What you see here are Hacker News front page posts with a list of URLs found in the comments of each post. Down below is a categorized list of URLs.

The list was last updated on 09/21/20 18:30:24 UTC. Improvement ideas welcome.
Microsoft to acquire ZeniMax Media and Bethesda Softworks for $7.5B (bethesda.net)
Diabotical (www.diabotical.com)
The fast-paced multiplayer Arena FPS set in a colourful robot-universe developed by former Quake and Esport professionals.
Twitch (www.twitch.tv)
Twitch is the world's leading video platform and community for gamers.
Godot Engine - Free and open source 2D and 3D game engine (godotengine.org)
$15,000.00
ILM reveals how it used Unreal Engine for ‘The Mandalorian’ (venturebeat.com)
ILM used Epic Games' Unreal Engine to create virtual sets for 'The Mandalorian.' This enables filmmakers to capture visual effects in camera.
List of Unreal Engine games - Wikipedia (en.wikipedia.org)
Build your game in Unity  |  Android Developers (developer.android.com)
Quickstart for Android  |  ARCore  |  Google Developers (developers.google.com)
Unity Production-Ready Support for Stadia Now Available (stadia.dev)
Unity development overview - Mixed Reality (docs.microsoft.com)
Getting started building mixed reality apps in Unity.
‘Elder Scrolls Online’ Is ‘Still Growing, Not Slowing Down’ With Over 15 Million Players (www.forbes.com)
Elder Scrolls Online is still incredibly popular and continues to keep growing as one of the biggest and most successful MMOs on the market, now with over 15 million players.
List of best-selling video games - Wikipedia (en.wikipedia.org)
Minecraft's console versions have now outsold Minecraft on PC, Mac (www.eurogamer.net)
Todd Howard On Joining Xbox (bethesda.net)
I have had the pleasure of working with, and partnering with, many of the best gaming and tech companies in the world. But our longest, and closest partner during my career, has been Microsoft.
The Fall of 76 (www.youtube.com)
Bunker down and pray for updates. Get Curiosity Stream if you know what's good for you. http://www.curiositystream.com/internethistorian The first month free...
Dota 2 - Steam Charts (steamcharts.com)
Counter-Strike: Global Offensive - Steam Charts (steamcharts.com)
MSX - Wikipedia (en.wikipedia.org)
MSX is a standardized home computer architecture, announced by Microsoft and ASCII on June 16, 1983.[1][2] It was initially conceived by Microsoft as a product for the Eastern sector, and jointly marketed by Kazuhiko Nishi, then vice-president at Microsoft and director at ASCII Corporation.[3] Microsoft and Nishi conceived the project as an attempt to create unified standards among various home computing system manufacturers of the period, in the...
Isao Okawa, 74, Chief of Sega And Pioneer Investor in Japan (www.nytimes.com)
Isao Okawa, head of Sega Corp and pioneer investor in Japan, dies at age 74; photo (M)
Retroid Pocket 2 - Handheld Retro Gaming System (www.goretroid.com)
Hey, Our first batch of pre-sales will end at 11:59 today (2020.8.29). And all the first batch of pre-sale orders will be shipped from 8/28 according to the payment time. Now all the colors include new colors and orders from 0:00 in 8/30 (Beijing time) will belong the second batch of pre-sales. The estimated delivery t
Best Kid-friendly Super Nintendo Games - SNESdrunk (www.youtube.com)
DariaPlaysRPGs video on kid-friendly NES games: https://youtu.be/3dmF3FbZwlQ Merry Christmas! Games covered: [1:25] Mario Paint [2:13] Tetris & Dr Mario [2:4...
5 NES Games for Little Kids (www.youtube.com)
This is a list of 5 NES and Famicom titles perfect for younger gamers just starting out. My son and I picked out 5 low stress titles that presented challenge...
Nintendo, Disney, and Cultural Determinism — MatthewBall.vc (www.matthewball.vc)
An essay on what Nintendo does and doesn’t want to be, why, and what this means for its future
Facebook Connect: John Carmack Unscripted Live Keynote (Quest 2 & Future VR Headsets) (www.youtube.com)
We restreamed a direct feed of the Facebook Connect presentation offered by John Carmack at 5:30PM PT on Sept. 16, 2020. John Carmack, the Consulting CTO for...
ZeniMax v. Oculus - Wikipedia (en.wikipedia.org)
ZeniMax v. Oculus is a civil lawsuit filed by ZeniMax Media against Oculus VR on charges of theft of intellectual property relating to Oculus' virtual reality device, the Oculus Rift. The matter was settled with a private out-of-court agreement by December 2018.[1]
Here's Where Facebook "Guaranteed" Users Would Never Need a Facebook Account to Use Oculus Headsets (www.roadtovr.com)
If you wondered why yesterday’s news stirred such a significant reaction from the VR community at large, it’s not just because Facebook doesn’t have a stellar reputation on privacy, it’s also because the company specifically promised it wouldn’t force users to log-in with a Facebook account to use their Oculus headset. Let’s set the stage …
Our Incredible Journey (ourincrediblejourney.tumblr.com)
Putting the ack! in acquihire
Bungie - Wikipedia (en.wikipedia.org)
Buy The Outer Worlds: Peril on Gorgon - Microsoft Store (www.microsoft.com)
The Outer Worlds: Peril on Gorgon is the first narrative expansion to the award-winning RPG from Obsidian Entertainment and Private Division. Discover a lawless den of monsters and marauders on the Gorgon Asteroid and uncover an intrigue that will change the Halcyon colony forever.
Netflix vs. the World (2019) - IMDb (www.imdb.com)
Directed by Shawn Cauthen. With Didier Allouch, John Antioco, Corey Bridges, Derek Cecil. The story of how a tiny, broke Silicon Valley startup slew giants of the movie rental world, warded off Amazon and forced movie making and distribution into the digital age.
Demolition Man (1993) - IMDb (www.imdb.com)
Demolition Man (1993) on IMDb: Movies, TV, Celebs, and more...
The History of Bethesda Game Studios (www.youtube.com)
Embark on a quest through the history of The Elder Scrolls and Fallout. With insight into the development of everything from Arena to Fallout 4, Noclip takes...
Bethesda Softworks - Wikipedia (en.wikipedia.org)
Carmack: Direct3D is now better than OpenGL | bit-tech.net (www.bit-tech.net)
Co-founder of id Software reveals that 'inertia' is the main reason why id has stuck by OpenGL.
I Figured Out WHY Bethesda Got So GREEDY (www.youtube.com)
Bethesda and their subsidiaries have grown excessively greedy over the last 3 years. Everything from the Creation Club to their steps into the mobile market ...
Microsoft buys ZeniMax Media and The Elder Scrolls dev Bethesda for $7.5 billion (www.gamasutra.com)
Microsoft is moving to acquire Bethesda Softworks parent company ZeniMax Media for $7.5 billion in cash. 
Level 69: The Next Generation of Strategy (pausebutton.substack.com)
Playstation 5 vs Xbox: Series X, Facebook's VR Vision, Some Free Money, and a Virtual Streaming Avatar
Cobaul: A COBOL to WebAssembly Compiler (github.com)
Homepage - Deskware (deskware.com)
CobolScript - Wikipedia (en.wikipedia.org)
CobolScript is a programming language created by Matthew Dean and Charles Schereda of Deskware in 1999.[1] The language was intended to provide web-enabled COBOL, and was targeted at businesses using legacy software written in that language.[1] [2]
New language speaks up to help solve an old problem - 1999-11-29 - The Business Journal of Tampa Bay (web.archive.org)
Tampa software firm DeskWare Inc. (http://www.deskware.com) has launched a new language that Web-enables COBOL (Common Business-Oriented Language).
Cloudflare Workers Now Support COBOL (blog.cloudflare.com)
COBOL is often a source of amusement for programmers because it is seen as old, verbose, clunky, and difficult to maintain. COBOL can now be used to write code for Cloudflare’s serverless platform Workers.
Cloudflare Workers Announces Broad Language Support (blog.cloudflare.com)
Today, we’re excited to announce support for Python, Scala, Kotlin, Reason and Dart. You can build applications on Cloudflare Workers using your favorite language starting today.
COBOL Programming | Visual COBOL | Micro Focus (www.microfocus.com)
Visual COBOL provides COBOL development and integration tools in your choice of Visual Studio or Eclipse that help AppDev teams deliver new functionality. Learn more today.
I asked an online tracking company for all of my data (2018) (privacyinternational.org)
Data Subject Rights | Quantcast (www.quantcast.com)
Your browser settings or adbocker may be blocking the loading of our data rights request web form. If you would like to access the web form, please adjust your configuration.
Quantcast Privacy Policy | Quantcast (www.quantcast.com)
Learn about the Quantcast Privacy Policy and our commitment to protecting your data, brand safety and brand safe advertising.
PrivicyPal (www.privicy.com)
Your personal data, under your control, for your benefit.
Welcome to Proximus – Internet, mobile, phone and TV (www.proximus.be)
Proximus offers you the best quality network and wide mobile coverage within Belgium. You’ll also benefit from a top-quality 24/7 service!
Cookie Consent Manager - Take control of managing cookie consent compliance. (trustarc.com)
Cookies help your customers have a more enjoyable experience by helping them do everything from remembering passwords to suggesting products they may enjoy. Cookies also help companies with website analysis and managing behavioral advertising programs. However, laws such as GDPR, CCPA, and ePrivacy, among other forthcoming legislation, have specific requirements around how companies may use cookies.
DER SPIEGEL | Online-Nachrichten (www.spiegel.de)
Deutschlands führende Nachrichtenseite. Alles Wichtige aus Politik, Wirtschaft, Sport, Kultur, Wissenschaft, Technik und mehr.
imgur.com (imgur.com)
Imgur: The magic of the Internet
What are the GDPR consent requirements? - GDPR.eu (gdpr.eu)
One easy way to avoid large GDPR fines is to always get permission from your users before using their personal data. This article explains the GDPR consent requirements to help you comply.
InteractiveAdvertisingBureau/GDPR-Transparency-and-Consent-Framework (github.com)
Technical specifications for IAB Europe Transparency and Consent Framework that will help the digital advertising industry interpret and comply with EU rules on data protection and privacy - notabl...
Data Companies Are Watching Me (duo.com)
Every day, code embedded in mobile applications silently collects the location of hundreds of millions of unsuspecting users. This data is purchased by location data brokers who use it to offer marketing analytics, provide targeted advertisements, or simply resell access to the data to other companies. In this post, I’ll show how I requested my data from these location data brokers, detail what information I received, and talk through why the exi...
jmdugan/blocklists (github.com)
Shared lists of problem domains people may want to block with hosts files - jmdugan/blocklists
Using a Hosts File To Make The Internet Not Suck (as much) (someonewhocares.org)
Instructions on how to use a hosts file to avoid viewing ads and to make your internet experience more pleasant.
Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist (github.com)
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad w...
NextDNS (nextdns.io)
The next-generation DNS service.
uBlock Origin – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download uBlock Origin for Firefox. Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory.
New Steve Jobs recordings from the '80s released (www.sfgate.com)
Apple WWDC 1997 Closing Keynote - Fireside Chat with Steve Jobs : Free Download, Borrow, and Streaming : Internet Archive (archive.org)
Steve Jobs’ famous “Fireside Chat”, taking place on the last day of WWDC ’97, just before the closing keynote.Captured from VHS by Jason Molenda
Steve Jobs Insult Response - Highest Quality (www.youtube.com)
Steve Jobs handling a tough question at the 1997 Worldwide Developer Conference. He had just returned to Apple as an advisor and was guiding sweeping change ...
Macworld Boston 1997-The Microsoft Deal (www.youtube.com)
Here we see Steve Jobs & the almost bankrupt at the time Apple Computer making a temporary deal with Bill Gates & Microsoft. The crowd was not too happy abou...
Home | all about Steve Jobs.com (allaboutstevejobs.com)
The Powersharing Series (soundcloud.com)
Selected clips from Charles Mannâs Powersharing Series, a collection of recordings of computing pioneers made between 1982-1991. Copyright © Powersharing, Inc. and used with permission. All rights res
This unheard Steve Jobs tape is part of an amazing trove of tech history (www.fastcompany.com)
When Steve Jobs demoed his NeXT computer at a 1988 user meeting, Charles Mann was there to record it—along with dozens of other talks by computing pioneers.
