posted 3 days ago on pinboard
posted 3 days ago on pinboard
I have worked in an atomic weapons depot, a Veterans’ psychiatric hospital and a perfectly awful mental hospital for juveniles, and in all of these places I did…

Read More...
posted 3 days ago on pinboard
Monument Valley costs $6 less than its own soundtrack. That’s how dysfunctional app pricing is.

Read More...
posted 3 days ago on pinboard
RT @edyong209: Confused cats against feminism:

Read More...
posted 3 days ago on pinboard
Wow. Robot Hugs delivers an amazing comic on harassment: TW: harassment, sexism, rape culture, slurs.

Read More...
posted 3 days ago on pinboard
This will be the year I finally start going nuts with Emmet. All the Emmet Shortcuts you forgot:

Read More...
posted 3 days ago on pinboard
Lawsuit: "Happy Birthday" is not in copyright, and Warner owes the world hundreds of millions for improperly...

Read More...
posted 3 days ago on pinboard
Maybe someday I'll find myself sitting next to @jonathancoulton on a flight…

Read More...
posted 3 days ago on pinboard
"The isolines show you where a line of code has the same value as the pixel you’re on." Beautiful move, @mandy3284.

Read More...
posted 3 days ago on pinboard
Complaints @nytimes had about the telegraph in 1858: "superficial, sudden, unsifted, too fast for the truth..."

Read More...
posted 3 days ago on pinboard
⛄ Presentations and expectations

Read More...
posted 3 days ago on pinboard
In the previous post we have discussed about GnuPG: an open source implementation of the original PGP software. Do you know how PGP actually works? A person who does not understand cryptography might think: “OK, I have the public key of the person to whom I want to send a message, I encrypt the message with the public key using some sort of public-key encryption algorithm such as RSA, I send the message and the other person can decrypt that message with the private key”. Wrong. There is a big problem with this method: asymmetric encryption (in particular RSA) is very slow. You do not want to encrypt a message of thousands of words with an asymmetric encryption algorithm. So how do you use the public and private keys?

Read More...
posted 3 days ago on pinboard
RT @AirspeedSwift: Update on lazy map and filter in #swiftlang beta 4: Lazy by name, lazy by nature

Read More...
posted 3 days ago on pinboard
Revisiting 1 Million Writes per second. #Cassandra #AWS #Boundary

Read More...
posted 3 days ago on pinboard
Next time a @NYTimes editorial is so nutty you wonder if they were stoned, you’ll know the answer.

Read More...
posted 3 days ago on pinboard
Potato Salad - Behind The Scenes

Read More...
posted 3 days ago on pinboard
Details for CSS structure at Lonely Planet

Read More...
posted 3 days ago on pinboard
Numbers don't lie but people do:

Read More...
posted 3 days ago on pinboard
An experimental Unix shell in Go

Read More...
posted 3 days ago on pinboard
If you are a web developer or designer you know what :hover selector essentially does; browser detects current mouse cursor position, checks if the cursor is inside the element then adds the css…

Read More...
posted 3 days ago on pinboard
Respect to @jonsnowC4 for expressing this "and wept, as I rarely have as an adult."

Read More...
posted 3 days ago on pinboard
via FeedWrangler Starred

Read More...
posted 3 days ago on pinboard
via Lifehacker http://lifehacker.com

Read More...
posted 3 days ago on pinboard
RT @stevedomin: Check out the notes from YC #startupschool http://t.co/VHOnD0Bg66 Check out the notes from YC #startupschool http://t.co/VHOnD0Bg66 — Steve Domin (@stevedomin) July 26, 2014

Read More...