2328
Dilbert is mine now | @leyawn @ Twitter
The separation of art from the artist is fascinating to me. I should clarify – not just the separation, but the reclamation of art for another use. The artist loses their work to the world.
:comic 
september 2017
The world in which IPv6 was a good design | Avery Pennarun
The IETF people, when they were thinking about IPv6, saw this mess getting made […] and they said, hey wait a minute, stop right there. We don’t need any of this crap! What if instead the world worked like this? […] It would have been beautiful. Except for one problem: it never happened.
!  networking  history  ipv6  internet  recommended 
august 2017
dnmfarrell/URI-Encode-XS
A C based URI encoder decoder for Perl
tinged 
june 2016
MSYS2 installer
MSYS2 is an independent rewrite of MSYS, based on modern Cygwin (POSIX compatibility layer) and MinGW-w64 with the aim of better interoperability with native Windows software. […] MSYS2 uses Pacman (of Arch Linux) to manage its packages and comes with three different package repositories
!  ms-windows  software-package 
march 2016
Long range forecast | Charlie Stross
Every nation that isn't impoverished or devastated by climate change will see a wave of immigration, and every nation undergoing a wave of immigration will see a nativist political reaction.
!  environment  economics  society  politics  depressing  future 
february 2016
Further Die Casting | Jerry “Tycho” Holkins @ Penny Arcade
“The die is cast” is roughly synonymous with “this is the point of no return,” like “crossing the Rubicon”. And I knew that’s what it *meant*, but the imagery I used to get there was different.

I mentioned *en Twittre* that, until very recently – the last year maybe – I thought the phrase “The Die Is Cast” was referring to a manufacturing thing, like a shaping tool. The tool that will determine the shape of events is already made. I was overjoyed to learn I wasn’t the only one who felt this way. But there were also a third group of people who thought it was referring to dye, that an indelible mark had been made and that was the shape of things. The reason nobody had their assumptions challenged for so long was because they were all using the term identically, with full compatibility, independent of the metaphor. This is the kind of thing I like.
!  language  :fullquote 
january 2016
The paranoid style in 2016 | Charlie Stross
When you take the old paranoid-style driven give-us-all-your-money mailing list scams (and their old-media spin-offs like Fox News and Clear Channel's talk radio shock jocks) and add telepathy [via disclosure-induction social media with always-connected handheld internet devices], what you get is […] a scream of rage directed against the modern world.
january 2016
Solved by Flexbox — Cleaner, hack-free CSS
CSS has been lacking proper layout mechanisms for far too long. […] Finally […] we have a solution. […] Problems once hard or impossible to solve with CSS alone, now made trivially easy with Flexbox.
css  ! 
october 2015
How Trigger Warnings Are Hurting Mental Health on Campus | Andrew B. Myers @ The Atlantic
Students who call for trigger warnings may be correct that some of their peers are harboring memories of trauma that could be reactivated by course readings. But they are wrong to try to prevent such reactivations.
culture  society  psychology  ?  ! 
august 2015
Rain.today
A stochastic audio engine generates a realistic rain shower by randomly drawing sounds from different categories such as light rain, heavier rain, thunder, and water sounds.
ambient-noise  service 
august 2015
The Life of a Puppet | Saturday Morning Breakfast Cereal
Long story short, I wish Robert Caro would write a biography of Pinocchio.
:comic 
may 2015
Given Enough Money, All Bugs Are Shallow | Jeff Atwood
While I applaud any effort to make things more secure, and I completely agree that security is a battle we should be fighting on multiple fronts, both commercial and non-commercial, I am uneasy about some aspects of paying for bugs becoming the new normal. […] The incentives feel really wrong to me. As much as I know security is incredibly important, I view these interactions with an increasing sense of dread because they generate work for me and the returns are low.
software-development  ! 
april 2015
Why My MOOC is Not Built on Video | Dhawal Shah @ MOOC Report
The concepts [outlined in the videos] were clear: I could follow the explanations easily and the examples put things in context and helped me understand the importance of knowing statistics! But 2 weeks later… I couldn’t remember [how to relate the concepts]. I had to watch the videos one more time, then everything was clear again. But a month later … You know where this is going. […] Without manipulating the new concepts through writing things down, making summaries, diagrams, working through examples and so on… I just forgot.