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
imgur.com (imgur.com)
Imgur: The magic of the Internet
Was Steve Jobs technical? - Quora (www.quora.com)
When he was quite young, 18 or so, he worked for Atari. He was valuable enough to not get fired even when nobody wanted to work with him, (because of how he smelled), as he thought veganism was so pure, (hippy bullshit), that he would not smell ba...
How did Steve Jobs thrive in a technical field with a non-technical background? - Quora (www.quora.com)
I was always very impressed with Steve’s technical knowledge and ability to understand technical issues. A good example of this was when my team created the built in iSight camera. We had to replace the external iSight camera that was a CCD imager...
Things we learned running Postgres 13 (pganalyze.com)
Is revenue model more important than culture? (somehowmanage.com)
Betteridge's law of headlines - Wikipedia (en.wikipedia.org)
Betteridge's law of headlines is an adage that states: "Any headline that ends in a question mark can be answered by the word no." It is named after Ian Betteridge, a British technology journalist who wrote about it in 2009, although the principle is much older.[1][2] Like similar "laws" (e.g., Murphy's law), it is intended to be humorous rather than the literal truth.[3][failed verification] The adage fails to make sense with questions that are...
Wikipedia talk:Wikipedia is an MMORPG - Wikipedia (en.wikipedia.org)
I like it, insightful enough for me to not VfD it even though it doesn't really belong. --Alex Krupp 23:38, Oct 3, 2004 (UTC)
Betteridge's law of headlines - Wikipedia (en.wikipedia.org)
Betteridge's law of headlines is an adage that states: "Any headline that ends in a question mark can be answered by the word no." It is named after Ian Betteridge, a British technology journalist who wrote about it in 2009, although the principle is much older.[1][2] Like similar "laws" (e.g., Murphy's law), it is intended to be humorous rather than the literal truth.[3][failed verification] The adage fails to make sense with questions that are...
Signposts for “when to hire more QA testers” (www.functionize.com)
OneSignal (Messaging and Push Notification APIs) is hiring a data engineer (onesignal.com)
Moving your SSH port isn’t security by obscurity (danielmiessler.com)
Defense in depth (computing) - Wikipedia (en.wikipedia.org)
Defense in depth is a concept used in Information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical security for the duration of the system's life cycle.
OpenBSD PF: Packet Filtering (www.openbsd.org)
Where to find sshd logs on MacOS sierra (stackoverflow.com)
I want to install Pseudo-Distributed HBase environment on my Mac OS Sierra (10.12.4), and it requires ssh installed and can log with ssh localhost without password. But sometimes I came across with...
Endlessh: an SSH Tarpit (nullprogram.com)
All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved.
Inter-protocol exploitation - Wikipedia (en.wikipedia.org)
Inter-protocol exploitation is a class of security vulnerabilities that takes advantage of interactions between two communication protocols,[1] for example the protocols used in the Internet. It is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP).[2] This attack uses the potential of the two different protocols meaningfully communicating commands and data.
Mozilla Port Blocking (www-archive.mozilla.org)
On 08/15/2001, Cert issued a Vulnerability Note VU#476267 for a "Cross-Protocol" scripting attack, known as the HTML Form Protocol Attack which allowed sending arbitrary data to most TCP ports. A simple exploit of this hole allows an attacker to send forged unsigned mail through a mail server behind your firewall: A really nasty hole.
moxie0/knockknock (github.com)
A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface. - moxie0/knockknock
skeeto/endlessh (github.com)
SSH tarpit that slowly sends an endless banner. Contribute to skeeto/endlessh development by creating an account on GitHub.
robertdavidgraham/masscan (github.com)
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. - robertdavidgraham/masscan
Port knocking - Wikipedia (en.wikipedia.org)
In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is nee...
S/KEY - Wikipedia (en.wikipedia.org)
S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password. A user's real password is combined in an offline device with a short set of characters and a decrementing counter to form a single-use password. Because each password is only used once, they are useless to password sniffers.
John Cleese Discusses Creativity, Monty Python, and Artichokes (www.newyorker.com)
John Cleese on Creativity In Management (www.youtube.com)
Browse more videos from the famous John Cleese training company: www.videoarts.com In this lecture-style presentation, John Cleese claims that creativity is ...
Creativity by John Cleese: 9780385348270 | PenguinRandomHouse.com: Books (www.penguinrandomhouse.com)
The legendary comedian, actor, and writer of Monty Python, Fawlty Towers, and A Fish Called Wanda fame shares his key ideas about creativity: that it’s a learnable, improvable skill....
Why are Amnesty International monitors not able to observe the Assange hearing? (www.amnesty.org)
JohnPilger.com - the films and journalism of John Pilger (johnpilger.com)
JohnPilger.com - the films and journalism of John Pilger
US sanctions staff at top war crimes court (www.bbc.com)
The chief prosecutor at the Hague-based ICC, Fatou Bensouda, is among those sanctioned.
WikiLeaks Founder Charged in Superseding Indictment (www.justice.gov)
A federal grand jury returned a second superseding indictment today charging Julian P. Assange, the founder of WikiLeaks, with offenses that relate to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States.
Here’s How The U.S. Claims The Assange-Manning Conspiracy Worked (www.forbes.com)
Assange is accused of helping Chelsea Manning crack a password for Windows PCs she had access to in Iraq. Just how does the government believe they planned to do it?
Vivek Chibber - Capitalism and the State (www.youtube.com)
Vivek Chibber, Professor of Sociology at New York University, presented this lecture, "Capitalism and the State", as part of a Brecht Forum program at the Ne...
Tory donor linked to $8m Putin ally funding (www.bbc.co.uk)
Leaked files show Lubov Chernukhin's husband was secretly funded by a Russian oligarch.
BBC Newsnight editor accused of ‘off the scale’ bias after New Statesman cover story (www.theweek.co.uk)
Policy editor Lewis Goodall attacked for article on the exam grading mayhem
Emily Maitlis praised for summing up Dominic Cummings controversy in one minute Newsnight opener (www.independent.co.uk)
‘He made those who struggled to keep to the rules feel like fools,’ presenter says
BBC appoints insider Tim Davie as director general (www.theguardian.com)
BBC Studios chief accepts pay cut as he is picked to succeed Tony Hall at critical juncture
The plot to stop James Purnell becoming director-general of the BBC | The Spectator (www.spectator.co.uk)
In case you were in any doubt, the Prime Minister and his chief aide, Dominic Cummings, more than give a damn about who runs the BBC and intend to have a significant influence over the appointment of a new director-general. The current chairman of the BBC board, David Clementi, showed acute politica...
David Kelly (weapons expert) - Wikipedia (en.wikipedia.org)
Assange in dock as extradition hearing resumes (www.bbc.com)
The 49-year-old faces 18 charges, including an alleged plot to hack computers and obtain US documents.
Julian Assange (apnews.com)
News from The Associated Press, the definitive source for independent journalism from every corner of the globe.
New labels for government and state-affiliated media accounts (blog.twitter.com)
Weâre expanding the type of accounts we label to include official government and state-affiliated media.
CIA Torture Survivor Khaled El Masri Backs Assange At Extradition Trial (shadowproof.com)
Khaled El Masri, a survivor of CIA torture and detention, indicated support for WikiLeaks founder Julian Assange during extradition trial.
Your Man in the Public Gallery: the Assange Hearing Day 6 - Craig Murray (www.craigmurray.org.uk)
I went to the Old Bailey today expecting to be awed by the majesty of the law, and left revolted by the sordid administration of injustice. There is a romance which attaches to the Old Bailey. The name of course means fortified enclosure and it occupies a millennia old footprint on the edge of London’s […]
Uncategorized Archives - Craig Murray (www.craigmurray.org.uk)
Craig Murray - RationalWiki (rationalwiki.org)
Craig Murray (1958–) is a former British diplomat and current writer who is considered by some an expert on international affairs but is considered by others a conspiracy theorist with traces of antisemitism. He writes mainly on his own blog at CraigMurray.com but also for other fringe publications such as The Truth Seeker, and has published a memoir, Murder in Samarkand (2006).[1][2] This book was adapted by David Hare for BBC Radio Four, starri...
Spy games: Inside the convoluted plot to bring down WikiLeaks (arstechnica.com)
The CEO of security firm HBGary Federal had big plans for helping a US bank …
Wherein WikiLeaks Brags about Entertaining a Pardon Dangle from a Suspected Russian Asset and a White Supremacist | emptywheel (www.emptywheel.net)
For some reason, Julian Assange's lawyer thought it would help his case to testify about just one of the four pardon pitches -- all involving Russia -- made for Julian Assange since he helped authoritarian Donald Trump become President.
Pentagon Papers Whistleblower Dismantles Myths Around Assange (shadowproof.com)
Pentagon Papers whistleblower Daniel Ellsberg dismantled myths around Julian Assange and WikiLeaks during extradition trial.
Your Man in the Public Gallery: Assange Hearing Day 11 - Craig Murray (www.craigmurray.org.uk)
Yet another shocking example of abuse of court procedure unfolded on Wednesday. James Lewis QC for the prosecution had been permitted gratuitously to read to two previous witnesses with zero connection to this claim, an extract from a book by Luke Harding and David Leigh in which Harding claims that at a dinner at El […]
Vis Timeline Examples (visjs.github.io)
Craig Murray (www.craigmurray.org.uk)
Welcome to the thoughts of Craig Murray - Historian, Former Diplomat, Human Rights Activist and Blogger
«Ein mörderisches System»: Konstruierte Vergewaltigung, manipulierte Beweise (www.republik.ch)
Erstmals spricht Nils Melzer, Uno-Sonderberichterstatter für Folter, ausführlich über seine Untersuchungen im Fall Julian Assange. Und legt brisante Dokumente vor.
Assange v Swedish Prosecution Authority - Wikipedia (en.wikipedia.org)
Assange v The Swedish Prosecution Authority were the set of legal proceedings in the United Kingdom concerning the requested extradition of Julian Assange to Sweden to further a 'preliminary investigation'[1] into accusations of his having committed sexual offences. The proceedings began in 2012 and on 12 August 2015, Swedish prosecutors announced that they would drop their investigation into three of the allegations against Assange, because of t...
Assange v Swedish Prosecution Authority [2011] EWHC 2849 (Admin) (02 November 2011) (www.bailii.org)
[New search] [Printable PDF version] [Help] Neutral Citation Number: [2011] EWHC 2849 (Admin) Case No: C0/1925/2011 IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION DIVISIONAL COURT Royal Courts of Justice Strand, London, WC2A 2LL 2 November 2011 B e f o r e : THE PRESIDENT OF THE QUEEN'S BENCH DIVISION (SIR JOHN THOMAS)andMR JUSTICE OUSELEY ____________________ Between: Julian Assange Appe...
The War Logs - WikiLeaks Documents (archive.nytimes.com)
Good Ellsberg, Bad Assange: At Extradition Trial, Pentagon Papers Whistleblower Dismantles False Narrative (dissenter.substack.com)
Ellsberg also said "Julian Assange could not get a remotely fair trial" in the United States.
How to Make Biomass Energy Sustainable Again (www.lowtechmagazine.com)
Comparison of Biomass and Solar Energy Yields - Open Source Ecology (wiki.opensourceecology.org)
These are very important calculations. More below.
Biomass and land use – biofuelwatch (www.biofuelwatch.org.uk)
How much more land do we need for energy from biomass compared to solar PV?
Companies can track your phone’s movements to target ads (arstechnica.com)
Babel Street (www.babelstreet.com)
Locate open source information utilizing enhanced data offerings within the platform
Google Search Console (accounts.google.com)
Use Search Console to monitor Google Search results data for your properties.
Extreme Privacy by Michael Bazzell (inteltechniques.com)
Open Source Intelligence OSINT Training by Michael Bazzell
Releases · AdAway/AdAway (github.com)
AdAway is an open source ad blocker for Android using the hosts file. - AdAway/AdAway
DNSfilter | F-Droid - Free and Open Source Android App Repository (f-droid.org)
© 2010-2020 F-Droid Limited and Contributors
DNS66 | F-Droid - Free and Open Source Android App Repository (f-droid.org)
© 2010-2020 F-Droid Limited and Contributors
Librem 5 – Purism (shop.puri.sm)
$749.00
iOS vs Android vs Librem 5 -- Which one leaks more data? (www.youtube.com)
A few weeks ago, we tested out three phone platforms (iOS on an iPhone XR, Android on a Nexus 6P, and Linux on the Librem 5 dev kit) to see which one leaks t...
