Labnotes

Published on

Downtown Josh Brown "I found it. The coolest dog of all time."


Design Objective

Factory vs. Studio Pick the right start conditions, the rest will follow:

The first time I did this activity, I had no idea what to expect, but the results blew me away. Start conditions matter. Choose wisely and mix and blend to suit your taste.

How United Onboards New Users As bad as you imagined?


Tools of the Trade

AutoDraw Amazing. Draw your best (or worst) stick figure, and AutoDraw's AI will find a high quality sketch for you.

Introducing Increment A software engineering magazine dedicated to practical and useful insight into the ostensibly small things that are actually big things: testing, deployment, development tools, code review. Subscribed.

The invisible parts of CSS This article will help you understand how different parts of CSS come together (cascade, box model, display types, etc).

Using the Chrome devtools new code coverage feature Code coverage lets you run your web app, and for each JS/CSS file, see which lines of code ran and which didn’t.

Headless Chromium Using headless Chrome from the command line and from Node. And with that, PhantomJS project is shutting down.

Source Still searching for the perfect client, but here's one more to review.

The History of the Web Stories of how the Web came to be.

Nat Pryce I need this!

Product idea: a calendar app that automatically adds "Get audio working: 10 minutes" as the first agenda item of any remote meeting.


Lingua Scripta

Why you should use Object.is() in equality comparison Explains the difference between ==, === and Object.is.


Lines of Code

Software Complexity: The Art of Naming If you can break things into specific responsibilities, naming becomes much easier.

Gigasquid

How to recognize a programmer: Do they use the word "orthogonal" in a conversation?


Architectural

Sinjo ✌🏼 💖

A thing SRE has taught me more than previous roles: non-uniformity (of code, infra, process) is expensive.

Not to say you should never do it, but every time you have to say "oh that one's a bit different" costs you.


Peopleware

Stephanie Hurlburt

After thinking on it & talking to lots of teams, I'm convinced that the best developer job interview is a simple discussion about past work.

Ian Chan

My eng management book will have a chapter: 'How to eat your lunch in 5 minutes then drink 5 coffees/day during 1:1s without dying'


Locked Doors

Shields Up: Developing Security Skepticism Critical reading is necessary. Also, cut click-bait journalism of out your diet, replace with sources that help you parse the news, and put things in context.

A quick look at the Ikea Trådfri lighting platform At least Ikea is getting IoT right.

Investigation finds inmates built computers and hid them in prison ceiling Dedicated hackers.


None of the Above

Max Weiss "Get into a Twitter war with @Wendys at your own peril."

Google Disabled Burger King’s Ad Hijacking Google Home, but BK Got Around That Too Now that TV ads can command any device in your home, what's left for us people to do? Sleep more?

How “News Literacy” Gets Web Misinformation Wrong I wholeheartedly agree. Forget the rest, and follow these three steps:

  • Check for previous fact-checking work
  • Go upstream to the source
  • Read laterally

Australian rapper skips dinner bill by swimming off, court told Every paragraph of this story gets better and better:

An Australian rapper called 2pec racked up a large bill in a seafood restaurant, before running into the sea to avoid paying, a Queensland court has heard.

Dave "I altered my light switches to dispense potatoes. Why? Because I can"

Published on

Ana Milicevic "We've come full circle ⭕"


Design Objective

Luke Wroblewski "not only do people prefer not entering city/state, they’re 93% faster when using ZIP to get both automatically."

2017 state of email report (PDF) 80 pages of what's new, what changed, and what email clients are still stuck in the past.


Tools of the Trade

RegexHQ Community-driven collections of RegExp patterns and tools: twitter mentions, credit card numbers, usernames, POSIX paths, and more.

Preload, Prefetch And Priorities in Chrome TL;DR preload asks the browser to fetch the resource, prefetch hints it might be fetched in the future. But, of course, there are nuances and gotchas, so check out the article.

