Rediscovered footage from a 1975 TV broadcast, previously thought lost.
- CoOL (Conservation OnLine) Jim Lidner 1997 Accessed: 2025-12-15
- Wikipedia Accessed: 2025-12-15
6 sources
- Video Game History Foundation Keisey Lewin 2023 Accessed: 2025-12-15
- European Union 2024 Accessed: 2025-12-15
- Stop Killing Games Accessed: 2025-12-15
A petition to urge the European Commission to introduce legislation to protect video games from being delisted or rendered unplayable.
- UK Government and Parliament Accessed: 2025-12-15
Contains official response from the Government.
- KitGuru Matthew Wilson 2025 Accessed: 2025-12-15
- Video Games Europe 2025 Accessed: 2025-12-15
Official statement from the industry association representing video game publishers in Europe.
2 sources
- NASA Technical Reports Server D. Gallaher, G. G. Campbell, W. Meier, J. Moses, and D. Wingo 2016 Accessed: 2025-12-15
- Government Accountability Office (GAO) 1990 Accessed: 2025-12-15
10 sources
- History of Information Accessed: 2025-12-15
- SlashGear Shane Schmid 2025 Accessed: 2025-12-15
- Geekom PC 2025 Accessed: 2025-12-15
- Tom's Hardware Paul Alcorn & Jarred Walton 2025 Accessed: 2025-12-15
- DemandSage Naveen Kumar 2025 Accessed: 2025-12-15
- Intel Market Research 2025 Accessed: 2025-12-15
- Seagate / IDC David Reinsel, John Gantz, and John Rydning 2018 Accessed: 2025-12-15
- Fortune Business Insights 2024 Accessed: 2025-12-15
- Mordor Intelligence Accessed: 2025-12-15
- Wikipedia Accessed: 2025-12-15
13
2 sources
- MongoDB Manual Accessed: 2025-12-15
- Baeldung 2022 Accessed: 2025-12-15
4 sources
- Salesforce 2019 Accessed: 2025-12-15
- Salesforce Pardot incident Accessed: 2025-12-15
Live (unofficial) document tracking the incident as it unfolded.
- ZDNet Catalin Cimpanu 2019 Accessed: 2025-12-15
- Parquet Development Jessica Hope 2019 Accessed: 2025-12-15
3 sources
- Instapaper Engineering Brian Donohue 2017 Accessed: 2025-12-15
- Instapaper Blog 2017 Accessed: 2025-12-15
- TechCrunch Sarah Perez 2017 Accessed: 2025-12-15
5 sources
- GitHub Blog Jason Warner 2018 Accessed: 2025-12-15
- Downtime Project 2021 Accessed: 2025-12-15
- Medium Tanmay Nale 2025 Accessed: 2025-12-15
- The Register Richard Chirgwin 2018 Accessed: 2025-12-15
- GeekWire Tom Krazit 2018 Accessed: 2025-12-15
5 sources
- CERN Twiki 2008 Accessed: 2025-12-15
Primary evidence confirms database journal corruption and data loss from May 4th to May 6th, 2008.
Minutes from team dailies proving that the issue was known. It does not contain information about the date start nor the full extent of the data loss but it does confirm that the corruption was detected and investigated at that time."
- CERN Document Server 2009 Accessed: 2025-12-15
Context: The 'Magnet Quench' incident that dominated resources and media coverage.
- StorageMojo Robin Harris 2007 Accessed: 2025-12-15
Evidence of pre-existing struggles with silent data corruption.
- CERN IT / WLCG Alberto Pace 2010 Accessed: 2025-12-15
Confirms ongoing CASTOR vulnerabilities and data loss incidents.