Location Services & Privacy (support.apple.com)
Location Services is designed to protect your information and enable you to choose what you share.
Websites Vary Prices, Deals Based on Users' Information (www.wsj.com)
A Wall Street Journal investigation identified several companies, including Staples, Discover Financial Services, Rosetta Stone and Home Depot, that were consistently adjusting prices and displaying different product offers on their websites based on a range of characteristics that could be discovered about the Internet shopper, such as geographic location.
Dynamic Scoping in C++ (blog.dokucode.de)
4.13 Dynamic Binding: parameterize (docs.racket-lang.org)
Scope (computer science) - Wikipedia (en.wikipedia.org)
In computer programming, the scope of a name binding—an association of a name to an entity, such as a variable—is the part of a program where the name binding is valid, that is where the name can be used to refer to the entity. In other parts of the program the name may refer to a different entity (it may have a different binding), or to nothing at all (it may be unbound). The scope of a name binding is also known as the visibility of an entity, ...
PEP 567 -- Context Variables (www.python.org)
The official home of the Python Programming Language
PEP 568 -- Generator-sensitivity for Context Variables (www.python.org)
The official home of the Python Programming Language
I no longer build software (github.com)
Züri Dësch - The Zurich Table - juricho.me (www.juricho.me)
All About Berlin (allaboutberlin.com)
All About Berlin is a collection of guides and useful resources for English-speaking Berliners. From finding your first apartment to finding English-speaking professionals, we have you covered.
Mobiel bellen in 1998 door Frans Bromet (www.youtube.com)
Frans Bromet interviewde in 1998 verschillende mensen over het nut van een mobiele telefoon.
Of Flying Cars and the Declining Rate of Profit (thebaffler.com)
A secret question hovers over us, a sense of disappointment, a broken promise we were given as children about what our adult world was supposed to be like. I am referring not to the standard false…
priore/SOAPEngine (github.com)
This generic SOAP client allows you to access web services using a your iOS app, Mac OS X app and AppleTV app. - priore/SOAPEngine
Spoiler Test (exanderproject.com)
Haiku (operating system) - Wikipedia (en.m.wikipedia.org)
Haiku is a free and open-source operating system compatible with the now discontinued BeOS. Its development began in 2001, and the operating system became self-hosting in 2008.[5] The first alpha release was made in September 2009, and the last was November 2012; the first beta was released in September 2018 and the second beta was released in June 2020.
TRS-80 Color Computer - Wikipedia (en.wikipedia.org)
The RadioShack TRS-80 Color Computer (later marketed as the Tandy Color Computer and sometimes nicknamed the CoCo) is a line of home computers developed and sold by Tandy Corporation. Despite sharing a name with the earlier TRS-80, the Color Computer is a radical departure with its Motorola 6809E processor rather than a Zilog Z80. The Color Computer line is not compatible with software made for the earlier TRS-80.[1]
TRS-80 Model 100 - Wikipedia (en.wikipedia.org)
Amiga 1000 - Wikipedia (en.wikipedia.org)
Built to Last (logicmag.io)
Don’t blame COBOL. Blame austerity.
Errors from conditional exports after upgraded to Node 13.13 · Issue #32852 · nodejs/node (github.com)
Version: Node.js 13.13 Platform: 19.4.0 Darwin Kernel Version 19.4.0 Subsystem: ES modules What steps will reproduce the bug? npm install @babel/compat-data node -e "require('@babel/compat...
Oil (www.oilshell.org)
Oil is a new Unix shell. It's our upgrade path from bash to a better language and runtime.
Jonathan Blow - Preventing the Collapse of Civilization (English only) (www.youtube.com)
Jonathan's talk from DevGAMM 2019. https://www.youtube.com/c/DevGAMMchannel
The Thirty Million Line Problem (www.youtube.com)
A historical argument for creating a stable instruction set architecture (ISA) for entire system-on-a-chip (SoC) packages. Please note that although it's nev...
being doctor sucks - Google Search (www.google.com)
Being a carpenter sucks! (www.bbcboards.net)
As the title says, I'm so sick of banging nails! I put my application in at lindenwood university here in St. Louis and just got a call from the school saying that I've been accepted!! This is going to be a long road for me, I absolutely hated high school and ended up dropping out sophomore year and getting my GED. After 8 years of manual labor I'm realizing the value of an education and that little paper they give you at the end of your 4 years ...
Why I Don’t Offer Woodworking Business Advice (thewoodwhisperer.com)
I am totally unqualified to dish out woodworking business advice, and here's why!
Long Walk Woodworking LLC (www.longwalkwoodworking.com)
Home (whartonesherickmuseum.org)
Explore the Studio from home The Wharton Esherick Museum is open for tours! We missed sharing Esherick’s Studio with you since our closure began in March and are excited to welcome you back. The museum will be open to the general public for tours beginning September 17, and to
Long Walk Woodworking LLC (www.longwalkwoodworking.com)
An app can be a home-cooked meal (www.robinsloan.com)
I made a messaging app for my family and my family only.
Achievements - Nicolas Bouliane (nicolasbouliane.com)
Unlockable achievements on my website
Russia’s role in producing the taxman of the future (www-ft-com.libezproxy.open.ac.uk)
Aimed at shopkeepers rather than oligarchs, Moscow has technology to record and tax real-time transactions
The Claremont MakerSpace (claremontmakerspace.org)
The Claremont MakerSpace is a community-oriented creative hub, designed to help our members put shape to their ideas. We offer affordable, membership-based access to specialty and hi-tech tools, education, room to work, and a community of like-minded creative people. Building on Claremont’s history of making, we’ve put one of Claremont’s historic mill buildings – The Sawtooth – back into service as a home base for the next generation of innovator...
The Anarchist's Design Book: Expanded Edition (lostartpress.com)
“The Anarchist’s Design Book” explores 18 historic and simple-to-make furniture forms that have been around for almost 1,000 years, yet look shockingly modern. You'll make a bed, dining tables, chairs, chests, desks and shelving as you learn two approaches – "boarded" and "staked" – to build these pieces and more.
Long Walk Woodworking LLC (www.longwalkwoodworking.com)
2020 Biennial Members Exhibition - Fuller Craft Museum (fullercraft.org)
The 2020 Biennial Members Exhibition celebrates the diversity of talents in the museum’s membership base. This biennial exhibition is an important opportunity for young, mid-career, and veteran artists to exhibit their work to the Fuller Craft Museum community. Artists both inside and outside of New England have participated in the past, showcasing stunning works of […]
Eric Diven, "Cabinet on Stand" (interior) (www.flickr.com)
2019 Hickory black walnut and brass Collection of the Artist
3D Project (willadams.gitbook.io)
Joining two or more pieces to create three dimensional parts.
Don't repeat yourself - Wikipedia (en.wikipedia.org)
Don't repeat yourself (DRY, or sometimes do not repeat yourself) is a principle of software development aimed at reducing repetition of software patterns,[1] replacing it with abstractions or using data normalization to avoid redundancy.
Reinventing the wheel - Wikipedia (en.wikipedia.org)
To reinvent the wheel is to duplicate a basic method that has already previously been created or optimized by others.
Rosy retrospection - Wikipedia (en.wikipedia.org)
Rosy retrospection refers to the psychological phenomenon of people sometimes judging the past disproportionately more positively than they judge the present. The Romans occasionally referred to this phenomenon with the Latin phrase "memoria praeteritorum bonorum", which translates into English roughly as "the past is always well remembered".[1] Rosy retrospection is very closely related to the concept of nostalgia. The difference between the ter...
Life is easy. Why do we make it so hard? | Jon Jandai | TEDxDoiSuthep (www.youtube.com)
Never miss a talk! SUBSCRIBE to the TEDx channel: http://bit.ly/1FAg8hB Jon is a farmer from northeastern Thailand. He founded the Pun Pun Center for Self-re...
thecreation/jquery-wizard (github.com)
A powerful jquery plugin for creating step-by-step wizards. Work great with bootstrap. - thecreation/jquery-wizard
The Software Industry Is Broken | Gavin D. Howard (gavinhoward.com)
The incentives in the software industry are all wrong. This is why.
Indie Hackers: Work Together to Build Profitable Online Businesses (www.indiehackers.com)
Connect with developers who are sharing the strategies and revenue numbers behind their companies and side projects.
Show HN: Take timestamped notes while watching YouTube videos (annotate.tv)
Raven Points Chrome Extension - Sparknotes for Youtube (raven-points.herokuapp.com)
Timestamps and summaries for Youtube videos, install the chrome extension.
Annotate.tv Chrome extension demo (www.youtube.com)
Here it's a quick demo showing how you can add a new video to https://annotate.tv with just one click
athensresearch/athens (github.com)
Open-Source Networked Thought. Rolling out our Beta to Sponsors. Read more at https://www.notion.so/athensresearch/MVP-Update-Funding-and-Why-I-Started-Athens-e68822f0c3654660ae621cdcbf932bc4 - ath...
At the International Mathematical Olympiad, Artificial Intelligence Prepares To (www.quantamagazine.org)
Mathematics: our overlooked ability (dselsam.github.io)
Towards Machine Intelligence
IMO Grand Challenge (imo-grand-challenge.github.io)
IMO Grand Challenge for Artificial Intelligence
IMO-grand-challenge/formal-encoding (github.com)
Formal encoding of IMO problems. Contribute to IMO-grand-challenge/formal-encoding development by creating an account on GitHub.
We need young programmers; We need old programmers (blog.ploeh.dk)
Digital Revolution - Wikipedia (en.wikipedia.org)
Digital Revolution - Wikipedia (en.wikipedia.org)
History of personal computers - Wikipedia (en.wikipedia.org)
Social experiment - most people are sheep (www.youtube.com)
hidden camera
Free and Open-Source Projects – The Great Rift Valley Software Company (riftvalleysoftware.com)
globalcitizen/taoup (github.com)
The Tao of Unix Programming (Ruby-powered ANSI colored fortunes) - globalcitizen/taoup
Most successful entrepreneurs are older than you think (theconversation.com)
Most people think of entrepreneurship as a young person's game. But the highest-growth firms in the US come from entrepreneurs who are 45 years old.
The Kivaloo Data Store (www.tarsnap.com)
Update on Mozilla WebThings (discourse.mozilla.org)
thingweb - thingweb (www.thingweb.io)
Thingweb is a runtime and tooling for web technology that enables easy creation of applications for the Internet of Things
Web Thing Protocol Community Group (www.w3.org)
The mission of this group is to define a common protocol for communicating with connected devices over the web, to enable ad-hoc interoperability on the <a rel="nofollow" href="https://www.w3.org/WoT/">Web of Things</a>. Deliverables of the group may include use cases, requirements and specifications. The group will collaborate with the W3C Web of Things Interest Group and Working Group to ensure any specifications complement or extend the ...
Web Thing API (iot.mozilla.org)
Project Connected Home over IP (www.connectedhomeip.com)
Project Connected Home over IP is a new Working Group within the Zigbee Alliance. This Working Group plans to develop and promote the adoption of a new, royalty-free connectivity standard to increase compatibility among smart home products, with security as a fundamental design tenet.
Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources (www.reuters.com)
Apple Inc <AAPL.O> dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters.
HomeKit Accessory Protocol Specification (Non-Commercial Version) - Assistance - Apple Developer (developer.apple.com)
HomeKit Accessory Protocol (HAP) is Appleâs proprietary protocol that enables third-party accessories in the home (e.g., lights, thermostats and door locks) and Apple products to communicate with each other. HAP supports two transports, IP and Bluetooth LE. The information provided in the HomeKit Accessory Protocol Specification (Non-Commercial Version) describes how to implement HAP in an accessory that you create for non-commercial use and th...
How HomeKit's software authentication works (www.imore.com)
With the launch of iOS 11.3, Apple has introduced a new software authentication option for HomeKit accessory manufacturers. What does that mean? It means we could see more HomeKit-enabled accessories hitting the market.