Chromium policy on JavaScript dialogs Unfortunately, the alternatives are an unsupported HTML element, or the annoying Notifications API:

alert()/confirm()/prompt() dialogs are being changed. Rather than being app-modal, they will be dismissed when their tab is switched from. (Safari 9.1 already does this.)

Scrolling on the web: A primer There's nothing simple about handling scroll events:

Developers should also use passive event listeners whenever possible, with feature detection to avoid compatibility issues. Using Pointer Events (there is a polyfill) and “scroll” listeners are also surefire ways to prevent unintentional scroll-blocking.

Königsberg: Seven Small Bridges, One Giant Graph Problem Challenges, graphs, Euler, and shifting perspectives.

Daniel Westheide

This WE I learned that web apps rendering HTML on the server are “the legacy way”. Yep, they are built to last.

Michael Buckbee

People sometimes ask me: "Mike, why is programming hard? It's just telling the computer what to do?" I show them this screenshot


Lingua Scripta

myshov/function_invocation.js All the different ways to invoke a function in JavaScript.

Unhandled Promise Rejections in Node.js Learning to live with unhandledRejection.

brockwhittaker/BitArray.js A memory efficient implementation of bit flag arrays in JavaScript, using Uint32Array.


Lines of Code

Principle of reasonable expectations Another way to think about naming (variables, functions, etc):

Another useful thing that this principle surfaces is that if something provides no reasonable expectations, then it is a violation of the principle. Consequently, naming functions as for example handleTriggerFailed will violate the principle since there is not much that the reader of the code can infer from that method name.

Gregory Brown

A lack of automated tests is not what causes defects... a lack of system understanding is. Tests let us automate part of our understanding.

Rod Vagg Dot Com "This guy is a software engineer, you can tell by his awesome estimation skills"


Peopleware

Suz Hinton Great thread, on what it means to be a senior engineer:

If you're a senior engineer, you have a responsibility to your team; not just getting to code on whatever you want/changing architecture.

ryandrake

The hero worship of successful people is just survivorship bias in action. Out of a population of people flipping coins, we (after the fact) find the ones who flipped heads 10 times in a row and fawn over them, asking them how they became such great coin flippers and what we can do to improve our coin flipping skills. See also: Good To Great or any similar business book.

anna borges "good news everyone the search is over"


Locked Doors

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems In which Alice and Bob, are first introduced to the world. They just celebrated their 40th birthday.

Twitter Phishing Scam Targeting Customers of Barclays, Other Major UK Banks Customer tweets at bank, requesting help. Attacker responds from a legitimately looking Twitter account, sends customer link to a bogus support page.

Smart TV hack embeds attack code into broadcast signal—no access required "The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal … By exploiting two known security flaws in the Web browsers running in the background, the attack was able to gain highly privileged root access to the TVs."

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks (PDF) Clever way of recruiting anti-virus software to help the attacker:

We proceed to demonstrate the threat of anti-virus assisted attacks and feasibility of implanting malicious markers in three different scenarios: 1) covering up password guessing, 2) deleting a user’s emails and 3) facilitating web-based attacks by removing browser cookies. For each scenario we choose a different anti-virus product to demonstrate the generality of the approach.

Identifying HTTPS-Protected Netflix Videos in Real-Time Even though it's encrypted, Netflix uses variable bit rate (VBR) encoding, which leaves a distinct fingerprint: "we show that our system can differentiate between videos with greater than 99.99% accuracy."

Robinson Meyer

Your Russian hacker name is your mom's maiden name followed by the last four digits of your SSN


None of the Above

Kevin Antony "You win Ikea. You win 🤔"

RFC 8140 The Arte of ASCII "This document attempts to address that yearning by demonstrating the full wonder of the natural world in vivid two-dimensional representation and a colour palette that would put even the august L. S. Lowry to shame."

AMP: Breaking News "The media have now almost completely lost control of distribution." Journalism relies on trust between the reader and the publisher, and you can't establish trust, if you can't tell publishers apart. Wither journalism in a world where all publishers look the same.