- CERN Indico C. Cheshkov 2008 Accessed: 2025-12-15
2 sources
- PostgreSQL News 2019 Accessed: 2025-12-15
Release notes mentioning vacuum fixes
- Cybertec PostgreSQL Laurenz Albe 2018 Accessed: 2025-12-15
3 sources
- Discord Blog Bo Ingram 2023 Accessed: 2025-12-15
- HackerNoon Shubhdeep Chhabra 2023 Accessed: 2025-12-15
- YouTube Hussein Nasser 2020 Accessed: 2025-12-15
5 sources
- ZDNet David Gewirtz Accessed: 2025-12-15
- Harvard Business Review Denise Dahlhoff 2015 Accessed: 2025-12-15
- Harvard Digital Initiative Sid Bhandari 2015 Accessed: 2025-12-15
- henricodolfing.com Henrico Dolfing 2019 Accessed: 2025-12-15
- YouTube PolyMatter 2023 Accessed: 2025-12-15
2 sources
- NISO (National Information Standards Organization) 2017 Accessed: 2025-12-15
- Oracle Docs Accessed: 2025-12-15
2 sources
- PostgreSQL Documentation Accessed: 2025-12-15
- Berkeley CS 186 Accessed: 2025-12-15
2 sources
- AWS Accessed: 2025-12-15
- Oracle 2023 Accessed: 2025-12-15
14
5 sources
- Slaughter and May (Official TSB Report) 2019 Accessed: 2025-12-15
- TSB 2019 Accessed: 2025-12-15
- Tech Monitor 2019 Accessed: 2025-12-15
- The Guardian Patrick Collinson 2018 Accessed: 2025-12-15
- iceDQ Sandesh Gawande Accessed: 2025-12-15
2 sources
- Hansard (UK Parliament) 2021 Accessed: 2025-12-15
- Sky News 2021 Accessed: 2025-12-15
3 sources
- Auditor General of Canada 2017 Accessed: 2025-12-15
- SaskOER Accessed: 2025-12-15
- Inceptone Sid Barthakur 2019 Accessed: 2025-12-15
3 sources
- The Japan Times 2023 Accessed: 2025-12-15
- The Asahi Shimbun Hayato Murai 2023 Accessed: 2025-12-15
- XinhuaNet 2023 Accessed: 2025-12-15
2 sources
- Sophos News 2019 Accessed: 2025-12-15
- Global News Adam Wallis 2019 Accessed: 2025-12-15
References Andy Baio, the technologist who broke the story and reconstructed the corruption/transfer issues.
2 sources
- IETF 2003 Accessed: 2025-12-15
- Joel on Software Joel Spolsky 2003 Accessed: 2025-12-15
15
3 sources
- NASA JPL 2013 Accessed: 2025-12-15
- National Geographic Marc Kaufman 2013 Accessed: 2025-12-15
- Space.com Mike Wall 2013 Accessed: 2025-12-15
4 sources
- GitLab Blog 2017 Accessed: 2025-12-15
- The Register Simon Sharwood 2017 Accessed: 2025-12-15
- Linux.com 2017 Accessed: 2025-12-15
- YouTube H4ckTh3Syst3m 2017 Accessed: 2025-12-15
3 sources
- The Next Web Mathew Panzarino 2012 Accessed: 2025-12-15
Interview with Technical Director Oren Jacob.
- Quora Oren Jacob Accessed: 2025-12-15
Direct answer by former CTO.
- Collider Shawn Van Horn 2024 Accessed: 2025-12-15
2 sources
- King's College London (via RegMedia) 2017 Accessed: 2025-12-15
- The Register Alexander J. Martin 2016 Accessed: 2025-12-15
4 sources
- Kyoto University IIMC 2021 Accessed: 2025-12-15
- BleepingComputer Bill Toulas 2021 Accessed: 2025-12-15
- Silicon Republic Leigh Mc Gowran 2022 Accessed: 2025-12-15
- Tech Times Joseph Henry 2021 Accessed: 2025-12-15
5 sources
- DataCenter Knowledge Rich Miller 2009 Accessed: 2025-12-15
- Microsoft News 2009 Accessed: 2025-12-15
- Wikipedia Accessed: 2025-12-15
- BGR Jonathan S. Geller 2009 Accessed: 2025-12-15
- HuffPost Shelly Palmer 2009 Accessed: 2025-12-15
1 sources
- NIST Marianne Swanson, Pauline Bowen, Amy Phillips, Dean Gallup, and David Lynes 2010 Accessed: 2025-12-15
2 sources
- Acronis Accessed: 2025-12-15
- Tencent Cloud 2025 Accessed: 2025-12-15
5 sources
- SNIA Dictionary Accessed: 2025-12-15
- SNIA Dictionary Accessed: 2025-12-15
- SNIA Accessed: 2025-12-15
- AWS Accessed: 2025-12-15
- IBM Accessed: 2025-12-15
16
Case Set: When Data Is Left in Public
Disclaimer: Sources referencing tools like Google Dorks are for educational purposes only. Unauthorized testing is unethical and illegal.