Home Assistant (www.home-assistant.io)
Open source home automation that puts local control and privacy first.
openHAB (www.openhab.org)
openHAB - a vendor and technology agnostic open source automation software for your home
Web of Things (WoT) Thing Description (www.w3.org)
This document describes a formal model and a common representation for a Web of Things (WoT) Thing Description. A Thing Description describes the metadata and interfaces of Things, where a Thing is an abstraction of a physical or virtual entity that provides interactions to and participates in the Web of Things. Thing Descriptions provide a set of interactions based on a small vocabulary that makes it possible both to integrate diverse devices an...
WebThings (github.com)
(formerly Mozilla WebThings). WebThings has 103 repositories available. Follow their code on GitHub.
Mozilla WebThings Gateway Kit – OKdo (www.okdo.com)
This kit contains everything you need to get the Mozilla WebThings Gateway up and running in minutes. Just insert the pre-programmed uSD card, plug in Ethernet or attach via Wi-Fi to your internet modem or Wi-Fi router, and apply power. Quickly configure the privacy and security of your gateway via the GUI which is accessible…
Mozilla cuts 250 jobs, says Firefox development will be affected (arstechnica.com)
Mozilla reduces investment in developer tools and platform feature development.
Home (www.cdc.gov.tw)
Krellian (krellian.com)
Interactive Digital Signage
Tail Recursion and Debugging (2011) (funcall.blogspot.com)
apache/maven-resolver (github.com)
Apache Maven Artifact Resolver. Contribute to apache/maven-resolver development by creating an account on GitHub.
Designed in Minecraft, Built IRL (restofworld.org)
Who first coined the term “Greenhouse Effect”? (2016) (www.easterbrook.ca)
Sktime: A Unified Python Toolbox for Machine Learning with Time Series (github.com)
blue-yonder/tsfresh (github.com)
Automatic extraction of relevant features from time series: - blue-yonder/tsfresh
prostodata/prosto (github.com)
Functions matter! Prosto is a data processing toolkit radically changing how data is processed by relying on both set and function operations. No join-groupby, No map-reduce. - prostodata/prosto
Darts: Time Series Made Easy in Python (medium.com)
Time series simply represent data points over time. They are thus everywhere in nature and in business: temperatures, heartbeats, births…
Markus Loning - Introduction to Machine Learning with Time Series | PyData Fest Amsterdam 2020 (www.youtube.com)
PyData is excited to announce PyData Global, November 11th - 15th! Tickets are now available: https://global.pydata.org/pages/tickets.html#pricing-and-ticket...
Revisiting Apple Notes (6): The Protobuf (ciofecaforensics.com)
python3 script to infer a protobuf definition from a framework or executable. (gist.github.com)
python3 script to infer a protobuf definition from a framework or executable. - framework2proto.py
[MS-CFB]: Compound File Binary File Format (docs.microsoft.com)
Specifies the Compound File Binary File Format, a general-purpose file format that provides a file-system-like structure within a file for the
Padlocks, Phishing and Privacy; the Value Proposition of a VPN (www.troyhunt.com)
IDN Homograph Example (www.xn--80ak6aa92e.com)
This site is obviously not affiliated with Apple, but rather a demonstration of a flaw in the way browsers handle Unicode domains. This is proof-of-concept works in Chrome 58 and earlier along with all versions of Firefox.
Nagle's algorithm - Wikipedia (en.wikipedia.org)
Nagle's algorithm is a means of improving the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network. It was defined by John Nagle while working for Ford Aerospace. It was published in 1984 as a Request for Comments (RFC) with title Congestion Control in IP/TCP Internetworks (see RFC 896).
Exposing and Circumventing China's Censorship of ESNI (geneva.cs.umd.edu)
The Great Firewall (GFW) of China has recently begun blocking ESNIâone of the foundational features of TLS 1.3 and HTTPS. We empirically demonstrate what triggers this censorship and how long residual censorship lasts. We also present several evasion strategies discovered by Geneva that can be run either client-side or server-side to evade blocking.
HTTPS Everywhere (www.eff.org)
HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.
Domain fronting - Wikipedia (en.wikipedia.org)
Domain fronting is a technique for internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.
Boeing whistle-blower says proposed 737 Max fixes aren't enough (www.bloomberg.com)
Regulations.gov (www.regulations.gov)
Pilots Criticize Boeing, Saying 737 Max 'Should Never Have Been Approved' (www.npr.org)
"Sully" Sullenberger, who landed a plane on the Hudson River in 2009, says he understands how the pilots of two jets that crashed would have been confused as they struggled to control the aircraft.
How Deregulation Made Flying More Dangerous | DCReport.org (www.dcreport.org)
How Deregulation made flying more dangerous. The Federal Aviation Agency let Boeing certify the safety of its own planes.
Did Trump Executive Orders Further Weaken FAA Oversight? (www.forbes.com)
The FAA has been mandated to take a more collaborative approach with manufacturers and airlines. Two orders from the president that require the FAA to cut regulations further may have tipped the balance, diminishing FAA authority and focusing it on working against its principal priority on safety.
List of cognitive biases - Wikipedia (en.wikipedia.org)
Cognitive biases are systematic patterns of deviation from norm and/or rationality in judgment. They are often studied in psychology and behavioral economics.[1]
Organization Designation Authorization - Wikipedia (en.wikipedia.org)
The Organization Designation Authorization (ODA) program is the means by which the FAA grants designee authority to organizations or companies. The regulations addressing the ODA program are found in Title 14 of the Code of Federal Regulations (14 CFR) part 183, subpart D, sections 183.41 through 813.67.
How to catch a spy that is using a numbers station – The KGB Experience (www.numbers-stations.com)
Cold war KGB spy cameras sold at auction – in pictures (www.theguardian.com)
A fascinating collection of Russian spy cameras used clandestinely at the height of the cold war have sold for £78,000 at a UK auction
Video camera tube - Wikipedia (en.wikipedia.org)
Video camera tubes were devices based on the cathode ray tube that were used in television cameras to capture television images prior to the introduction of charge-coupled device (CCD) image sensors in the 1980s.[1][2][3] Several different types of tubes were in use from the early 1930s to the 1980s.
Monzy performs at Stanford Univ. (www.youtube.com)
Raw footage of a performance that "CS rapper" Monzy gave last summer outside Stanford University's Computer Science building. This footage was shot for the d...
Why people betray their countries, according to an Israeli expert (www.haaretz.com)
***
Xi Shi - Wikipedia (en.wikipedia.org)
Xi Shi (Hsi Shih; Chinese: 西施; pinyin: Xī Shī; Wade–Giles: Hsi1 Shih1, literally "(Lady) Shi of the West") was, according to legends, one of the renowned Four Beauties of ancient China. She was said to have lived during the end of the Spring and Autumn period in Zhuji, the capital of the ancient State of Yue.
All You Need Is Love (www.theatlantic.com)
How the terrorists stopped terrorism
Junaid Hussain - Wikipedia (en.wikipedia.org)
Junaid Hussain (c. 1994 – 25 August 2015) was a British Pakistani black hat hacker and propagandist under the nom de guerre of Abu Hussain al-Britani who supported the Islamic State of Iraq and the Levant (ISIL).[1] Hussain, who was raised in Birmingham in a family originally from Pakistan, was jailed in 2012 for hacking Tony Blair's accounts and posting his personal information online.[2][3][4][5][6][7][8] Hussain left the UK around 2013 for Syr...
House of Bernadotte - Wikipedia (en.wikipedia.org)
"By the Grace of God King of the Swedes, the Goths and the Wends" (used until 1973)
Doing Business In Japan | Kalzumeus Software (www.kalzumeus.com)
Hershey fonts - Wikipedia (en.wikipedia.org)
The Hershey fonts are a collection of vector fonts developed c. 1967 by Dr. Allen Vincent Hershey at the Naval Weapons Laboratory,[1][2] originally designed to be rendered using vectors on early cathode ray tube displays. Decomposing curves to connected straight lines allowed Hershey to produce complex typographic designs. In their original form the font data consists simply of a series of coordinates, meant to be connected by straight lines on t...
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
TRIGON Numbers Station: The Case of Alexandr Ogorodnik - Numbers Stations Research (www.numbers-stations.com)
by: Māris Goldmanis On 1984 when relations between US and USSR were at their coldest, Soviet television demonstrated a 10 series spy thriller TASS Is Authorized to Declare... (ТАСС уполномочен заявить) it was a highly sophisticated spy movie that showed the struggle between KGB counterintelligence and CIA. The script was based on novel of the same name by Yulian Semyonov the author
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
How The Soviet Union Tracked People With "Spy Dust" (io9.gizmodo.com)
The US started hearing about a substance that could be used to track the movements of any person who touches, or walks across, a contaminated surface. in 1963. It wasn’t until 1984 that they got a sample of the stuff.
Nitrophenyl pentadienal - Wikipedia (en.m.wikipedia.org)
Nitrophenyl pentadienal, nitrophenylpentadienal, NPPD, or METKA (Russian for "mark") colloquially known as "spy dust",[1] is a chemical compound used as a tagging agent by the KGB during the Cold War Soviet Era. Soviet authorities in Moscow tracked Americans by applying an almost invisible powder to their clothing, cars, doorknobs and other objects. Some other variants of "spy dust" may have contained luminol and would glow under ultraviolet li...
IBM 7950 Harvest - Wikipedia (en.wikipedia.org)
The IBM 7950, also known as Harvest, was a one-of-a-kind adjunct to the Stretch computer which was installed at the United States National Security Agency (NSA). Built by IBM, it was delivered in 1962 and operated until 1976, when it was decommissioned. Harvest was designed to be used for cryptanalysis.
weeWX: Stations Running weeWX (weewx.com)
Open source software for your weather station
HVAC - Joe's Datacenter (joesdatacenter.com)

Here are categorized URLs found in the comments of the Hacker News front page posts.
Sites
Diabotical
The fast-paced multiplayer Arena FPS set in a colourful robot-universe developed by former Quake and Esport professionals.
Godot Engine - Free and open source 2D and 3D game engine
$15,000.00
Our Incredible Journey
Putting the ack! in acquihire
Homepage - Deskware
DER SPIEGEL | Online-Nachrichten
Deutschlands führende Nachrichtenseite. Alles Wichtige aus Politik, Wirtschaft, Sport, Kultur, Wissenschaft, Technik und mehr.
NextDNS
The next-generation DNS service.
Home | all about Steve Jobs.com
Siftrics
We offer two services:
Purchasing Power Parity (PPP) API
Free API for Purchasing Power Parity (PPP); making products and services affordable around the world.
JohnPilger.com - the films and journalism of John Pilger
JohnPilger.com - the films and journalism of John Pilger
Craig Murray
Welcome to the thoughts of Craig Murray - Historian, Former Diplomat, Human Rights Activist and Blogger
Babel Street
Locate open source information utilizing enhanced data offerings within the platform
All About Berlin
All About Berlin is a collection of guides and useful resources for English-speaking Berliners. From finding your first apartment to finding English-speaking professionals, we have you covered.
Oil
Oil is a new Unix shell. It's our upgrade path from bash to a better language and runtime.
Home
Explore the Studio from home The Wharton Esherick Museum is open for tours! We missed sharing Esherick’s Studio with you since our closure began in March and are excited to welcome you back. The museum will be open to the general public for tours beginning September 17, and to
The Claremont MakerSpace
The Claremont MakerSpace is a community-oriented creative hub, designed to help our members put shape to their ideas. We offer affordable, membership-based access to specialty and hi-tech tools, education, room to work, and a community of like-minded creative people. Building on Claremont’s history of making, we’ve put one of Claremont’s historic mill buildings – The Sawtooth – back into service as a home base for the next generation of innovator...
Long Walk Woodworking LLC
Indie Hackers: Work Together to Build Profitable Online Businesses
Connect with developers who are sharing the strategies and revenue numbers behind their companies and side projects.
Annotate.tv
Optimize your learning on YouTube. Capture the most important takeaways from any video by taking timestamped notes.
Raven Points Chrome Extension - Sparknotes for Youtube
Timestamps and summaries for Youtube videos, install the chrome extension.