Ham Saladyce "I see cats have started writing for the telegraph"

Why Japan’s Rail Workers Can’t Stop Pointing at Things It looks silly, but it's the smart thing to do: "pointing-and-calling is known to reduce workplace errors by up to 85 percent."

Adam J Calhoun "Cats getting confused by optical illusions never get old"

Woman Who Drinks 6 Cups Of Coffee Per Day Trying To Cut Down On Blue Light At Bedtime That time, when the Onion wrote a story about me.

Nancy H. "When you're not paying attention..."

Published on

Patrick Wong "JIRA is rolling out stories" (Other apps adding stories to mock Facebook)


Design Objective

Design thinking lessons from our cats "Think inside the box."

Meet the inventor of the electronic spreadsheet Dan Bricklin's TED talk, on how VisiCalc came to happen, and prototyping in the age of punch cards.

On the Current State of Design Systems in UX The history, key considerations, and when/how to use design systems.

Karla Zelaya "100% accurate #designerproblems"


Tools of the Trade

CSS in not broken If you plan on using CSS effectively, take this to heart:

Design your styles so they can be reused, anywhere in the app. Learn SMACSS and BEM. And don’t stop because you understand the “naming system”—these methodologies are about far more than double-underscores and double-hyphens. They are about code organization, reuse, and refactoring. They are the solution to dead code elimination. They offer ways to utilize the cascade instead of fearing it. They allow you to know precisely where in your code you can find a certain set of styles.

New Web Features in Safari 10.1 iOS 1.3 and macOS 10.12.4 are out, with CSS Grid Layout, Fetch, ES2017, custom elements, interactive form validation, media capture, and much more.

Nicole in 🇲🇽

TIL loading your jquery script via a google cdn: users in china wont get any jquery as anything google is blocked in china

5 Vim Plugins I Can’t Live Without for Javascript Development Prettier looks intriguing.

basecamp/geared_pagination Variable speed pagination gears up to give you more search results, the deeper you search. Simple and deceptively smart:

Geared Pagination allows you to define different ratios. By default, we will return 15 elements on page 1, 30 on page 2, 50 on page 3, and 100 from page 4 and forward. This has proven to be a very sensible set of ratios for much of the Basecamp UIs. But you can of course tweak the ratios, use fewer, or even none at all, if a certain page calls for a fixed-rate scheme.

One Line of Code that Compromises Your Server Reminder: "A session secret that is not sufficiently cryptographically random can be guessed with fairly little time, effort and resources."

junyanz/CycleGAN A deep learning algorithm with remarkable photoshopping skills: "generates photos from paintings, turns horses into zebras, performs style transfer, and more."

Loopy A tool for thinking in systems.

James Archer

For anyone who feels bad about their product backlog, just remember that Outlook has been rendering smiley faces as "J" for eight years.

Dvir Volk "Best github issue ever"


Lingua Scripta

JavaScript. But less iffy. What if you wanted to write JavaScript without using if/else statements?

Exposing HomeObject Digging into V8 internals.


Lines of Code

The Debugging Mindset If you're reading one research paper this week, make it this one. It's about the psychology of different learning strategies, and how to develop your problem-solving skills:

Through continued learning, malleable views of problems, and effective use of tools, you can become successful in debugging. Still, some insist that debugging is more of an art than a science. I think we can dispatch this idea entirely. It is clear that debugging requires learning, and the scientific method is specifically designed to yield new knowledge. The method, summarized: (1) Develop a general theory of the problem. (2) Ask questions leading to a hypothesis. (3) Form a hypothesis. (4) Gather and test data against the hypothesis. (5) Repeat.

Functional programming design patterns by Scott Wlaschin The functional programming equivalents for SOLID, and the Strategy and Decorator patterns.

Programming is Writing is Programming What insights do we gain from viewing programming as similar to writing?

The core idea of the paper is that programming and writing are both, in essence, the activity of taking a very high-level idea and translating it to low level statements: sentences and words for the writers, and methods and lines of code for the programmers.

...

