|
Strange bloke.
"I do not have to forgive my enemies, I have had them all shot." — Ramón Maria Narváez (1800-68).
|
|
|
|
|
Disassembling Apple's diminutive inch-cube iPhone charger reveals a technologically advanced flyback switching power supply that goes beyond the typical charger. It simply takes AC input (anything between 100 and 240 volts) and produce 5 watts of smooth 5 volt power, but the circuit to do this is surprisingly complex and innovative. Better, smaller... safer?
|
|
|
|
|
One thing is obvious from the immediate reaction to Windows 8 Release Preview. Most of those who try it do not like it. Why would a company with huge resources and the world’s most popular desktop operating system create a new edition which its customers do not want? Do users not want it, or do tech bloggers not want it?
|
|
|
|
|
Today we are releasing a major set of improvements to Windows Azure. Below is a short-summary of just a few of them... Command-line tools, GitHub integration, Linux distros and more!
|
|
|
|
|
Friggin sweetness! The virtual machine features seem nifty. And it's good to see they're offering a free version for those wanting to learn on a budget.
Scott wrote: Doing do will enable integration with our new TFS online service
Do the dew, dude.
|
|
|
|
|
Life is full of trade-offs, and many times they are not palatable for every side. Such was the trade-off proposed by Fedora developers this week to solve the upcoming obstacle of UEFI secure booting on Windows 8-certified machines. [ITworld]
|
|
|
|
|
If you pay attention to these things, you've heard that there's a new piece of government-issued malware making the rounds. It's called Flame (or sometimes Skywiper), and it's basically the most sophisticated -- or most bloated -- piece of malicious software ever devised. It may be the first real anything to use MD5 certificate collisions. Neat stuff.
|
|
|
|
|
The novelty and promise of Third-Party JavaScript are clearly reflected in these far-reaching changes that I witnessed while time travelling. Like with any browser tech, there is a bit of a waiting game we have to play while support catches up. Nevertheless, I feel that it’s in your best interest to have a general idea of the up-and-coming technology. Coming soon to a browser near you.
|
|
|
|
|
Time and time again you hear about a company having all of their users' passwords, or "password hashes", compromised, and often there's a press response including one or more prominent security researchers demonstrating how 1000 users had the password "batman", and so on. It's surprising how often this happens considering we've had ways to do password authentication that don't expose users' passwords, or at least makes it significantly harder to crack them, for several decades. You're probably doing it wrong. Here are some better techniques.
|
|
|
|
|
Please — learn to type. This should be a non-issue, NOT one of the industry's dirty secrets that nobody talks about. Tell your boss you're going to take the time. Get your employer to pay for the software. Have them send you off to a course, if necessary, so you can't weasel out of it. Do whatever it takes. You need to learn to type!
|
|
|
|
|
I can only touch type when I'm not thinking about it. But I would think being worse at typing would encourage you to write shorter code, which is generally a good thing.
|
|
|
|
|
I disagree.
"Typing is no substitute for thinking." -- R.W. Hamming
Programming is not typing; most of my time is spent thinking, not typing, and not only that, but I'm thinking of ways to reduce the typing. Even when I am writing code, it isn't prose it's code -- with lots of numbers and special characters and whitespace frickin' everywhere! And let's not get into "designers" and other drag-and-drop rubbish.
When I signed up for my first programming class (in 1983) I also signed up for a typing class (using a manual typewriter as it turned out) -- foolishly thinking that it would help with programming.
I generally use my left hand only for Tab, Shift, and Ctrl+{A, S, Z, X, C, V} -- my right hand does everything else.
Typing is fine for writing novels and taking dictation, but it's less useful when writing code.
|
|
|
|
|
Choosing the right shell to use is an important decision because you will spend considerable time and effort learning to use a shell, and even more time actually using the shell. The right choice will allow you to benefit from the many powerful features of UNIX with minimal effort. One shell to rule them all.
|
|
|
|
|
John Carmack has been building a virtual reality headset in his spare time. He’s showing it to people behind closed doors at this year’s E3, tucked away inside the Bethesda booth, and described it as “probably the best VR demo the world has ever seen.” The perfect Brainstorm.
|
|
|
|
|
As robots become more autonomous, the notion of computer-controlled machines facing ethical decisions is moving out of the realm of science fiction and into the real world. Society needs to find ways to ensure that they are better equipped to make moral judgments than HAL was. It can only be attributable to human error.
|
|
|
|
|
Asked to picture a computer programmer, most of us describe the archetypal computer geek, a brilliant but socially-awkward male. We imagine him as a largely noctural creature, passing sleepless nights writing computer code. According to workplace researchers, this stereotype of the lone male computer whiz is self-perpetuating, and it keeps the computer field overwhelming male. It may be surprising, then, to learn that the earliest computer programmers were women and that the programming field was once stereotyped as female. I don’t know of any other field, outside of teaching, where there’s as much opportunity for a woman.
|
|
|
|
|
Forget Facebook. Forget Groupon. Forget everything you know about Silicon Valley. Because Ponzify isn’t like other tech companies. We don’t promise results. We show them to you, on a piece of paper, that has your name and a monetary figure that increases every month. The Next Big Thing: Ponzify.com
|
|
|
|
|
Thirty-one. That’s the number of months it took Palm, Inc. to go from the darling of International CES 2009 to a mere shadow of itself, a nearly anonymous division inside the HP machine without a hardware program and without the confidence of its owners. Thirty-one months is just barely longer than a typical American mobile phone contract. Understanding exactly how Palm could drive itself into irrelevance in such a short period of time will forever be a subject of Valley lore. A thousand webOSes will bloom, I hope.
|
|
|
|
|
It is illegal for U.S. employers to issue broad-based prohibitions of employee discussions about their workplaces on social media, according to a new memo from the acting general counsel of the U.S. National Labor Relations Board (NLRB). [ITworld]
|
|
|
|
|
A startup named Donuts has raised US$100 million in venture capital and has applied for 307 generic top-level domains in the Internet Corporation for Assigned Names and Numbers' open gTLD application process, the company said Tuesday. [ITworld]
|
|
|
|
|
Hopefully, "here-is-your-elephanting-donut.com" is one of the domain names.
|
|
|
|
|
The "com" in that domain is the top-level domain. I think that one's already taken.
|
|
|
|
|
Do you think they applied for .nut? I'm thinking that might be a misunderstood top-level domain. I can just imagine the sites that would want a .nut site.
|
|
|
|
|
As in Busta.nut?
|
|
|
|
|
Or KissMy.nut, KickedInThe.nut, LookAtMy.nut, ... and down the rabbit hole we go.
|
|
|
|