[…]

Derek Muller (Veritasium) claims […] typical physics videos do nothing to clear students’ misconceptions – unless these misconceptions are tackled head on, creating a sense of confusion.
education  cognition  ! 
march 2015
False Equivalence | David Willis @ Shortpacked!
Let’s throw in some rosy cheeks and kissable lips.
feminism  :comic  ! 
march 2015
Boiling React Down to a Few Lines of jQuery | Саша Щепановский
[
1. Put all state that affects UI in any way in a data structure
2. Write purely functional code that generates the UI from that data structure
3. Write your event handlers as a) update the data structure b) call the UI renderer
]
javascript  jquery  reactjs  ! 
march 2015
Improved default settings for Linux machines
The reason I set [the kernel limits] high is that the machines I work on are not multi-user in any way. […] There's only one user/application that pretty much never wants or expects to hit the ridiculously low default limits. [… I] have never seen them cause an issue; in fact quite the opposite happens: users are not surprised by silly limits like 1024 file handles or applications going away for non-deterministic amounts of time while the kernel fetches application pages from swap that were only swapped out to make room for VFS. […] These are improved defaults for opening up the Linux network stack. I recommend Googling "Linux C10k" to learn more about what they mean. […]
linux  sysadmin  advice  ! 
february 2015
Profiling Vimscript performance
Vim provides built-in profiling tools that make it easy to diagnose performance issues. We’ll start by looking at how to profile the vimrc file, then move on to a real world scenario where profiling helped to identify and aleviate a performance bottleneck.
vim  programming 
february 2015
SILE
SILE is a system for creating beautiful printed documents. It borrows extensively from TeX, but brings some of TeX's ideas into the 21st century with frame-based layouts, native support for Unicode, PDF, Opentype and XML processing, and extensibility and programmability in a modern, high-level language. […] Because of this, functionality which is a challenge for TeX users - for instance, laying out text on a grid, or magazine-style frame based layouts - becomes very easy
typesetting  software-package  unused 
january 2015
Patoline
A collection of typesetting libraries designed to be combined into a variety of possible applications. Its primary goal is not to offer the definitive answer to all typesetting problems, but rather to write the painful and boring parts of the job, so that interesting tools could be written easily.

Obviously, a related (but much smaller) project is the Patoline compiler, which compiles a mixed Wiki/LaTeX/Ocaml syntax into a variety of output formats, including traditional PDF files, but also web servers that deliver dynamic contents, synchronized for instance with a talk.
typesetting  software-package  unused 
january 2015
Lout
The system reads a high-level description of a document similar in style to LaTeX and produces a PostScript file which can be printed on most laser printers and graphic display devices. […] The Lout language, in which most document typesetting and layout tasks are implemented, is a purely functional language, which simplifies reasoning about the operations performed.
typesetting  software-package  unused 
january 2015
Bitcoin revealed: a Ponzi scheme for redistributing wealth from one libertarian to another | The Washington Post
Bitcoin miners, you see, borrowed [real dollar money] that they could only pay back if Bitcoin prices kept rising. […] Bitcoin, remember, is a digital “currency” that lets you send money online without needing a bank to confirm it. That’s because it substitutes a decentralized network of middlemen for a single middleman. And instead of paying [the miners real dollar] fees, it pays them with new Bitcoins. [… Now] Bitcoin prices are free falling [and so] miners are spending more money running their supercomputers than they’re making from new coins [which forces them to] sell the only assets they have—Bitcoins—to pay back their dollar debts […] Bitcoin, in other words, is suffering a deleveraging shock like the one that hit our economy in 2008, but without a Federal Reserve to cushion the blow.
economics  ! 
january 2015
Environment Variables Considered Harmful for Your Secrets
The environment is implicitly available to the process. It's hard to track access and how its content gets exposed. […] The whole environment is passed down to child processes (if not explicitly filtered) which violates the principle of least privilege. So your secret keys are implicitly made available to any 3rd-party tools you're using (like ImageMagick to resize an image). It's hard to say what those 3rd-party tools will do with the environment, especially in rare occasions like crashes.
programming  security  advice  ! 
january 2015
Building Infrastructure | Poul-Henning Kamp
For the parameters I use table-driven programming, and since few people seem to be aware you can even do that I’ll switch to digitus magistrans mode for a moment: […] Another convention I have adopted are a set of macros to manage and tag structs. […] Asserts — Yes, I love them, [and] three macros I use a lot are:
c  programming  advice  ! 
december 2014
Lego Friends | Maritsa Patrinos @ Seasonal Depression
If you want to appeal to girls, you don’t need to, like… make a whole *separate* line of toys. You just need to add *one* piece.
recommended  feminism  :comic  ! 
december 2014
Dada Data and the Internet of Paternalistic Things | Sara M. Watson @ The Message
My stupid refrigerator thinks I’m pregnant. […] I guess I should have seen it coming. Our Fountain™ tracking toilet noticed when I got off hormonal birth control and got an IUD instead. But I thought our toilet data was only shared between Nest and our doctors? What tipped off our Samsung fridge? I got a Now notification that I was ovulating a few weeks ago. I didn’t even know it had been tracking my cycle, let alone by basal body temperature through my wearable iRing.
life-under-the-cloud  ?  ! 
december 2014
Professional App Pricing | Rob Rhyne
Professionals use your software to make money. If you can find a way for them to do their job faster or better, they will pay nearly any price. Did you purchase the maximum spec for your last computer or did you buy the cheapest you could find? Professionals always trade money for productivity.
business  advice 
december 2014
Help Fund Open-Wash-Free Zones | Bradley M. Kuhn
Our community suffers now from regular and active cooption by for-profit interests. […] The primary mechanism of cooption: encourage funding only from a few, big sources so they can slowly but surely dictate project policy. […] This problem is actually much worse than traditional open-washing. I'd call this for-profit cooption its own subtle open-washing: picking a seemingly acceptable license for the software, but “engineering” the “community” as a proxy group controlled by for-profit interests. ¶ This cooption phenomenon leaves the community-oriented efforts of Free Software charities underfunded and (quite often) under attack. These same companies that fund plenty of Open Source development also often oppose copyleft.
libre-software  politics  licence  freedom  ! 
december 2014
PostgreSQL’s Powerful New Join Type: LATERAL | Dan Robinson @ Heap
Because this is a lateral join, our subquery can make reference to the view_homepage_time results from the previous subquery. Otherwise, the subqueries would be evaluated independently and there would be no way to access results from one when evaluating the other. […] Without lateral joins, we would need to resort to PL/pgSQL to do this analysis. Or, if our data set were small, we could get away with complex, inefficient queries.
postgresql 
december 2014
My visit to the doctor:
Nurse: “Sorry your boyfriend couldn’t wait for you in the waiting room, it makes women feel uncomfortable.”
Me: “He wasn’t my boyfriend and I don’t see how it would make them uncomfortable, but that’s my opinion. He was here for moral support. I understood, and so does he.”
Nurse: “So he’s your…”
Me: “Friend.”