Here’s a thought: If we had viewed programming more alike writing from the start, would we have come to agile design methodologies sooner?

Andy Bell

A group of StackOverflow users is called a "just".

ねこナビ編集部@VR動画公開中 Pair programming:


Architectural

BBR: Congestion-based congestion control "This is the story of how members of Google’s make-tcp-fast project developed and deployed a new congestion control algorithm for TCP called BBR … leading to 2-25x throughput improvement over the previous loss-based congestion control CUBIC algorithm."


Peopleware

Guidelines for Effective Collaboration If you're part of a remote team, here are some tips for better collaboration.

Anne Lamott

Almost everything will work again if you unplug it for a few minutes, including you.


Locked Doors

Someone is putting lots of work into hacking Github developers Be safe out there:

Dimnie is a highly modular piece of software that gives attackers an extensive menu of capabilities that can be tailored to a specific target. Available functions include keylogging, the taking of screenshots, interacting with attached smartcards, extracting PC information, …

The campaign targeting Github users starts with e-mails that attach a booby-trapped Microsoft Word document. The file contains a malicious macro that uses PowerShell commands to download and execute the payloads.

[CVE-2017-7240] Miele Professional PG 8528 - Web Server Directory Traversal That is a dishwasher getting hacked because someone forgot about ../.

Adrienne Porter Felt "What can your ISP see in your browsing history?" (simplified, but gets the point across)

14,766 Let's Encrypt SSL Certificates Issued to PayPal Phishing Sites But then again, "HTTPS is secure" is wrong, and this where we get everyone confused.

This Is Almost Certainly James Comey’s Twitter Account Are you as good at hiding your secret online identity as the director of the FBI?


Techtopia

Ben Tolmachoff "This little girl thought a broken water heater is a real life robot. It's just not fair how cute it is"

Software vendor says it's not to blame in false jobless fraud findings Today in Naive Technology Adoption Is Ruining People's Lives:

State officials have said that between Oct. 1, 2013, when the MiDAS system came on line, and Aug. 7, 2015, when the state halted the auto-adjudication of fraud determinations and began to require some human review of MiDAS findings, the system had a 93% error rate and made false fraud findings affecting more than 20,000 unemployment insurance claims. Those falsely accused of fraud were subjected to quadruple penalties and aggressive collection techniques, including wage garnishment and seizure of income tax refunds. Some were forced into bankruptcy.

Charles Duhigg "People won’t stop staring at their phones, so a Dutch town put traffic lights on the ground"


None of the Above

Stevosideways "I literally defy anyone to watch this video in full and not be smiling like a big idiot by the end!!! 😂😂😂😂"

A Neural Networks Approach to Predicting How Things Might Have Turned Out Had I Mustered the Nerve to Ask Barry Cottonfield to the Junior Prom Back in 1997

Network performance on test data indicates that this author would have received an 87.2 (1)% chance of "Yes" given a particular set of environmental input parameters. Most critically, the optimal method of question delivery is found to be Secret Note rather than Verbal Speech. There also exists mild evidence that wearing a burgundy mini-dress might have helped.

Brian

Me: My computer is acting weird, I don't know what's wrong.

Friend: Maybe you should take you computer out to dinner. Let it know you care.

The Journalist-Engineer "Lately, some of the best articles in the NY Times and Bloomberg are 99% code. The end-product is predominantly software, not prose."

Rethinking our default profile photo Twitter finds yet another way to "tackle but not really, in fact not at all" abuse on its platform: rebrand those egg profiles!

We’ve noticed patterns of behavior with accounts that are created only to harass others – often they don’t take the time to personalize their accounts. This has created an association between the default egg profile photo and negative behavior, which isn’t fair to people who are still new to Twitter and haven’t yet personalized their profile photo.

Priya Ramesh

Published on

Matthew Deiters "The future is confusing"


Design Objective

Iteration is not design Iterations can help improve your designs, but "to mistake the design tool of iteration for design itself is a grave error."

Strengthening Your Idea Muscles Write 10 ideas a day.

How to design accessible email newsletters This guideline shows some principles for designing accessible email newsletters that can be used by everyone.

Down with the down-vote Yes:

I would argue that thumbs up/down feels very five years ago, before we learned that down-vote features were little more than an abuse vector for targeted harassment and the suppression of progressive voices and ideas.

Changelog "Would love to see the user story for this feature..."


Tools of the Trade

d3-node/d3-node Ever wanted to use D3 to generate charts on the server? Now you can.

Bo Ren

Best new editing hack, record yourself reading your piece and listen back to it. You'll pick up on a lot of weird nits and repetitions.

The eigenvector of "Why we moved from language X to language Y" "With my endorsements for C on LinkedIn, I expect recruiters to reach out to me about C opportunities well into the 2050’s (actually taking that back — hopefully C will outlive LinkedIn)."

Distill A new interactive, visual journal for machine learning research.

Pi-hole™ "Since Pi-hole works at the DNS level, ads can be blocked on any device and even in apps."

David Manouchehri

Either somebody doesn't know how floats work, or I got a $0.000000000000002 credit. 🤔

Anyway, that's just my two femto cents.


Lingua Scripta

Maybe you should use maybes Maybe. But maybe this should be baked into Promises instead.

const value = maybe(1);  
value.map(v => v + 1); => 2  
const empty = maybe(null);  
empty.map(v => v + 1); => hoop  

Lines of Code

The importance of documenting things All decisions should be documented, because otherwise:

There was nothing explaining what was the reason of it. No comments explaining why I wrote the code. It was not mentioned in the documentation. When the colleague asked me about it, I could not explain it, because I had already forgotten everything.


Architectural

Bryan Cantrill on Jails and Solaris Zones I don't use FreeBSD or SmartOS, but thoroughly enjoyed this talk. It's smart, funny, and a thorough analysis of how research papers are written.

Simple Mechanical Systems vs Intractable Complex Technosocial Systems How is a software system like a frog, and not like a bicycle.

The million dollar engineering problem Identifying and cutting down the big AWS spends.


Peopleware

Tess Rinearson "someone needs to tell silicon valley what "work-life balance" means"


Techtopia

Julia Carrie Wong "do not patronize judge alsup about the the non-linear nature of focal points as a function of distance of an object from the lens" (Alsup learned how to program to preside over Oracle vs Google)

Man Actually Arrested For Assault With A Deadly Tweet "This wasn't just annoying someone with a meme -- it was causing a real physical attack that could have resulted in death. And it was done on purpose. Don't do that."

Meet the Artist Using Ritual Magic to Trap Self-Driving Cars Brilliant.


Locked Doors

Miradore "What computer users see in security warning boxes"

FedEx FedEx offering $5 coupon if you enable Flash, because your security is cool, but not having a modern website is even cooler.

Josh Gondelman "I have encrypted the dog."


None of the Above

How Things Work. "This is how a Leonardo da Vinci Bridge is made"

TV show contestants spend year in wilderness – with no one watching Not The Onion: "Despite the show being taken off air, those still toiling for survival in the wilds … were not informed that their ordeal had not been broadcast since August."

Unclaimed Property Good chance someone owes you money, and here's one site for looking it up (California, other states have their own sites.)

Christian Maioli "When work provides you with a side-quest 🗡🛡"

Why Facts Don’t Change Our Minds Is something we have to reckon with before things get totally out of hand.

Julia Bush

ugh I want a dog but I dont have time to manage its Instagram

Book Review: Seeing Like A State TIL last names and city grids were invented primarily to aide in tax collection.

emery lord

TIERS OF FRIENDSHIP
4- we hang out
3- we can travel together
2- I would take a bullet for you
1- I will speak to you on phone

The Hamilton Hustle "Why liberals have embraced our most dangerously reactionary founder" (but also a fantastic play.)

Antidepressant Pharmacogenomics: Much More Than You Wanted To Know The reason antidepressant don't affect everyone the same way may have to do with how our DNA codes for enzymes.

Sorry for the Delayed Response Me:

Sorry for the delay! I put off answering your e-mail until I had an even more tedious task that I wanted to avoid. Thanks!

Garen J. Torikian "Let's talk about a controversial issue for a moment" is a Twitter thread about attention grabbing Twitter threads.

Canterbury Park Corgi Races 7-30-2016 "There's corgis going left and right, as erratic as loose shopping carts"

Published on

@coderzombie Can't stop laughing.


Design Objective

Steve Sanderson "A heatmap visualisation of where the door handle should be:"

LiquidText Inking The Liquid Text demo video is brilliant. This is one of the most interesting, tech-augmented, user interaction I've seen in a long while. I've yet to figure out how to actually use this app. But this demo video …

PunchesBears ㅎ㉨ㅎ "The new Samurai Jack is like a masters class in color theory."


Tools of the Trade

Learning CSS Grid Layout How to approach learning grid layout. Solving problems that you actually have rather than trying to learn the entire thing at once.

A Complete Guide to CSS Grid Related, guide and reference for CSS Grid.

Jen Simmons CSS Grid vs Flexbox in a nutshell:

My super simple theory at the moment — if you are putting widths on flex items, you are doing it wrong. Use Grid. (Let’s see if that holds.)

The State of Browser Caching, Revisited The difference between specs and reality. Mark Nottingham reviews the current crop of web browsers, which HTTP cache headers they honor, what heuristics they make, how they deal with status codes, etc.

Shell Scripts Matter How to bash like a pro, including linting, unofficial strict mode, testing, logging, and more.

#!/bin/bash
set -euo pipefail  
IFS=$'\n\t'  

Using Node.js to Interact with Facebook's Graph API Facebook's API documentation deals with code that runs in the browser. This article fills the missing pieces, and shows you how to use Facebook's API from Node.

Building an Amazon Alexa Skill with Node.js Looks easy enough: "The only real restrictions are that it must accept POST requests over HTTPS and respond with very specifically organized JSON."

ctop Top-like interface for container metrics.

ken keiter

Your startup either dies, or it lives long enough to use JIRA.

Self-driving cars in the browser "The goal of this project was to create a fully self-learning agent, that would be able to control a car in a 2D bottom-down environment. Written solely in JavaScript."

James Ward

Oh Microsoft Word, I know you're proud of your range of templates but I will only ever require a new blank document. Nothing else.

Seeing Theory A visual introduction to statistics and probability. Beautiful and insightful.

Tim Hopper 🔭 "Naive Bayes"


Lingua Scripta

Cory House

Relevant in an ever growing #JavaScript language:

"We are not paid to use every feature of the language." - Douglas Crockford

Common Async/Await Design Patterns in Node.js Retrying failed requests, iterating over database cursor, and running multiple requests in parallel.

// Don't `await`, instead get a cursor
const cursor = db.collection('Movies').find();  
// Use `next()` and `await` to exhaust the cursor
for (let doc = await cursor.next(); doc != null; doc = await cursor.next()) {  
  console.log(doc.name);
}

Communicating Sequential Processes: an alternative to async generators "In the process, we will also take a look at the ECMAScript proposal that async generators are a part of: asynchronous iteration"

Surprising polymorphism in React applications Even though both objects have the same properties, it matters how they were created.


Lines of Code

daisyowl

if you ever code something that "feels like a hack but it works," just remember that a CPU is literally a rock that we tricked into thinking

Brandon Hays "Oh look it’s one of my old codebases"


Architectural

Complexity and Strategy Concludes:

Determining which components are worth isolating, getting teams to agree and unify on them rather than letting “a thousand flowers bloom” is hard ongoing work. It does not end up looking like a breakthrough — it looks like an engineering team that is just getting things done. That always seemed like a worthy goal to me.

Rod Vagg 🐨 "Rolling your own container orchestration solution"


Peopleware

How should startups think about culture?

