cat - Dave's Blog


Search

Retweet of DrScienceCat

Jun 24, 1:29
The Smithsonian uploaded this today pic.twitter.com/S6lWvgm0Pw
PermalinkComments

Retweet of ncardozo

Apr 11, 10:58
The NSA does not have "an absolute right to gain access to every way in which two people may choose to communicate." http://arstechnica.com/tech-policy/2015/04/nsa-dreams-of-smartphones-with-split-crypto-keys-protecting-user-data/ …
PermalinkComments

Tweet from David_Risney

Mar 19, 11:31
Push messaging and notifications are landing in Chrome 42. http://updates.html5rocks.com/2015/03/push-notificatons-on-the-open-web … via @ChromiumDev
PermalinkComments

fuckyeahpeeweeherman:Pee-wee Herman’s next adventure is coming...

Mar 17, 3:28


fuckyeahpeeweeherman:

Pee-wee Herman’s next adventure is coming to Netflix.

Netflix says the film will be called “Pee-wee’s Big Holiday” and will feature Pee-wee taking his first-ever vacation after meeting a mysterious stranger.

Reubens created the quirky character in the 1980s when he was a member of the Groundlings improv group.

Netflix currently streams the Pee-wee films “Pee-wee’s Big Adventure” and “Big Top Pee-wee,” as well as the TV show “The Pee-wee Herman Show” and “Pee-wee’s Playhouse.”

“Pee-wee’s Big Holiday” is being produced by Judd Apatow and directed by John Lee. Reubens is writing the movie’s script with Paul Rust.

Netflix says production will begin this year.

PermalinkComments

Tweet from David_Risney

Mar 15, 10:48
World's first Disposable Single-Use Unlubricated Monocle, for the On-the-Go Gentleman (or Lady) http://kck.st/1BM0EFd 
PermalinkComments

Tweet from David_Risney

Mar 13, 8:43
Self driving cars, or remotely driven cars. Which will catch on first and how will you tell? http://www.openwebrtc.io/blog/2015/3/12/driving-an-excavator-using-openwebrtc-and-oculus-rift-video …
PermalinkComments

Tweet from David_Risney

Mar 5, 4:01
ASCII fluid dynamics (IOCCC2012) runs ASCII art (including its own obfuscated src) through a fluid physics simulation http://youtu.be/QMYfkOtYYlg 
PermalinkComments

Tweet from David_Risney

Mar 3, 4:06
How do you conditionally sprite/concat/shard based on http version? https://mattwilcox.net/web-development/http2-for-front-end-web-developers …
PermalinkComments

Retweet of ivanristic

Feb 26, 2:45
Blink browser engine: "Intent to deprecate: Insecure usage of powerful features" https://groups.google.com/a/chromium.org/forum/#!msg/blink-dev/2LXKVWYkOus/gT-ZamfwAKsJ … < Pushing toward more HTTPS
PermalinkComments

Retweet of NiemanLab

Feb 24, 8:14
Magazines are trying to create new categories of “super-subscribers” http://nie.mn/1DUg1f8 
PermalinkComments

Retweet of getify

Feb 24, 6:25
Lots of questions about my #ES6 arrow functions assertions. Here's full context (and some cleanup/clarifications): https://github.com/getify/You-Dont-Know-JS/blob/master/es6%20%26%20beyond/ch2.md#arrow-functions …
PermalinkComments

Retweet of ericlaw

Jan 27, 11:08
I recently got a new Authenticode cert to continue to sign my code. It wasn't hard-- you should be signing too! http://blogs.msdn.com/b/ieinternals/archive/2015/01/28/authenticode-in-2015-signcode-with-certificate-on-etoken.aspx …
PermalinkComments

DrPizza: <- my reaction when there are new hats.

Jan 27, 9:00
Peter Bright        ✔ @DrPizza :
http://fat.gfycat.com/ShadowyUnimportantHorsefly.gif … <- my reaction when there are new hats.
PermalinkComments

Fish vs Fish in Street Fighter II

2014 Aug 20, 6:22

Fish vs Fish in Street Fighter II - Computer vision translates the location of two fish in an aquarium into SF2 moves.

PermalinkCommentstechnical humor video-game street-fighter fish

On exploiting security issues in botnet C&C...

2014 Jun 23, 4:26


On exploiting security issues in botnet C&C software:

Hackers “are learning that it’s not so easy to write secure code,” Toro says. “Most of us in the business of securing our applications and systems know that bulletproofing software is an extremely expensive and exhaustive undertaking. Malware creators who have to look to their own defences would have to slow down the production of new attacks.”

FYI, if you want to know what it looks like when you hack a hacker, look no further than the seminal 1995 film Hackers.

PermalinkCommentstechnical security

JS NICE: Statistical renaming, Type inference and Deobfuscation

2014 Jun 3, 9:36

JS NICE | Software Reliability Lab in ETH

JS NICE has indexed over 10,000 JavaScript projects from GitHub and then probabilistically infers newly suggested names and types for all of the local variables and function parameters of new JS.

PermalinkCommentstechnical javascript js coding

Cloud Share - New App

2014 May 23, 4:06

I've put a new app on the Windows Store: Cloud Share. It connects the web to your Windows 8 share charm.

I did the development on GitHub and quite enjoyed myself. I wasn't sure I liked the game-ification of development in GitHub's dashboard showing you your longest development streak in days. However I realized that it encourages me to do work on my personal project and anything that aids in holding my attention on and helping me finish these projects is a good thing.

PermalinkCommentsdevelopment github javascript JS technical windows

location.hash and location.search are bad and they should feel bad

2014 May 22, 9:25
The DOM location interface exposes the HTML document's URI parsed into its properties. However, it is ancient and has problems that bug me but otherwise rarely show up in the real world. Complaining about mostly theoretical issues is why blogging exists, so here goes:
  • The location object's search, hash, and protocol properties are all misnomers that lead to confusion about the correct terms:
    • The 'search' property returns the URI's query property. The query property isn't limited to containing search terms.
    • The 'hash' property returns the URI's fragment property. This one is just named after its delimiter. It should be called the fragment.
    • The 'protocol' property returns the URI's scheme property. A URI's scheme isn't necessarily a protocol. The http URI scheme of course uses the HTTP protocol, but the https URI scheme is the HTTP protocol over SSL/TLS - there is no HTTPS protocol. Similarly for something like mailto - there is no mailto wire protocol.
  • The 'hash' and 'search' location properties both return null in the case that their corresponding URI property doesn't exist or if its the empty string. A URI with no query property and a URI with an empty string query property that are otherwise the same, are not equal URIs and are allowed by HTTP to return different content. Similarly for the fragment. Unless the specific URI scheme defines otherwise, an empty query or hash isn't the same as no query or hash.
But like complaining about the number of minutes in an hour none of this can ever change without huge compat issues on the web. Accordingly I can only give my thanks to Anne van Kesteren and the awesome work on the URL standard moving towards a more sane (but still working practically within the constraints of compat) location object and URI parsing in the browser.
PermalinkComments

FCC planning new Internet rules that will gut Net Neutrality. Get ready to pay more for the stuff you love online.

2014 Apr 24, 3:29
PermalinkCommentstechnical net-neutrality fcc bullshit

Untrusted - a user javascript adventure game

2014 Apr 8, 6:53

The game is to figure out what constrained modifications you must make to beat the game.

PermalinkCommentstechnical programming javascript game
Older Entries Creative Commons License Some rights reserved.