(During the questions)
Nurse: “How many sexual partners have you had?”
Me: “11.”
Nurse: “How old were you when you first became sexually active?”
Me: “… Loaded question but… 14, I guess.”
Nurse: “You’re sexually active, then.”
Me: “Well… I guess… but…”
Nurse: “How many times have you been pregnant?”
Me: “Uh. 0.”
Nurse: “O…kayy…” *checks “condoms” as my preferred use of birth control*
Me: “I don’t use condoms. Or take birth control.”
Nurse: “Then how do you avoid getting pregnant?”
Me: “With homosexuality.”
Nurse: “…”
Me: “…”
Nurse: “…”
Me: “I fuck girls.”
society  sexuality  ?  :fullquote 
december 2014
Defonic
Combine the sounds of the world into a melody
ambient-noise  service 
november 2014
Not Safe For Not Working On | Dan Kaminsky
It’s really quite tempting to say: “No, it’s OK. Only these celebrities got hacked, not me, because they were so stupid they took sexy photos. It attracted the hackers.” As if the hackers knew there had to be such photos in the first place, and only stole the photos. As if we don’t all have private lives, with sensitive bits, that could be or already have been acquired by parties unknown. We’ve all got something to lose. And frankly, it may already be lost.
security  sociology  usability  ! 
september 2014
« earlier      
! :comic :de :ebook :fullquote :pdf :picture :quotation :slides :video :wikipedia ? accessibility accessories advice ajax algorithm ambient-noise amusing anthropology apple art astronomy atom beauty bias biology business c calendar career chemistry cognition collaboration colour communication complexity compression compsci concurrency content-mafia creativity cryptography css culture del.icio.us depressing design disintermediation diversity dns drm economics editor education email energy engineering environment evolution facebook factual-data faith feminism filesharing finance firefox fonts form-design freebsd freedom funny furniture future games geology geometry gfc git google google-chrome hacking hardware hash haskell hci health hg history html http inspirational intellectual-property internet internet-explorer interview iphone java javascript journalism jquery keyboard language latin law licence life-in-the-cloud linux lisp location longtail love mac markdown marketing mathematics media medicine memory-allocation microsoft ms-windows music netradio networking neurology nutrition oo operating-system parenting parser participatory patents perception perl philosophy php physics politics postgresql privacy productivity programming psychology python quotations rant rdf recommended reference relational religion rest ruby rubyonrails scalability scale scary scheme science scraped security semantic service sexuality shell skepticism slackware smalltalk sociality society sociology software-development software-package software-qa sound space spam sql ssh standards statistics stock-photography style surveillance sustainable syndication sysadmin system-architecture technology tex tinged tools-will-save-us twitter typography unicode unix uri usa usability vcs vim visualisation web webdesign weblogging wikipedia writing wysiwyg xml xp

Copy this bookmark:



description:


tags: