10 things that graphic designers get stuck with, and 10 books that can help Nice reading list.
Tools of the Trade
livedown Live Markdown previews for your favourite editor. Includes plugins for Vim, Emacs and Sublime.
CSS: The Good Parts A simple style guide that makes a lot of sense.
Why aren’t we using SSH for everything? SSH has authentication and security built in, so why not use it for more applications? Provocative idea: using SSH for chat, DHT, file transfer, even an alternative to HTTP/2.
Terrible choices: MySQL In case you're still debating, here are a few more reasons to reconsider ever using MySQL in production.
A week year is in sync with a WEEK_OF_YEAR cycle I have no idea why we need week-year, I just know to avoid using it in my code. Otherwise, your server thinks Dec 29 2014 is week year 2015 and bugs out like Twitter.
Functional Reactive Programming with the Power of Node.js Streams A brief overview of FRP, and why you want to take a second look at Highland.js.
Symbols in ECMAScript 6 ES6 gets a new primitive type, symbols, with some interesting use cases.
Lines of Code
The Hidden Costs That Engineers Ignore Code, system, product and organizational complexity, and what we can do about them.
What is Apex? Oh joy:
… Using syntax that looks like Java and acts like database stored procedures …
My $2375 Amazon EC2 Mistake Don't check your AWS keys into Github:
Amazon AWS customer support informed me this happens a lot recently, hackers have created an algorithm that searches GitHub 24 hours per day for API keys. Once it finds one it spins up max instances of EC2 servers to farm itself bitcoins.
HSTS Super Cookies Interesting way in which HSTS can be used as fingerprint, identify your browser even in incognito mode, and some browsers won't let you delete this "cookie".
Cellular Privacy, #SS7 Security Shattered at #31C3 Turns out it's all too easy to evesdrop on cell phones and intercept text messages:
The maligned SS7 protocol was designed in the 1980s, long before mainstream cellular use, and security and privacy shortcomings have not kept up with the times, Engel said.
Prying Eyes: Inside the NSA's War on Internet Security
None of the Above
Full Body Workout Every Other Day? I forget, is a week 7 or 8 days long?
How to completely remove Birthdays from Google Calendar Google did a wonderful job of burying this feature in their UI.
Wat HiFi? Audiophile pseudoscience collected for your enjoyment. Learn all about the benefits of demagnetizing CDs and which SSD will make your music sound better.
Robots are starting to break the law and nobody knows what to do about it What happens when a piece of software goes on the dark web and orders ecstasy pills and a fake password: who's liable?
Many recalled vehicles do not get repaired, posing a safety risk
recalls How GM and other automakers use big data and creepy adtech to … save lives:
Acxiom then used the information to post messages on how to get the car repaired on the individual's Facebook page or while they were playing online games such as Candy Crush Saga or Words with Friends, Carney said.
A Poor Imitation of Alan Turing If you enjoyed the movie, don't forget that it's only based on a true story.
I'm sure my petrol cap was on this side I also have days like this.