IMO Grand Challenge
IMO Grand Challenge for Artificial Intelligence
thingweb - thingweb
Thingweb is a runtime and tooling for web technology that enables easy creation of applications for the Internet of Things
Project Connected Home over IP
Project Connected Home over IP is a new Working Group within the Zigbee Alliance. This Working Group plans to develop and promote the adoption of a new, royalty-free connectivity standard to increase compatibility among smart home products, with security as a fundamental design tenet.
Home Assistant
Open source home automation that puts local control and privacy first.
openHAB
openHAB - a vendor and technology agnostic open source automation software for your home
Krellian
Interactive Digital Signage
IDN Homograph Example
This site is obviously not affiliated with Apple, but rather a demonstration of a flaw in the way browsers handle Unicode domains. This is proof-of-concept works in Chrome 58 and earlier along with all versions of Firefox.
Repositories
cloudflare/cobaul
COBOL to WebAssembly compiler. Contribute to cloudflare/cobaul development by creating an account on GitHub.
Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad w...
moxie0/knockknock
A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface. - moxie0/knockknock
skeeto/endlessh
SSH tarpit that slowly sends an endless banner. Contribute to skeeto/endlessh development by creating an account on GitHub.
robertdavidgraham/masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. - robertdavidgraham/masscan
priore/SOAPEngine
This generic SOAP client allows you to access web services using a your iOS app, Mac OS X app and AppleTV app. - priore/SOAPEngine
thecreation/jquery-wizard
A powerful jquery plugin for creating step-by-step wizards. Work great with bootstrap. - thecreation/jquery-wizard
athensresearch/athens
Open-Source Networked Thought. Rolling out our Beta to Sponsors. Read more at https://www.notion.so/athensresearch/MVP-Update-Funding-and-Why-I-Started-Athens-e68822f0c3654660ae621cdcbf932bc4 - ath...
globalcitizen/taoup
The Tao of Unix Programming (Ruby-powered ANSI colored fortunes) - globalcitizen/taoup
DanielAdolfsson/ndppd
NDP Proxy Daemon. Contribute to DanielAdolfsson/ndppd development by creating an account on GitHub.
quaintdev/awesome-no-ipv6-websites
A curated list of awesome websites with no ipv6 support - quaintdev/awesome-no-ipv6-websites
alan-turing-institute/sktime
A unified toolbox for machine learning with time series - alan-turing-institute/sktime
blue-yonder/tsfresh
Automatic extraction of relevant features from time series: - blue-yonder/tsfresh
prostodata/prosto
Functions matter! Prosto is a data processing toolkit radically changing how data is processed by relying on both set and function operations. No join-groupby, No map-reduce. - prostodata/prosto
Wiki Articles
List of Unreal Engine games - Wikipedia
List of best-selling video games - Wikipedia
MSX - Wikipedia
MSX is a standardized home computer architecture, announced by Microsoft and ASCII on June 16, 1983.[1][2] It was initially conceived by Microsoft as a product for the Eastern sector, and jointly marketed by Kazuhiko Nishi, then vice-president at Microsoft and director at ASCII Corporation.[3] Microsoft and Nishi conceived the project as an attempt to create unified standards among various home computing system manufacturers of the period, in the...
ZeniMax v. Oculus - Wikipedia
ZeniMax v. Oculus is a civil lawsuit filed by ZeniMax Media against Oculus VR on charges of theft of intellectual property relating to Oculus' virtual reality device, the Oculus Rift. The matter was settled with a private out-of-court agreement by December 2018.[1]
Bungie - Wikipedia
Bethesda Softworks - Wikipedia
CobolScript - Wikipedia
CobolScript is a programming language created by Matthew Dean and Charles Schereda of Deskware in 1999.[1] The language was intended to provide web-enabled COBOL, and was targeted at businesses using legacy software written in that language.[1] [2]
Betteridge's law of headlines - Wikipedia
Betteridge's law of headlines is an adage that states: "Any headline that ends in a question mark can be answered by the word no." It is named after Ian Betteridge, a British technology journalist who wrote about it in 2009, although the principle is much older.[1][2] Like similar "laws" (e.g., Murphy's law), it is intended to be humorous rather than the literal truth.[3][failed verification] The adage fails to make sense with questions that are...
Wikipedia talk:Wikipedia is an MMORPG - Wikipedia
I like it, insightful enough for me to not VfD it even though it doesn't really belong. --Alex Krupp 23:38, Oct 3, 2004 (UTC)
Betteridge's law of headlines - Wikipedia
Betteridge's law of headlines is an adage that states: "Any headline that ends in a question mark can be answered by the word no." It is named after Ian Betteridge, a British technology journalist who wrote about it in 2009, although the principle is much older.[1][2] Like similar "laws" (e.g., Murphy's law), it is intended to be humorous rather than the literal truth.[3][failed verification] The adage fails to make sense with questions that are...
Defense in depth (computing) - Wikipedia
Defense in depth is a concept used in Information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical security for the duration of the system's life cycle.
Inter-protocol exploitation - Wikipedia
Inter-protocol exploitation is a class of security vulnerabilities that takes advantage of interactions between two communication protocols,[1] for example the protocols used in the Internet. It is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP).[2] This attack uses the potential of the two different protocols meaningfully communicating commands and data.
Port knocking - Wikipedia
In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is nee...
David Kelly (weapons expert) - Wikipedia
Assange v Swedish Prosecution Authority - Wikipedia
Assange v The Swedish Prosecution Authority were the set of legal proceedings in the United Kingdom concerning the requested extradition of Julian Assange to Sweden to further a 'preliminary investigation'[1] into accusations of his having committed sexual offences. The proceedings began in 2012 and on 12 August 2015, Swedish prosecutors announced that they would drop their investigation into three of the allegations against Assange, because of t...
Scope (computer science) - Wikipedia
In computer programming, the scope of a name binding—an association of a name to an entity, such as a variable—is the part of a program where the name binding is valid, that is where the name can be used to refer to the entity. In other parts of the program the name may refer to a different entity (it may have a different binding), or to nothing at all (it may be unbound). The scope of a name binding is also known as the visibility of an entity, ...
Haiku (operating system) - Wikipedia
Haiku is a free and open-source operating system compatible with the now discontinued BeOS. Its development began in 2001, and the operating system became self-hosting in 2008.[5] The first alpha release was made in September 2009, and the last was November 2012; the first beta was released in September 2018 and the second beta was released in June 2020.
TRS-80 Color Computer - Wikipedia
The RadioShack TRS-80 Color Computer (later marketed as the Tandy Color Computer and sometimes nicknamed the CoCo) is a line of home computers developed and sold by Tandy Corporation. Despite sharing a name with the earlier TRS-80, the Color Computer is a radical departure with its Motorola 6809E processor rather than a Zilog Z80. The Color Computer line is not compatible with software made for the earlier TRS-80.[1]
TRS-80 Model 100 - Wikipedia
Amiga 1000 - Wikipedia
Don't repeat yourself - Wikipedia
Don't repeat yourself (DRY, or sometimes do not repeat yourself) is a principle of software development aimed at reducing repetition of software patterns,[1] replacing it with abstractions or using data normalization to avoid redundancy.
Reinventing the wheel - Wikipedia
To reinvent the wheel is to duplicate a basic method that has already previously been created or optimized by others.
Rosy retrospection - Wikipedia
Rosy retrospection refers to the psychological phenomenon of people sometimes judging the past disproportionately more positively than they judge the present. The Romans occasionally referred to this phenomenon with the Latin phrase "memoria praeteritorum bonorum", which translates into English roughly as "the past is always well remembered".[1] Rosy retrospection is very closely related to the concept of nostalgia. The difference between the ter...
Digital Revolution - Wikipedia
Digital Revolution - Wikipedia
History of personal computers - Wikipedia
Nagle's algorithm - Wikipedia
Nagle's algorithm is a means of improving the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network. It was defined by John Nagle while working for Ford Aerospace. It was published in 1984 as a Request for Comments (RFC) with title Congestion Control in IP/TCP Internetworks (see RFC 896).
Domain fronting - Wikipedia
Domain fronting is a technique for internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.
List of cognitive biases - Wikipedia
Cognitive biases are systematic patterns of deviation from norm and/or rationality in judgment. They are often studied in psychology and behavioral economics.[1]
Organization Designation Authorization - Wikipedia
The Organization Designation Authorization (ODA) program is the means by which the FAA grants designee authority to organizations or companies. The regulations addressing the ODA program are found in Title 14 of the Code of Federal Regulations (14 CFR) part 183, subpart D, sections 183.41 through 813.67.
Video camera tube - Wikipedia
Video camera tubes were devices based on the cathode ray tube that were used in television cameras to capture television images prior to the introduction of charge-coupled device (CCD) image sensors in the 1980s.[1][2][3] Several different types of tubes were in use from the early 1930s to the 1980s.
Xi Shi - Wikipedia
Xi Shi (Hsi Shih; Chinese: 西施; pinyin: Xī Shī; Wade–Giles: Hsi1 Shih1, literally "(Lady) Shi of the West") was, according to legends, one of the renowned Four Beauties of ancient China. She was said to have lived during the end of the Spring and Autumn period in Zhuji, the capital of the ancient State of Yue.
Junaid Hussain - Wikipedia
Junaid Hussain (c. 1994 – 25 August 2015) was a British Pakistani black hat hacker and propagandist under the nom de guerre of Abu Hussain al-Britani who supported the Islamic State of Iraq and the Levant (ISIL).[1] Hussain, who was raised in Birmingham in a family originally from Pakistan, was jailed in 2012 for hacking Tony Blair's accounts and posting his personal information online.[2][3][4][5][6][7][8] Hussain left the UK around 2013 for Syr...
House of Bernadotte - Wikipedia
"By the Grace of God King of the Swedes, the Goths and the Wends" (used until 1973)
Hershey fonts - Wikipedia
The Hershey fonts are a collection of vector fonts developed c. 1967 by Dr. Allen Vincent Hershey at the Naval Weapons Laboratory,[1][2] originally designed to be rendered using vectors on early cathode ray tube displays. Decomposing curves to connected straight lines allowed Hershey to produce complex typographic designs. In their original form the font data consists simply of a series of coordinates, meant to be connected by straight lines on t...
Nitrophenyl pentadienal - Wikipedia
Nitrophenyl pentadienal, nitrophenylpentadienal, NPPD, or METKA (Russian for "mark") colloquially known as "spy dust",[1] is a chemical compound used as a tagging agent by the KGB during the Cold War Soviet Era. Soviet authorities in Moscow tracked Americans by applying an almost invisible powder to their clothing, cars, doorknobs and other objects. Some other variants of "spy dust" may have contained luminol and would glow under ultraviolet li...
IBM 7950 Harvest - Wikipedia
The IBM 7950, also known as Harvest, was a one-of-a-kind adjunct to the Stretch computer which was installed at the United States National Security Agency (NSA). Built by IBM, it was delivered in 1962 and operated until 1976, when it was decommissioned. Harvest was designed to be used for cryptanalysis.
Videos
The Fall of 76 (www.youtube.com)
Bunker down and pray for updates. Get Curiosity Stream if you know what's good for you. http://www.curiositystream.com/internethistorian The first month free...
Best Kid-friendly Super Nintendo Games - SNESdrunk (www.youtube.com)
DariaPlaysRPGs video on kid-friendly NES games: https://youtu.be/3dmF3FbZwlQ Merry Christmas! Games covered: [1:25] Mario Paint [2:13] Tetris & Dr Mario [2:4...
5 NES Games for Little Kids (www.youtube.com)
This is a list of 5 NES and Famicom titles perfect for younger gamers just starting out. My son and I picked out 5 low stress titles that presented challenge...
Facebook Connect: John Carmack Unscripted Live Keynote (Quest 2 & Future VR Headsets) (www.youtube.com)
We restreamed a direct feed of the Facebook Connect presentation offered by John Carmack at 5:30PM PT on Sept. 16, 2020. John Carmack, the Consulting CTO for...
The History of Bethesda Game Studios (www.youtube.com)
Embark on a quest through the history of The Elder Scrolls and Fallout. With insight into the development of everything from Arena to Fallout 4, Noclip takes...
I Figured Out WHY Bethesda Got So GREEDY (www.youtube.com)
Bethesda and their subsidiaries have grown excessively greedy over the last 3 years. Everything from the Creation Club to their steps into the mobile market ...