3 sources
Case Set: When Data Is Left in Public
Disclaimer: Sources referencing tools like Google Dorks are for educational purposes only. Unauthorized testing is unethical and illegal.
- ByteSnipers Alexander Subbotin Accessed: 2025-12-15
- GitHub Accessed: 2025-12-15
- DorkSearch Accessed: 2025-12-15
3 sources
- UpGuard 2017 Accessed: 2025-12-15
- ZDNet Zack Whittaker 2017 Accessed: 2025-12-15
- U.S. News Katelyn Newman 2017 Accessed: 2025-12-15
3 sources
- UpGuard 2017 Accessed: 2025-12-15
- Infosecurity Magazine Phil Muncaster 2017 Accessed: 2025-12-15
- Sumo Logic Brien Posey 2017 Accessed: 2025-12-15
4 sources
- Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Single Misconfigured Data BucketSOCRadar 2022 Accessed: 2025-12-15
- SOCRadar Accessed: 2025-12-15
Dedicated tool to check if your data has been exposed in the BlueBleed leak.
- Cybersecurity Insiders Naveen Goud 2022 Accessed: 2025-12-15
- The Hacker News Ravie Lakshmanan 2022 Accessed: 2025-12-15
3 sources
- SC Media 2024 Accessed: 2025-12-15
- Beyond Identity 2024 Accessed: 2025-12-15
- CyberNews 2024 Accessed: 2025-12-15
4 sources
- UpGuard 2017 Accessed: 2025-12-15
- UpGuard 2017 Accessed: 2025-12-15
- HACKRead 2017 Accessed: 2025-12-15
- SecurityAffairs Pierluigi Paganini 2017 Accessed: 2025-12-15
2 sources
- Justia Law 2025 Accessed: 2025-12-15
- CyberScoop Tim Starks 2025 Accessed: 2025-12-15
3 sources
- FTC.gov 2018 Accessed: 2025-12-15
- Uber Newsroom Dara Khosrowshahi, CEO 2017 Accessed: 2025-12-15
- CBS News 2018 Accessed: 2025-12-15
4 sources
- TechCrunch Zack Whittaker 2019 Accessed: 2025-12-15
- Infosecurity Magazine Phil Muncaster 2019 Accessed: 2025-12-15
- SC Media Doug Olenick 2019 Accessed: 2025-12-15
- Sophos News 2019 Accessed: 2025-12-15
2 sources
- MITRE CWE 2013 Accessed: 2025-12-15
- PortSwigger Web Security Academy Accessed: 2025-12-15
2 sources
- Git SCM Accessed: 2025-12-15
- Hackaday Al Williams 2017 Accessed: 2025-12-15
Explains the transition from BitKeeper.
