The Shocking Meltdown of Ample Hills — Brooklyn’s Hottest Ice Cream Company
https://marker.medium.com/the-shocking-meltdown-of-ample-hills-brooklyns-hottest-ice-cream-company-66b27dc1791d [marker.medium.com]
2021-02-05 02:51
tags:
business
food
nyc
They had $19 million, a deal with Disney, and dreams of becoming the next Ben & Jerry’s. Then everything fell apart.
source: ML
The Emojiency
https://twitter.com/chaosprime/status/1119783694611488768 [twitter.com]
2019-04-25 02:38
tags:
development
git
swtools
text
turtles
tweet
last week i got to witness an engineering department lose a full day’s work because if you put an emoji in a git commit message, Atlassian Bamboo chokes on it forever and you’re forced to rebase master, like you should NEVER DO.
source: grugq
What’s the difference between the zero width non-joiner and the zero width space?
https://blogs.msdn.microsoft.com/oldnewthing/20180214-00/?p=98016 [blogs.msdn.microsoft.com]
2018-02-22 17:39
tags:
language
text
Well, one of them is a space, and the other one isn’t.
The Wonderful WiFi232: BBSing Has (Literally) Never Been Easier
http://www.bytecellar.com/2017/05/30/the-wonderful-wifi232-bbsing-has-literally-never-been-easier/ [www.bytecellar.com]
2017-06-05 16:44
tags:
hardware
networking
retro
solder
wifi
The purpose of the device is to act as a bridge between your serial port and your local WiFi router. It has a 25-pin RS-232 data interface and a Mini-USB connector for power — it should work with any computer sporting a standard serial port.
source: L
Accidentally Quadratic - rust hash iteration and reinsertion
http://accidentallyquadratic.tumblr.com/post/153545455987/rust-hash-iteration-reinsertion [accidentallyquadratic.tumblr.com]
2016-11-25 20:18
tags:
bugfix
compsci
hash
investigation
perf
rust
Not just accidentally, but quite unexpectedly. Great explanation of hashing details.
How the Chili Dog Transcended America's Divisions
https://www.theatlantic.com/technology/archive/2017/03/chili-dog-melting-pot/518202/ [www.theatlantic.com]
2017-03-07 05:42
tags:
food
history
hoipolloi
In the span of about a hundred years, America turned a German sausage into a hot dog and turned Mexican chili con carne and Greek saltsa kima into chili, and then repackaged the whole thing as a cheap, distinctly American dish.
Zeroing out memory does cause it to page faster
https://blogs.msdn.microsoft.com/oldnewthing/20161109-00/?p=94675 [blogs.msdn.microsoft.com]
2016-11-10 22:00
tags:
factcheck
perf
systems
windows
Data Viz Project
http://datavizproject.com/ [datavizproject.com]
2017-11-01 14:22
tags:
academia
archive
graphics
reference
visualization
one of every visualization.
source: grugq
Richard Feynman and The Connection Machine
http://longnow.org/essays/richard-feynman-connection-machine/ [longnow.org]
2016-11-05 02:52
tags:
article
compsci
hardware
life
math
retro
science
What happens when you hire a famous physicist to work on your super parallel computer, as a summer intern no less?
Feynman’s router equations were in terms of variables representing continuous quantities such as “the average number of 1 bits in a message address.” I was much more accustomed to seeing analysis in terms of inductive proof and case analysis than taking the derivative of “the number of 1’s” with respect to time.
Explaining Code using ASCII Art
https://blog.regehr.org/archives/1653 [blog.regehr.org]
2019-02-18 19:01
tags:
archive
development
docs
text
visualization
People tend to be visual: we use pictures to understand problems. Mainstream programming languages, on the other hand, operate in an almost completely different kind of abstract space, leaving a big gap between programs and pictures. This piece is about pictures drawn using a text character set and then embedded in source code. I love these! The other day I asked around on Twitter for more examples and the responses far exceeded expectations (thanks everyone!). There are a ton of great examples in the thread; here I’ve categorized a few of them. Click on images go to the repositories.
Let’s talk about Javascript string encoding
https://kev.inburke.com/kevin/node-js-string-encoding/ [kev.inburke.com]
2017-09-03 17:43
tags:
javascript
programming
web
This is all massively inefficient, of course.
source: HN
Replacing phys segment array with rbtree
http://fraggerfox.homenet.org:10080/bsd-blog/2016/09/hello-rb-tree-my-old-friend.html [fraggerfox.homenet.org:10080]
2017-01-01 21:46
tags:
c
compsci
malloc
netbsd
perf
programming
systems
Adding Derogatory Caption to Photo Meme Can Be False Light
http://blog.ericgoldman.org/archives/2016/11/adding-derogatory-caption-to-photo-meme-can-be-false-light-s-e-v-chmerkovskiy.htm [blog.ericgoldman.org]
2016-11-26 21:00
tags:
policy
social
Writing More Legible SQL
http://www.craigkerstiens.com/2016/01/08/writing-better-sql/ [www.craigkerstiens.com]
2017-02-17 18:50
tags:
database
development
intro-programming
sql
Browser Side Channels
https://github.com/xsleaks/xsleaks/wiki/Browser-Side-Channels [github.com]
2019-03-19 00:34
tags:
browser
reference
security
sidechannel
web
Well-known DOM APIs
Only a few dozen issues.
source: grugq
What’s new in Windows Build 14971
https://blogs.windows.com/windowsexperience/2016/11/17/announcing-windows-10-insider-preview-build-14971-for-pc/ [blogs.windows.com]
2016-11-18 19:16
tags:
release
windows
PowerShell is the one true shell. Plus more.
Zeronights 2016 Presentations
https://2016.zeronights.org/conference-materials/presentations/ [2016.zeronights.org]
2016-12-23 18:11
tags:
archive
auth
crypto
defense
exploit
fuzzing
pdf
security
slides
swtools
systems
Lots of good talks.
via @solardiz
security things in Linux v5.2
https://outflux.net/blog/archives/2019/07/17/security-things-in-linux-v5-2/ [outflux.net]
2019-07-18 19:17
tags:
defense
development
linux
malloc
security
update
page allocator freelist randomization
And some other things as well.
What The Hellmann
https://tedium.co/2017/12/14/condiment-sauces-history/ [tedium.co]
2017-12-17 21:44
tags:
food
The hidden stories behind some of the sauces you eat every single day, from a confessed overuser of sauce. You are entitled to a little more, by the way.
Don’t miss the link to the 200 page history of Worcestershire sauce: http://www.soyinfocenter.com/pdf/152/Worc.pdf
Counterintelligence for Cyber Defence
https://medium.com/@thegrugq/counterintelligence-for-cyber-defence-97d33503064d [medium.com]
2017-09-20 03:29
tags:
defense
development
opsec
security
Fundamentally for defenders, the truly effective techniques, the ones that work, are same ones that have always worked (and are so seldom implemented): network segmentation, patching, asset management, credential management, minimising trust relationships, least privilege, vigilant monitoring of long tail rare events, etc. etc.
source: grugq