Steve Jobs Insult Response - Highest Quality (www.youtube.com)
Steve Jobs handling a tough question at the 1997 Worldwide Developer Conference. He had just returned to Apple as an advisor and was guiding sweeping change ...
Macworld Boston 1997-The Microsoft Deal (www.youtube.com)
Here we see Steve Jobs & the almost bankrupt at the time Apple Computer making a temporary deal with Bill Gates & Microsoft. The crowd was not too happy abou...
John Cleese on Creativity In Management (www.youtube.com)
Browse more videos from the famous John Cleese training company: www.videoarts.com In this lecture-style presentation, John Cleese claims that creativity is ...
Vivek Chibber - Capitalism and the State (www.youtube.com)
Vivek Chibber, Professor of Sociology at New York University, presented this lecture, "Capitalism and the State", as part of a Brecht Forum program at the Ne...
iOS vs Android vs Librem 5 -- Which one leaks more data? (www.youtube.com)
A few weeks ago, we tested out three phone platforms (iOS on an iPhone XR, Android on a Nexus 6P, and Linux on the Librem 5 dev kit) to see which one leaks t...
Mobiel bellen in 1998 door Frans Bromet (www.youtube.com)
Frans Bromet interviewde in 1998 verschillende mensen over het nut van een mobiele telefoon.
Jonathan Blow - Preventing the Collapse of Civilization (English only) (www.youtube.com)
Jonathan's talk from DevGAMM 2019. https://www.youtube.com/c/DevGAMMchannel
The Thirty Million Line Problem (www.youtube.com)
A historical argument for creating a stable instruction set architecture (ISA) for entire system-on-a-chip (SoC) packages. Please note that although it's nev...
Life is easy. Why do we make it so hard? | Jon Jandai | TEDxDoiSuthep (www.youtube.com)
Never miss a talk! SUBSCRIBE to the TEDx channel: http://bit.ly/1FAg8hB Jon is a farmer from northeastern Thailand. He founded the Pun Pun Center for Self-re...
Annotate.tv Chrome extension demo (www.youtube.com)
Here it's a quick demo showing how you can add a new video to https://annotate.tv with just one click
Social experiment - most people are sheep (www.youtube.com)
hidden camera
Markus Loning - Introduction to Machine Learning with Time Series | PyData Fest Amsterdam 2020 (www.youtube.com)
PyData is excited to announce PyData Global, November 11th - 15th! Tickets are now available: https://global.pydata.org/pages/tickets.html#pricing-and-ticket...
Monzy performs at Stanford Univ. (www.youtube.com)
Raw footage of a performance that "CS rapper" Monzy gave last summer outside Stanford University's Computer Science building. This footage was shot for the d...
Amazon
News
Isao Okawa, 74, Chief of Sega And Pioneer Investor in Japan (www.nytimes.com)
Isao Okawa, head of Sega Corp and pioneer investor in Japan, dies at age 74; photo (M)
John Cleese Discusses Creativity, Political Correctness, Monty Python, and Artichokes (www.newyorker.com)
A conversation with the English comedian about artistic inspiration, cultural appropriation, and tabloid journalism.
Tory donor linked to $8m Putin ally funding (www.bbc.co.uk)
Leaked files show Lubov Chernukhin's husband was secretly funded by a Russian oligarch.
BBC appoints insider Tim Davie as director general (www.theguardian.com)
BBC Studios chief accepts pay cut as he is picked to succeed Tony Hall at critical juncture
The War Logs - WikiLeaks Documents (archive.nytimes.com)
Websites Vary Prices, Deals Based on Users' Information (www.wsj.com)
A Wall Street Journal investigation identified several companies, including Staples, Discover Financial Services, Rosetta Stone and Home Depot, that were consistently adjusting prices and displaying different product offers on their websites based on a range of characteristics that could be discovered about the Internet shopper, such as geographic location.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Cold war KGB spy cameras sold at auction – in pictures (www.theguardian.com)
A fascinating collection of Russian spy cameras used clandestinely at the height of the cold war have sold for £78,000 at a UK auction
How The Soviet Union Tracked People With "Spy Dust" (io9.gizmodo.com)
The US started hearing about a substance that could be used to track the movements of any person who touches, or walks across, a contaminated surface. in 1963. It wasn’t until 1984 that they got a sample of the stuff.
Subreddits
Reddit Posts
Uncategorized
Why Microsoft Is the Perfect Fit (bethesda.net)
Today we announced we’re joining the Microsoft family...
Twitch (www.twitch.tv)
Twitch is the world's leading video platform and community for gamers.
ILM reveals how it used Unreal Engine for ‘The Mandalorian’ (venturebeat.com)
ILM used Epic Games' Unreal Engine to create virtual sets for 'The Mandalorian.' This enables filmmakers to capture visual effects in camera.
Build your game in Unity  |  Android Developers (developer.android.com)
Quickstart for Android  |  ARCore  |  Google Developers (developers.google.com)
Unity Production-Ready Support for Stadia Now Available (stadia.dev)
Unity development overview - Mixed Reality (docs.microsoft.com)
Getting started building mixed reality apps in Unity.
‘Elder Scrolls Online’ Is ‘Still Growing, Not Slowing Down’ With Over 15 Million Players (www.forbes.com)
Elder Scrolls Online is still incredibly popular and continues to keep growing as one of the biggest and most successful MMOs on the market, now with over 15 million players.
Minecraft's console versions have now outsold Minecraft on PC, Mac (www.eurogamer.net)
Todd Howard On Joining Xbox (bethesda.net)
I have had the pleasure of working with, and partnering with, many of the best gaming and tech companies in the world. But our longest, and closest partner during my career, has been Microsoft.
Dota 2 - Steam Charts (steamcharts.com)
Counter-Strike: Global Offensive - Steam Charts (steamcharts.com)
Retroid Pocket 2 - Handheld Retro Gaming System (www.goretroid.com)
Hey, Our first batch of pre-sales will end at 11:59 today (2020.8.29). And all the first batch of pre-sale orders will be shipped from 8/28 according to the payment time. Now all the colors include new colors and orders from 0:00 in 8/30 (Beijing time) will belong the second batch of pre-sales. The estimated delivery t
Nintendo, Disney, and Cultural Determinism — MatthewBall.vc (www.matthewball.vc)
An essay on what Nintendo does and doesn’t want to be, why, and what this means for its future
Here's Where Facebook "Guaranteed" Users Would Never Need a Facebook Account to Use Oculus Headsets (www.roadtovr.com)
If you wondered why yesterday’s news stirred such a significant reaction from the VR community at large, it’s not just because Facebook doesn’t have a stellar reputation on privacy, it’s also because the company specifically promised it wouldn’t force users to log-in with a Facebook account to use their Oculus headset. Let’s set the stage …
Buy The Outer Worlds: Peril on Gorgon - Microsoft Store (www.microsoft.com)
The Outer Worlds: Peril on Gorgon is the first narrative expansion to the award-winning RPG from Obsidian Entertainment and Private Division. Discover a lawless den of monsters and marauders on the Gorgon Asteroid and uncover an intrigue that will change the Halcyon colony forever.
Netflix vs. the World (2019) - IMDb (www.imdb.com)
Directed by Shawn Cauthen. With Didier Allouch, John Antioco, Corey Bridges, Derek Cecil. The story of how a tiny, broke Silicon Valley startup slew giants of the movie rental world, warded off Amazon and forced movie making and distribution into the digital age.
Demolition Man (1993) - IMDb (www.imdb.com)
Demolition Man (1993) on IMDb: Movies, TV, Celebs, and more...
Carmack: Direct3D is now better than OpenGL | bit-tech.net (www.bit-tech.net)
Co-founder of id Software reveals that 'inertia' is the main reason why id has stuck by OpenGL.
Microsoft buys ZeniMax Media and The Elder Scrolls dev Bethesda for $7.5 billion (www.gamasutra.com)
Microsoft is moving to acquire Bethesda Softworks parent company ZeniMax Media for $7.5 billion in cash. 
Level 69: The Next Generation of Strategy (pausebutton.substack.com)
Playstation 5 vs Xbox: Series X, Facebook's VR Vision, Some Free Money, and a Virtual Streaming Avatar
New language speaks up to help solve an old problem - 1999-11-29 - The Business Journal of Tampa Bay (web.archive.org)
Tampa software firm DeskWare Inc. (http://www.deskware.com) has launched a new language that Web-enables COBOL (Common Business-Oriented Language).
Cloudflare Workers Now Support COBOL (blog.cloudflare.com)
COBOL is often a source of amusement for programmers because it is seen as old, verbose, clunky, and difficult to maintain. COBOL can now be used to write code for Cloudflare’s serverless platform Workers.
Cloudflare Workers Announces Broad Language Support (blog.cloudflare.com)
Today, we’re excited to announce support for Python, Scala, Kotlin, Reason and Dart. You can build applications on Cloudflare Workers using your favorite language starting today.
COBOL Programming | Visual COBOL | Micro Focus (www.microfocus.com)
Visual COBOL provides COBOL development and integration tools in your choice of Visual Studio or Eclipse that help AppDev teams deliver new functionality. Learn more today.
I asked an online tracking company for all of my data and here's what I found (privacyinternational.org)
It’s 15:10 pm on April 18, 2018. I’m in the Privacy International office, reading a news story on the use of facial recognition in Thailand. On April 20, at 21:10, I clicked on a CNN Money Exclusive on my phone.
Data Subject Rights | Quantcast (www.quantcast.com)
Your browser settings or adbocker may be blocking the loading of our data rights request web form. If you would like to access the web form, please adjust your configuration.
Quantcast Privacy Policy | Quantcast (www.quantcast.com)
Learn about the Quantcast Privacy Policy and our commitment to protecting your data, brand safety and brand safe advertising.
PrivicyPal (www.privicy.com)
Your personal data, under your control, for your benefit.
Welcome to Proximus – Internet, mobile, phone and TV (www.proximus.be)
Proximus offers you the best quality network and wide mobile coverage within Belgium. You’ll also benefit from a top-quality 24/7 service!
Cookie Consent Manager - Take control of managing cookie consent compliance. (trustarc.com)
Cookies help your customers have a more enjoyable experience by helping them do everything from remembering passwords to suggesting products they may enjoy. Cookies also help companies with website analysis and managing behavioral advertising programs. However, laws such as GDPR, CCPA, and ePrivacy, among other forthcoming legislation, have specific requirements around how companies may use cookies.
imgur.com (imgur.com)
Imgur: The magic of the Internet
What are the GDPR consent requirements? - GDPR.eu (gdpr.eu)
One easy way to avoid large GDPR fines is to always get permission from your users before using their personal data. This article explains the GDPR consent requirements to help you comply.
InteractiveAdvertisingBureau/GDPR-Transparency-and-Consent-Framework (github.com)
Technical specifications for IAB Europe Transparency and Consent Framework that will help the digital advertising industry interpret and comply with EU rules on data protection and privacy - notabl...
Data Companies Are Watching Me (duo.com)
Every day, code embedded in mobile applications silently collects the location of hundreds of millions of unsuspecting users. This data is purchased by location data brokers who use it to offer marketing analytics, provide targeted advertisements, or simply resell access to the data to other companies. In this post, I’ll show how I requested my data from these location data brokers, detail what information I received, and talk through why the exi...
jmdugan/blocklists (github.com)
Shared lists of problem domains people may want to block with hosts files - jmdugan/blocklists
Using a Hosts File To Make The Internet Not Suck (as much) (someonewhocares.org)
Instructions on how to use a hosts file to avoid viewing ads and to make your internet experience more pleasant.
uBlock Origin – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download uBlock Origin for Firefox. Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory.
New Steve Jobs recordings from the '80s released (www.sfgate.com)
Steve Jobs is now known for revolutionizing just about every part of the tech world, but back in 1988, he was perhaps best known for getting fired. In his first product reveal since his dismissal from Apple in 1985, Jobs unveiled a new project called NeXT at a meeting of the Boston Computer Society. An audio recording of the event was unearthed and released as part of a trove of early tech recordings released by Charles Mann, as reported in an ...