2 sources
- Elastic.co Accessed: 2025-12-15
- Medium Emre Dalci 2023 Accessed: 2025-12-15
17
2 sources
- OpenMetal Sash Ghosh 2025 Accessed: 2025-12-15
- Reddit 2025 Accessed: 2025-12-15
1 sources
- YouTube Complete Coding - Master AWS Serverless 2022 Accessed: 2025-12-15
1 sources
- Medium Asankha Perera 2018 Accessed: 2025-12-15
1 sources
- The Register Tim Anderson 2020 Accessed: 2025-12-15
1 sources
- Reddit 2025 Accessed: 2025-12-15
5 sources
- Centre For Cybersecurity Institute Accessed: 2025-12-15
- CNBC Ryan Browne 2018 Accessed: 2025-12-15
- Electrek Fred Lambert 2018 Accessed: 2025-12-15
- The Newstack Nick Lang & Anna Belak 2022 Accessed: 2025-12-15
- Unit42 Dror Alon 2022 Accessed: 2025-12-15
3 sources
- NASA OIG 2020 Accessed: 2025-12-15
- The Register Simon Sharwood 2020 Accessed: 2025-12-15
- Computing UK Tom Allen Accessed: 2025-12-15
4 sources
- University of Utah Accessed: 2025-12-15
- Khan Academy Thomas Cormen & Devin Balkcom Accessed: 2025-12-15
- freeCodeCamp Palistha Singh Accessed: 2025-12-15
- YouTube Computerphile 2014 Accessed: 2025-12-15
2 sources
- AWS Accessed: 2025-12-15
- Cloudflare Accessed: 2025-12-15
18
5 sources
- CrowdStrike Blog 2024 Accessed: 2025-12-15
Detailed technical breakdown of the 21-vs-20 input mismatch.
- The Hacker News / Serianu 2024 Accessed: 2025-12-15
- Wikipedia Accessed: 2025-12-15
- Harvard Business Review Raphael Yahalom 2025 Accessed: 2025-12-15
- IBM Josh Nadeau Accessed: 2025-12-15
4 sources
- SentinelOne 2025 Accessed: 2025-12-15
- CRN Kyle Alspach 2025 Accessed: 2025-12-15
- The Register Simon Sharwood 2025 Accessed: 2025-12-15
- Cyber Press Accessed: 2025-12-15
Zscaler Reboot Loop Outage
Zscaler’s official Trust Portal maintains a limited incident history (typically one year) and primarily lists external ISP or cloud provider issues, often omitting significant internal service failures. Consequently, the analysis of the "Reboot Loop" and other listed incidents relies heavily on third-party monitoring logs, independent technical analysis, and community reports from impacted IT administrators. While the vendor’s official channels offer little data on these events, the external footprint—documented in the links below—provides a verified timeline of service disruptions that are otherwise absent from the company's permanent public record. This selective transparency necessitates a reliance on community-driven documentation to fully understand the scope of these failures. Update (December 2025): Since the initial compilation of this research, Zscaler has expanded their Trust Portal to include the most recent 30 days of incident history. While this represents an improvement in short-term transparency, the incidents documented in this chapter (spanning 2022-2025) remain absent from the vendor's permanent public record. The analysis therefore continues to rely on third-party monitoring and community reports for historical context.
6 sources
Zscaler Reboot Loop Outage
Zscaler’s official Trust Portal maintains a limited incident history (typically one year) and primarily lists external ISP or cloud provider issues, often omitting significant internal service failures. Consequently, the analysis of the "Reboot Loop" and other listed incidents relies heavily on third-party monitoring logs, independent technical analysis, and community reports from impacted IT administrators. While the vendor’s official channels offer little data on these events, the external footprint—documented in the links below—provides a verified timeline of service disruptions that are otherwise absent from the company's permanent public record. This selective transparency necessitates a reliance on community-driven documentation to fully understand the scope of these failures. Update (December 2025): Since the initial compilation of this research, Zscaler has expanded their Trust Portal to include the most recent 30 days of incident history. While this represents an improvement in short-term transparency, the incidents documented in this chapter (spanning 2022-2025) remain absent from the vendor's permanent public record. The analysis therefore continues to rely on third-party monitoring and community reports for historical context.
- StatusGator 2023 Accessed: 2025-12-15
Detailed tracking of instability not fully archived on the Trust Portal.
- Reddit (r/Zscaler) Accessed: 2025-12-15
Analysis of 'stuck' sessions and node issues.
- Reddit (r/iiiiiiitttttttttttt) Accessed: 2025-12-15
Reports of SharePoint blocking (SSL errors), matching 'Selective Blindness'.