Culture is a mirror that reflects back the combined personalities of the people at the company, and so I think the only tool that you have as a founder to define a culture is hiring and firing.

Emily Short

It seems sometimes like 75% of mentoring is telling people that their current challenge is normal and not a sign of personal failing

Sarah Mei

Hi, did you know, English is a mutable language. Definitions of words change over time. We can use the word engineer in a new way!

Andrew Ng

I often advise people to take on projects you're only 70% qualified for, but then learn like crazy to bridge that 30%.

Showerthoughts

Your DNA is just millions of years worth of software updates


Locked Doors

Critical vulnerability in JSON Web Encryption (JWE) - RFC 7516 TL;DR Decryption/Signature verification’ input is always under attacker’s control. Related, JOSE (Javascript Object Signing and Encryption) is a Bad Standard That Everyone Should Avoid.

Virtual machine escape fetches $105,000 at Pwn2Own hacking contest Using JavaScript to achieve code execution inside Microsoft Edge's sandbox, combined with a Windows 10 kernel bug to escape said sandbox, topped with a VMware hardware simulation bug to escape guest OS and compromise the host machine.

We’ve lost control of our personal data (including 33M NetProspex records) I got an alert from ';--have i been pwned?, no acknowledgement from D&B yet. And yes, that's the same D&B that demand you “change your password every 90 days to ensure the security of your account”.

Paul Reinheimer

The more I learn about cryptography, the more I think Alice and Bob should probably just talk in person.

Rob Graham "This is my MacBook login screen, to defend against compelled password disclosure"


Techtopia

Ottawa sex toy maker settles snooping vibrator lawsuit for US$3.75 million The Internet of things that spy on you.

Google Home is playing audio ads for Beauty and the Beast Even Google is ashamed at this turn of events, witness their weasel phrasing: "This isn't an ad; the beauty in the Assistant is that it invites our partners to be our guest and share their tales.”

An artist turned iTunes' 20,000-word terms and conditions into a satirical graphic novel Each page is a different art style, inspired by well known comics. And, of course, the text:

I loved the idea of using a well known text — in its entirety — that everyone has heard about, but very few people have ever actually read. That's something that the Terms share with many classic works of literature.


None of the Above

Woman interrupted during BBC interview Remember BBC dad interview from last week? What might have happened if a mother was interrupted in the same manner?

n-gate.com Jaded reading of Hacker News top posts:

Airbnb raises $1B at $31B valuation, became profitable in 2016 March 10, 2017 (comments)

AirBnB, whose business model is "Uber for toilets," claims it's finally making money, a claim backed up by the fact that it just borrowed another billion dollars. Half of the comments are from people slowly realizing why consumer protection laws exist. The other half are from people trying to figure out what AirBnB is hiding from by not taking the company public.

fiona

i love preparing technical talks, my apartment has never been so clean

Sideways dictionary It's like a dictionary, but using analogies instead of definitions:

HTTPS — It’s like wearing good headphones. So the music is channelled directly to your ears and no one else gets to hear your favorite Nickelback CD.

@tragicgay "Mom, dad,"

Lack of Oxford Comma Could Cost Maine Company Millions in Overtime Dispute "A 29-page court decision handed down on Monday, was an exercise in high-stakes grammar pedantry that could cost a dairy company in Portland, Me., an estimated $10 million."

Tenny Rudolph

my grandma quit her lil side job and her boss said "im gonna need a 2 weeks notice" and she replied "in 2 weeks ur gonna notice im not here"

juno 🐓 "this poor woman is just trying to clean the leaves"

Yes, Your Sleep Schedule Is Making You Sick This article made me a bit dizzy, it's written to confuse. But looks like you can piece useful advice on managing your sleep schedule, especially dealing with jet-lag.

Frankie

Pi Day is just a fake holiday created by math companies to sell more math.

Allison Hughes "In case any of you are wondering what Tinder is like in San Francisco."

Showerthoughts

We live in strange times where phones catch fire and cigarettes are charged

rae paoletta "cats who prove all boxes are cat-sized: a thread"