Apple WWDC 1997 Closing Keynote - Fireside Chat with Steve Jobs : Free Download, Borrow, and Streaming : Internet Archive (archive.org)
Steve Jobs’ famous “Fireside Chat”, taking place on the last day of WWDC ’97, just before the closing keynote.Captured from VHS by Jason Molenda
The Powersharing Series (soundcloud.com)
Selected clips from Charles Mannâs Powersharing Series, a collection of recordings of computing pioneers made between 1982-1991. Copyright © Powersharing, Inc. and used with permission. All rights res
This unheard Steve Jobs tape is part of an amazing trove of tech history (www.fastcompany.com)
When Steve Jobs demoed his NeXT computer at a 1988 user meeting, Charles Mann was there to record it—along with dozens of other talks by computing pioneers.
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
imgur.com (imgur.com)
Imgur: The magic of the Internet
Was Steve Jobs technical? - Quora (www.quora.com)
When he was quite young, 18 or so, he worked for Atari. He was valuable enough to not get fired even when nobody wanted to work with him, (because of how he smelled), as he thought veganism was so pure, (hippy bullshit), that he would not smell ba...
How did Steve Jobs thrive in a technical field with a non-technical background? - Quora (www.quora.com)
I was always very impressed with Steve’s technical knowledge and ability to understand technical issues. A good example of this was when my team created the built in iSight camera. We had to replace the external iSight camera that was a CCD imager...
Lessons Learned from Running Postgres 13: Better Performance, Monitoring & More (pganalyze.com)
Learn about smaller indexes with B-Tree Deduplication, Extended Statistics Improvements, Parallel VACUUM, improved WAL Usage Stats in Postgres 13, and more.
Is Revenue Model More Important than Culture? (somehowmanage.com)
I always loved getting problems of the type “What is the limit as x approaches infinity” type in high-school/college. You’re given an equation (of the classic y=x format), and asked to derive what …
8 ways to know that it’s time to hire a new QA tester (www.functionize.com)
You want top-quality software, sure. But when is it time to increase the size of the testing team, so that you can deliver said top-quality software? Glad you asked.
Siftrics Pricing (siftrics.com)
Conversion Optimization: An Enormous List of Psychological Tactics (www.nickkolenda.com)
Welcome to a huge resource on conversion rate optimization. You'll learn 30 psychological tactics to influence your website visitors.
Sumner Redstone ‘starved a generation of workers’ of benefits but 'rest in peace' (www.dailykos.com)
Sumner Redstone, a billionaire media tycoon, died Tuesday in his Los Angeles home at 97&nbsp;years&nbsp;old after amassing a media empire that includes both CBS and Viacom, The New York Times reported. “Sumner was a man of unrivaled passion and...
Checkbot: SEO, Web Speed & Security Checker for Chrome (www.checkbot.io)
Checkbot will boost the SEO, speed & security of your site by testing for broken links, duplicate content, invalid HTML/CSS/JavaScript, insecure pages & more. Test 100s of pages at a time including local sites to keep on top of problems & stop critical issues going live.
HN Search powered by Algolia (hn.algolia.com)
Hacker News Search, millions articles and comments at your fingertips.
HN Search powered by Algolia (hn.algolia.com)
Hacker News Search, millions articles and comments at your fingertips.
High Volume Mobile and Web Push Notifications (onesignal.com)
The world's leader for mobile push notifications, web push, and in-app messaging. Trusted by 1 million+ businesses to send 7 billion push notifications per day.
No, Moving Your SSH Port Isn't Security by Obscurity | Daniel Miessler (danielmiessler.com)
I just came across another post on Hacker News talking about why you shouldn't move your SSH port off of 22 because it's Security by Obscurity. There are
OpenBSD PF: Packet Filtering (www.openbsd.org)
Where to find sshd logs on MacOS sierra (stackoverflow.com)
I want to install Pseudo-Distributed HBase environment on my Mac OS Sierra (10.12.4), and it requires ssh installed and can log with ssh localhost without password. But sometimes I came across with...
Endlessh: an SSH Tarpit (nullprogram.com)
All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved.
Mozilla Port Blocking (www-archive.mozilla.org)
On 08/15/2001, Cert issued a Vulnerability Note VU#476267 for a "Cross-Protocol" scripting attack, known as the HTML Form Protocol Attack which allowed sending arbitrary data to most TCP ports. A simple exploit of this hole allows an attacker to send forged unsigned mail through a mail server behind your firewall: A really nasty hole.
S/KEY - Wikipedia (en.wikipedia.org)
S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password. A user's real password is combined in an offline device with a short set of characters and a decrementing counter to form a single-use password. Because each password is only used once, they are useless to password sniffers.
Creativity by John Cleese: 9780385348270 | PenguinRandomHouse.com: Books (www.penguinrandomhouse.com)
The legendary comedian, actor, and writer of Monty Python, Fawlty Towers, and A Fish Called Wanda fame shares his key ideas about creativity: that it’s a learnable, improvable skill....
Why are Amnesty International monitors not able to observe the Assange hearing? (www.amnesty.org)
If Wikileaks founder, Julian Assange, is silenced, others will also be gagged either directly or by the fear of persecution and prosecution
US sanctions staff at top war crimes court (www.bbc.com)
The chief prosecutor at the Hague-based ICC, Fatou Bensouda, is among those sanctioned.
WikiLeaks Founder Charged in Superseding Indictment (www.justice.gov)
A federal grand jury returned a second superseding indictment today charging Julian P. Assange, the founder of WikiLeaks, with offenses that relate to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States.
Here’s How The U.S. Claims The Assange-Manning Conspiracy Worked (www.forbes.com)
Assange is accused of helping Chelsea Manning crack a password for Windows PCs she had access to in Iraq. Just how does the government believe they planned to do it?
BBC Newsnight editor accused of ‘off the scale’ bias after New Statesman cover story (www.theweek.co.uk)
Policy editor Lewis Goodall attacked for article on the exam grading mayhem
Emily Maitlis praised for summing up Dominic Cummings controversy in one minute Newsnight opener (www.independent.co.uk)
‘He made those who struggled to keep to the rules feel like fools,’ presenter says
The plot to stop James Purnell becoming director-general of the BBC | The Spectator (www.spectator.co.uk)
In case you were in any doubt, the Prime Minister and his chief aide, Dominic Cummings, more than give a damn about who runs the BBC and intend to have a significant influence over the appointment of a new director-general. The current chairman of the BBC board, David Clementi, showed acute politica...
Assange in dock as extradition hearing resumes (www.bbc.com)
The 49-year-old faces 18 charges, including an alleged plot to hack computers and obtain US documents.
Julian Assange (apnews.com)
News from The Associated Press, the definitive source for independent journalism from every corner of the globe.
New labels for government and state-affiliated media accounts (blog.twitter.com)
Weâre expanding the type of accounts we label to include official government and state-affiliated media.
CIA Torture Survivor Khaled El Masri Backs Assange At Extradition Trial (shadowproof.com)
Khaled El Masri, a survivor of CIA torture and detention, indicated support for WikiLeaks founder Julian Assange during extradition trial.
Your Man in the Public Gallery: the Assange Hearing Day 6 - Craig Murray (www.craigmurray.org.uk)
I went to the Old Bailey today expecting to be awed by the majesty of the law, and left revolted by the sordid administration of injustice. There is a romance which attaches to the Old Bailey. The name of course means fortified enclosure and it occupies a millennia old footprint on the edge of London’s […]
Uncategorized Archives - Craig Murray (www.craigmurray.org.uk)
Craig Murray - RationalWiki (rationalwiki.org)
Craig Murray (1958–) is a former British diplomat and current writer who is considered by some an expert on international affairs but is considered by others a conspiracy theorist with traces of antisemitism. He writes mainly on his own blog at CraigMurray.com but also for other fringe publications such as The Truth Seeker, and has published a memoir, Murder in Samarkand (2006).[1][2] This book was adapted by David Hare for BBC Radio Four, starri...
Spy games: Inside the convoluted plot to bring down WikiLeaks (arstechnica.com)
The CEO of security firm HBGary Federal had big plans for helping a US bank …
Wherein WikiLeaks Brags about Entertaining a Pardon Dangle from a Suspected Russian Asset and a White Supremacist | emptywheel (www.emptywheel.net)
For some reason, Julian Assange's lawyer thought it would help his case to testify about just one of the four pardon pitches -- all involving Russia -- made for Julian Assange since he helped authoritarian Donald Trump become President.
Pentagon Papers Whistleblower Dismantles Myths Around Assange (shadowproof.com)
Pentagon Papers whistleblower Daniel Ellsberg dismantled myths around Julian Assange and WikiLeaks during extradition trial.
Your Man in the Public Gallery: Assange Hearing Day 11 - Craig Murray (www.craigmurray.org.uk)
Yet another shocking example of abuse of court procedure unfolded on Wednesday. James Lewis QC for the prosecution had been permitted gratuitously to read to two previous witnesses with zero connection to this claim, an extract from a book by Luke Harding and David Leigh in which Harding claims that at a dinner at El […]
Vis Timeline Examples (visjs.github.io)
«Ein mörderisches System»: Konstruierte Vergewaltigung, manipulierte Beweise (www.republik.ch)
Erstmals spricht Nils Melzer, Uno-Sonderberichterstatter für Folter, ausführlich über seine Untersuchungen im Fall Julian Assange. Und legt brisante Dokumente vor.
Assange v Swedish Prosecution Authority [2011] EWHC 2849 (Admin) (02 November 2011) (www.bailii.org)
[New search] [Printable PDF version] [Help] Neutral Citation Number: [2011] EWHC 2849 (Admin) Case No: C0/1925/2011 IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION DIVISIONAL COURT Royal Courts of Justice Strand, London, WC2A 2LL 2 November 2011 B e f o r e : THE PRESIDENT OF THE QUEEN'S BENCH DIVISION (SIR JOHN THOMAS)andMR JUSTICE OUSELEY ____________________ Between: Julian Assange Appe...
Good Ellsberg, Bad Assange: At Extradition Trial, Pentagon Papers Whistleblower Dismantles False Narrative (dissenter.substack.com)
Ellsberg also said "Julian Assange could not get a remotely fair trial" in the United States.
How to Make Biomass Energy Sustainable Again (www.lowtechmagazine.com)
From the Neolithic to the beginning of the twentieth century, coppiced woodlands, pollarded trees, and hedgerows provided people with a sustainable supply of energy, materials, and food. Pollarded trees in Germany. Image: René Schröder (CC BY-SA 4.0). How is Cutting Down Trees Sustainable? Advocating for the use of biomass as a renewable source of energy – replacing fossil fuels – has become controversial among environmentalists. The comments on ...
Comparison of Biomass and Solar Energy Yields - Open Source Ecology (wiki.opensourceecology.org)
These are very important calculations. More below.
Biomass and land use – biofuelwatch (www.biofuelwatch.org.uk)
How much more land do we need for energy from biomass compared to solar PV?
Companies can track your phone’s movements to target ads (arstechnica.com)
A startup gathers data on when you pick up your phone or go out on a run.
Google Search Console (accounts.google.com)
Use Search Console to monitor Google Search results data for your properties.
Extreme Privacy by Michael Bazzell (inteltechniques.com)
Open Source Intelligence OSINT Training by Michael Bazzell
Releases · AdAway/AdAway (github.com)
AdAway is an open source ad blocker for Android using the hosts file. - AdAway/AdAway
DNSfilter | F-Droid - Free and Open Source Android App Repository (f-droid.org)
© 2010-2020 F-Droid Limited and Contributors
DNS66 | F-Droid - Free and Open Source Android App Repository (f-droid.org)
© 2010-2020 F-Droid Limited and Contributors
Librem 5 – Purism (shop.puri.sm)
$749.00
Location Services & Privacy (support.apple.com)
Location Services is designed to protect your information and enable you to choose what you share.
Dokucode - Dynamic Scoping in C++ (blog.dokucode.de)
Date: 2020-07-10 I always had a faible for dynamic scoping as it is implemented in Common Lisp, Emacs Lisp, or LaTeX. To me, it seems that dynamic scoping is an almost forgotten technique and dismissed technique in modern programming. While it is more complex to understand and more magically than lexical scoping, there are some applications that benefit from dynamic scoping. In lexical scoping, if you access a variable, your compiler will start s...