- Reddit (r/networking) Accessed: 2025-12-15
Reports of connection resets indicative of proxy restarts.
- Reddit (r/Zscaler) 2024 Accessed: 2025-12-15
Community evidence of silent outage blocking Microsoft 365 services.
- ThousandEyes Chris Villemez 2022 Accessed: 2025-12-15
3 sources
- Okta Security David Bradbury 2022 Accessed: 2025-12-15
- Beyond Identity 2024 Accessed: 2025-12-15
- NetSecurity 2022 Accessed: 2025-12-15
2 sources
- Microsoft Learn Accessed: 2025-12-15
- BleepingComputer Sergiu Gatlan Accessed: 2025-12-15
7 sources
- Microsoft Learn Accessed: 2025-12-15
- Red Hat 2019 Accessed: 2025-12-15
- Microsoft Learn Ranjithkumar Duraisamy Accessed: 2025-12-15
- NCSC (UK) 2019 Accessed: 2025-12-15
- NIST Murugiah Souppaya & Karen Scarfone 2013 Accessed: 2025-12-15
- Gartner Accessed: 2025-12-15
- CrowdStrike Anne Aarness 2025 Accessed: 2025-12-15
6 sources
- NIST Scott Rose, Oliver Borchert, Stu Mitchell, and Sean Connelly 2020 Accessed: 2025-12-15
- CISA Accessed: 2025-12-15
- OpenID Foundation Accessed: 2025-12-15
- CISA Accessed: 2025-12-15
- NIST 2023 Accessed: 2025-12-15
- NCSC (UK) 2025 Accessed: 2025-12-15
19
4 sources
- The Guardian Tom Parfitt 2011 Accessed: 2025-12-15
- I.B. Tauris Accessed: 2025-12-15
Reference on page 148.
- Mail & Guardian 2011 Accessed: 2025-12-15
- PC Mag Damon Poeter 2011 Accessed: 2025-12-15
3 sources
- U.S. Securities and Exchange Commission (SEC) 2013 Accessed: 2025-12-15
- dougseven.com Doug Seven 2014 Accessed: 2025-12-15
- SEC.gov 2013 Accessed: 2025-12-15
3 sources
- AWS Post-Event Summaries 2020 Accessed: 2025-12-15
- AWS Big Data Blog Dylan Qu, Vishwa Gupta, and Priyanka Chaudhary 2020 Accessed: 2025-12-15
Discusses the shard limits involved in the failure.
- Reddit (r/programming) Accessed: 2025-12-15
Archive of the original incident report.
4 sources
- Bureau of Investigation and Analysis on Industrial Risks (BEA-RI) 2022 Accessed: 2025-12-15
- OVHcloud Corporate 2021 Accessed: 2025-12-15
- Data Center Dynamics Peter Judge 2024 Accessed: 2025-12-15
- Blocks & Files Chris Mellor 2023 Accessed: 2025-12-15
2 sources
- U.S. Department of Energy 2004 Accessed: 2025-12-15
- OSTI.gov A. Muir & J. Lopatto 2004 Accessed: 2025-12-15
2 sources
- UCTE (now ENTSO-E) 2003 Accessed: 2025-12-15
- Electrical & Mechanical Services Dept (HK) Accessed: 2025-12-15
5 sources
- NIST Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, and Rosalie McQuaid 2021 Accessed: 2025-12-15
- Digital Ocean Erika Heidi 2021 Accessed: 2025-12-15
- YouTube Hussein Nasser 2020 Accessed: 2025-12-15
- AWS Builders' Library Colm MacCárthaigh 2019 Accessed: 2025-12-15
- YouTube Cloud Stack Studio 2025 Accessed: 2025-12-15
4 sources
- Atlassian Accessed: 2025-12-15
- YouTube Liquid Web 2021 Accessed: 2025-12-15
- Microsoft Security Blog 2025 Accessed: 2025-12-15
- Google SRE Book Accessed: 2025-12-15
20
4 sources
- YouTube AP Archive 2016 Accessed: 2025-12-15
- CBS News 2016 Accessed: 2025-12-15
- Aljazeera 2016 Accessed: 2025-12-15