4.13 Dynamic Binding: parameterize (docs.racket-lang.org)
PEP 567 -- Context Variables (www.python.org)
The official home of the Python Programming Language
PEP 568 -- Generator-sensitivity for Context Variables (www.python.org)
The official home of the Python Programming Language
Allow `docker push' to push multiple/a subset of tags · Issue #267 · docker/cli (github.com)
Allow the following usage: docker push org/image-a:some_tag org/image-b:other_tag This would make docker push simpler to use in systems that need to build and push multiple images to dockerhub by o...
Züri Dësch - The Zurich Table - juricho.me (www.juricho.me)
Of Flying Cars and the Declining Rate of Profit (thebaffler.com)
A secret question hovers over us, a sense of disappointment, a broken promise we were given as children about what our adult world was supposed to be like. I am referring not to the standard false…
Spoiler Test (exanderproject.com)
Built to Last (logicmag.io)
Don’t blame COBOL. Blame austerity.
Errors from conditional exports after upgraded to Node 13.13 · Issue #32852 · nodejs/node (github.com)
Version: Node.js 13.13 Platform: 19.4.0 Darwin Kernel Version 19.4.0 Subsystem: ES modules What steps will reproduce the bug? npm install @babel/compat-data node -e &quot;require(&#39;@babel/compat...
being doctor sucks - Google Search (www.google.com)
Being a carpenter sucks! (www.bbcboards.net)
As the title says, I'm so sick of banging nails! I put my application in at lindenwood university here in St. Louis and just got a call from the school saying that I've been accepted!! This is going to be a long road for me, I absolutely hated high school and ended up dropping out sophomore year and getting my GED. After 8 years of manual labor I'm realizing the value of an education and that little paper they give you at the end of your 4 years ...
Why I Don’t Offer Woodworking Business Advice (thewoodwhisperer.com)
I am totally unqualified to dish out woodworking business advice, and here's why!
Long Walk Woodworking LLC (www.longwalkwoodworking.com)
Long Walk Woodworking LLC (www.longwalkwoodworking.com)
An app can be a home-cooked meal (www.robinsloan.com)
I made a messaging app for my family and my family only.
Achievements - Nicolas Bouliane (nicolasbouliane.com)
Unlockable achievements on my website
Russia’s role in producing the taxman of the future (www-ft-com.libezproxy.open.ac.uk)
Aimed at shopkeepers rather than oligarchs, Moscow has technology to record and tax real-time transactions
The Anarchist's Design Book: Expanded Edition (lostartpress.com)
“The Anarchist’s Design Book” explores 18 historic and simple-to-make furniture forms that have been around for almost 1,000 years, yet look shockingly modern. You'll make a bed, dining tables, chairs, chests, desks and shelving as you learn two approaches – "boarded" and "staked" – to build these pieces and more.
2020 Biennial Members Exhibition - Fuller Craft Museum (fullercraft.org)
The 2020 Biennial Members Exhibition celebrates the diversity of talents in the museum’s membership base. This biennial exhibition is an important opportunity for young, mid-career, and veteran artists to exhibit their work to the Fuller Craft Museum community. Artists both inside and outside of New England have participated in the past, showcasing stunning works of […]
Eric Diven, "Cabinet on Stand" (interior) (www.flickr.com)
2019 Hickory black walnut and brass Collection of the Artist
3D Project (willadams.gitbook.io)
Joining two or more pieces to create three dimensional parts.
The Software Industry Is Broken | Gavin D. Howard (gavinhoward.com)
The incentives in the software industry are all wrong. This is why.
At the Math Olympiad, Computers Prepare to Go for the Gold (www.quantamagazine.org)
Mathematics: our overlooked ability (dselsam.github.io)
Towards Machine Intelligence
IMO-grand-challenge/formal-encoding (github.com)
Formal encoding of IMO problems. Contribute to IMO-grand-challenge/formal-encoding development by creating an account on GitHub.
We need young programmers; we need old programmers (blog.ploeh.dk)
The software industry loves young people, but old-timers serve an important purpose, too.
Free and Open-Source Projects – The Great Rift Valley Software Company (riftvalleysoftware.com)
Most successful entrepreneurs are older than you think (theconversation.com)
Most people think of entrepreneurship as a young person's game. But the highest-growth firms in the US come from entrepreneurs who are 45 years old.
Tarsnap - The kivaloo data store (www.tarsnap.com)
The kivaloo data store
An Important Update on Mozilla WebThings (discourse.mozilla.org)
Flying the Nest: An important update on Mozilla WebThings Dear WebThings Community, We are writing to inform you that the WebThings project is being spun out of Mozilla as an independent open source project. The project will be renamed from “Mozilla WebThings” to “WebThings” and will move to a new home at webthings.io. Why is this happening? Mozilla is winding down its direct investment in WebThings and is transitioning control and responsibi...
Web Thing Protocol Community Group (www.w3.org)
The mission of this group is to define a common protocol for communicating with connected devices over the web, to enable ad-hoc interoperability on the <a rel="nofollow" href="https://www.w3.org/WoT/">Web of Things</a>. Deliverables of the group may include use cases, requirements and specifications. The group will collaborate with the W3C Web of Things Interest Group and Working Group to ensure any specifications complement or extend the ...
Web Thing API (iot.mozilla.org)
Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources (www.reuters.com)
Apple Inc <AAPL.O> dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters.
HomeKit Accessory Protocol Specification (Non-Commercial Version) - Assistance - Apple Developer (developer.apple.com)
HomeKit Accessory Protocol (HAP) is Appleâs proprietary protocol that enables third-party accessories in the home (e.g., lights, thermostats and door locks) and Apple products to communicate with each other. HAP supports two transports, IP and Bluetooth LE. The information provided in the HomeKit Accessory Protocol Specification (Non-Commercial Version) describes how to implement HAP in an accessory that you create for non-commercial use and th...
How HomeKit's software authentication works (www.imore.com)
With the launch of iOS 11.3, Apple has introduced a new software authentication option for HomeKit accessory manufacturers. What does that mean? It means we could see more HomeKit-enabled accessories hitting the market.
Web of Things (WoT) Thing Description (www.w3.org)
This document describes a formal model and a common representation for a Web of Things (WoT) Thing Description. A Thing Description describes the metadata and interfaces of Things, where a Thing is an abstraction of a physical or virtual entity that provides interactions to and participates in the Web of Things. Thing Descriptions provide a set of interactions based on a small vocabulary that makes it possible both to integrate diverse devices an...
WebThings (github.com)
(formerly Mozilla WebThings). WebThings has 103 repositories available. Follow their code on GitHub.
Mozilla WebThings Gateway Kit – OKdo (www.okdo.com)
This kit contains everything you need to get the Mozilla WebThings Gateway up and running in minutes. Just insert the pre-programmed uSD card, plug in Ethernet or attach via Wi-Fi to your internet modem or Wi-Fi router, and apply power. Quickly configure the privacy and security of your gateway via the GUI which is accessible…
Mozilla cuts 250 jobs, says Firefox development will be affected (arstechnica.com)
Mozilla reduces investment in developer tools and platform feature development.
Home (www.cdc.gov.tw)
Tail recursion and debugging (funcall.blogspot.com)
A blog about computers, functional languages, Lisp, and Scheme.
apache/maven-resolver (github.com)
Apache Maven Artifact Resolver. Contribute to apache/maven-resolver development by creating an account on GitHub.
draft-mdt-softwire-map-encapsulation-00 - MAP Encapsulation (MAP-E) - specification (tools.ietf.org)
Dynamic IPv6 Subnet & ip6tables | Jean-Louis Dupond (blog.dupondje.be)
Great! Native IPv6. Now all my computers/devices in my LAN have a public IP address!
Creating a Home IPv6 Network | James Bottomley's random Pages (web.archive.org)
One of the recent experiences of Linux Plumbers Conference convinced me that if you want to be part of a true open source WebRTC based peer to peer audio/video interaction, you need an internet address that’s not behind a NAT. In reality, the protocol still works as long as you can contact a stun server to tell you what your external address is and possibly a turn server to proxy the packets if both endpoints are NATed but all this seeking exter...
IPv6 prefix delegation on FreeBSD router (vladvasiliu.com)
Goal I’m attempting to set up a router box in order to replace my SFR router on a home network. As my SFR plan has native IPv6, this box will request a prefix delegation and set up IPv6 routing for the computers on the home network. It will also handle NAT for IPv4. This is supposed to be a drop-in replacement for the SFR provided box, so it will have to:
IPv6 Multicast Address Space Registry (www.iana.org)
Registries included below
Designed in Minecraft, built IRL (restofworld.org)
In Gaza, citizens are imagining what public spaces could be, and then actually building them.
Who first coined the term “Greenhouse Effect”? (www.easterbrook.ca)
Today I’ve been tracking down the origin of the term “Greenhouse Effect”. The term itself is problematic, because it only works as a weak metaphor: both the atmosphere and a green…
Darts: Time Series Made Easy in Python (medium.com)
Time series simply represent data points over time. They are thus everywhere in nature and in business: temperatures, heartbeats, births…
Ciofeca Forensics - Revisiting Apple Notes (6): The Protobuf (ciofecaforensics.com)
18 Sep 2020 · 45 mins read
python3 script to infer a protobuf definition from a framework or executable. (gist.github.com)
python3 script to infer a protobuf definition from a framework or executable. - framework2proto.py
[MS-CFB]: Compound File Binary File Format (docs.microsoft.com)
Specifies the Compound File Binary File Format, a general-purpose file format that provides a file-system-like structure within a file for the
Padlocks, Phishing and Privacy; The Value Proposition of a VPN (www.troyhunt.com)
I want a "secure by default" internet with all the things encrypted all the time such that people can move freely between networks without ever needing to care about who manages them or what they're doing with them. I'm a massive proponent of Let's Encrypt's and Cloudflare's missions to secure
Exposing and Circumventing China's Censorship of ESNI (geneva.cs.umd.edu)
The Great Firewall (GFW) of China has recently begun blocking ESNIâone of the foundational features of TLS 1.3 and HTTPS. We empirically demonstrate what triggers this censorship and how long residual censorship lasts. We also present several evasion strategies discovered by Geneva that can be run either client-side or server-side to evade blocking.
HTTPS Everywhere (www.eff.org)
HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.
Regulations.gov (www.regulations.gov)
Pilots Criticize Boeing, Saying 737 Max 'Should Never Have Been Approved' (www.npr.org)
"Sully" Sullenberger, who landed a plane on the Hudson River in 2009, says he understands how the pilots of two jets that crashed would have been confused as they struggled to control the aircraft.
How Deregulation Made Flying More Dangerous | DCReport.org (www.dcreport.org)
How Deregulation made flying more dangerous. The Federal Aviation Agency let Boeing certify the safety of its own planes.
Did Trump Executive Orders Further Weaken FAA Oversight? (www.forbes.com)
The FAA has been mandated to take a more collaborative approach with manufacturers and airlines. Two orders from the president that require the FAA to cut regulations further may have tipped the balance, diminishing FAA authority and focusing it on working against its principal priority on safety.
How to Catch a Spy who Uses Numbers Stations? The KGB Experience - Numbers Stations Research (www.numbers-stations.com)
Introduction   From 2019 onwards the Latvian National Archive offers access to various KGB documents. The author had already previously shown the very detailed efforts of the Latvian KGB counterintelligence to monitor and study the CIA and BND numbers stations broadcasts, or what they called - “one directional communications”.[1] These are one of the most definitive archival sources which prove that foreign
Why people betray their countries, according to an Israeli expert (www.haaretz.com)
***
All You Need Is Love (www.theatlantic.com)
How the terrorists stopped terrorism
Doing Business In Japan | Kalzumeus Software (www.kalzumeus.com)
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
TRIGON Numbers Station: The Case of Alexandr Ogorodnik - Numbers Stations Research (www.numbers-stations.com)
by: Māris Goldmanis On 1984 when relations between US and USSR were at their coldest, Soviet television demonstrated a 10 series spy thriller TASS Is Authorized to Declare... (ТАСС уполномочен заявить) it was a highly sophisticated spy movie that showed the struggle between KGB counterintelligence and CIA. The script was based on novel of the same name by Yulian Semyonov the author
Google Maps (www.google.com)
Find local businesses, view maps and get driving directions in Google Maps.
weeWX: Stations Running weeWX (weewx.com)
Open source software for your weather station
HVAC - Joe's Datacenter (joesdatacenter.com)