- ORR Protection 2016 Accessed: 2025-12-15
4 sources
- FCC 2021 Accessed: 2025-12-15
- T-Mobile Official Blog 2020 Accessed: 2025-12-15
- Fierce Network Bevin Fletcher 2020 Accessed: 2025-12-15
- Bloomberg Scott Moritz & Todd Shields 2020 Accessed: 2025-12-15
4 sources
- Cloudflare Blog Matthew Prince 2025 Accessed: 2025-12-15
- The Guardian Robert Booth 2025 Accessed: 2025-12-15
- CNBC Annie Palmer 2025 Accessed: 2025-12-15
- Leanware Carlos Martinez 2025 Accessed: 2025-12-15
3 sources
- Atlassian Engineering Sri Viswanath 2022 Accessed: 2025-12-15
- The Jira Guy Rodney Nissen (The Jira Guy) 2022 Accessed: 2025-12-15
- GitProtect.io Daria Kulikova 2022 Accessed: 2025-12-15
3 sources
- AWS Architecture Blog Seth Eliot 2021 Accessed: 2025-12-15
- AWS Whitepapers 2021 Accessed: 2025-12-15
- NIST Marianne Swanson, Pauline Bowen, Amy Phillips, Dean Gallup, and David Lynes 2010 Accessed: 2025-12-15
21
5 sources
- SEC Special Study 2003 Accessed: 2025-12-15
Focuses on the decentralization lessons post-9/11.
- Harvard Kennedy School Case Study Esther Scott 2002 Accessed: 2025-12-15
The definitive source for the Empire Blue Cross narrative.
- About Resilience 2022 Accessed: 2025-12-15
- Site Selection Magazine Jack Lyne 2004 Accessed: 2025-12-15
- ResearchGate Alyson E. Beacham & Denise Johnson McManus Accessed: 2025-12-15
4 sources
- Aircraft Accident Investigation Commission (Japan) 1987 Accessed: 2025-12-15
English Translation hosted by the MLIT.
"Tentative Translation from Original in Japanese)"
- FAA Lessons Learned 1985 Accessed: 2025-12-15
High-level engineering summary of the bulkhead/hydraulic failure.
- Simple Flying Jake Hardiman 2022 Accessed: 2025-12-15
- Los Angeles Times Laura Parker 1987 Accessed: 2025-12-15
3 sources
- BEA (Bureau of Enquiry and Analysis) 2012 Accessed: 2025-12-15
The definitive technical document on the Pitot tubes and automation disconnect.
- Vanity Fair William Langewiesche 2014 Accessed: 2025-12-15
Widely considered one of the best pieces of aviation journalism ever written.
- Popular Mechanics Jeff Wise 2023 Accessed: 2025-12-15
4 sources
- UK Health and Safety Executive (HSE) 1990 Accessed: 2025-12-15
- NASA Safety Center 2013 Accessed: 2025-12-15
Excellent engineering summary focusing on the pump switch and permit-to-work errors.
- The Chemical Engineer Fiona Macleod 2018 Accessed: 2025-12-15
- BBC 2025 Accessed: 2025-12-15
5 sources
- UK Parliament (Health and Social Care Committee) 2021 Accessed: 2025-12-15
Section on preparedness and Operation Cygnus.
- UK Parliament Accessed: 2025-12-15
- GOV.UK 2016 Accessed: 2025-12-15
The actual report that was initially classified/withheld.
- The Guardian David Pegg 2020 Accessed: 2025-12-15
- The BMJ 2020 Accessed: 2025-12-15
5 sources
- TEPCO 2012 Accessed: 2025-12-15
Specific sections on the survival of Units 5/6.
- IAEA Accessed: 2025-12-15
- IEEE Spectrum John Boyd 2011 Accessed: 2025-12-15
- IEEE Spectrum Eliza Strickland 2011 Accessed: 2025-12-15
- World Nuclear Association Accessed: 2025-12-15