os page 34 - Dave's Blog

Search
My timeline on Mastodon

Blaise Aguera y Arcas demos augmented-reality maps | Video on TED.com

2010 Feb 18, 4:57Bing Maps TED talk demos integration of various things including photosynth, flickr photos, and live video.PermalinkCommentsvideo microsoft map flickr 3d photosynth bing augmented-reality

Photos Bahamas Anecdote

2010 Feb 17, 8:09

Sarah and I just got back home from a Eric and Jane's wedding / Sarah and Dave's vacation trip to the Bahamas (note the lack of activity for the past twelve days on my website). I've got plenty of photos and things to post but for now I'll just relate this humorous anecdote during the rehearsal dinner. I had said something about photos to Jim, Eric's brother and he gave me a crazy look. "Oh, I thought you meant like pho-tos" he said. It took me a moment to realize he misunderstood what I said as "faux toes". I laughed until I cried a little. Also works with digital faux toes.

PermalinkCommentsfaux toes personal bahamas

New Paintings Page: Ward Shelley

2010 Feb 4, 2:07Infographic oil paintings of things like the historical influences of avant garde or the life of Frank Zappa.PermalinkCommentsart design visualization information gallery infographics painting ward-shelley via:infosthetics

No, you can’t do that with H.264 « Digital Diary of Ben Schwartz

2010 Feb 4, 2:01On the crappy licensing of the H.264 and MPEG codecs in popular video encoding software.PermalinkCommentsvideo encoding codec patent legal law apple microsoft theora h.264 technical

Unreality - Dolphin Assassins Yield the Greatest Movie Poster and Tagline Ever? |

2010 Feb 3, 6:52"Unwittingly, he trained a dolphin to kill the President of the United States." It sounds like a sentence constructed one word at a time by different people
PermalinkCommentshumor movie dolphin us poster

Steven Pinker on the myth of violence | Video on TED.com

2010 Feb 1, 8:39"Steven Pinker charts the decline of violence from Biblical times to the present, and argues that, though it may seem illogical and even obscene, given Iraq and Darfur, we are living in the most peaceful time in our species' existence." Working up towards Forever Peace?PermalinkCommentsvideo history violence culture ted steven-pinker game-theory

Harbor across from Oceano

2010 Jan 31, 1:03

sequelguy posted a photo:

Harbor across from Oceano

PermalinkCommentsca sunset water harbor boat halfmoonbay oceano

Oceano Hotel

2010 Jan 31, 1:03

sequelguy posted a photo:

Oceano Hotel

PermalinkCommentsca hotel halfmoonbay oceano

YouTube - "Lost" Recapped by Extended Italian Family

2010 Jan 30, 2:52PermalinkCommentshumor lost parody tv

YouTube - Charlie Brooker - How To Report The News

2010 Jan 30, 2:26Similar to the "This is the title of a typical incendiary blog post" (http://faultline.org/index.php/site/item/incendiary/) except this is a typical news report. "...and this is a lighthouse keeper being beheaded by a lighthouse beam."PermalinkCommentsbbc humor video via:waxy satire journalism tv news

Thought Experiments and Design Principles

2010 Jan 29, 3:54

Raymond Chen has some thought experiments useful for discovering various kinds of stupidity in software design:

Tim Berners-Lee's principles of Web design includes my favorite: Test of Independent Invention. This has a thought experiment containing the construction of the MMM (Multi-Media Mesh) with MRIs (Media Resource Identifiers) and MMTP (Muli-Media Transport Protocol).

The Internet design principles (RFC 1958) includes the Robustness Principle: be strict when sending and tolerant when receiving. A good one, but applied too liberally can lead to interop issues. For instance, consider web browsers. Imagine one browser becomes so popular that web devs create web pages and just test out their pages in this popular browser. They don't ensure their pages conform to standards and accidentally end up depending on the manner in which this popular browser tolerantly accepts non-standard input. This non-standard behavior ends up as de facto standard and future updates to the standard essentially has had decisions made for it.

PermalinkCommentstechnical design principles software development

A look into the past « Flickr Blog

2010 Jan 28, 4:28Photos of locations in present day with aging photos of the same location overlaid. Cool idea, nice execution, and also does that lady have a pet rabbit on a leash?
PermalinkCommentsart photo flickr history

This is the title of a typical incendiary blog post - Coyote Crossing

2010 Jan 28, 2:32A typical blog post with typical blog post comments... "This comment gives a link to a YouTube video which is proffered as an excellent example of the thesis of the post, but, is actually only tangentially so at best."PermalinkCommentshumor blog web troll

Chromium Blog: Security in Depth: New Security Features

2010 Jan 27, 9:56Some of the new security features in Chrome: XSS filter, HTTPS only, HTML5 origin header, and HTML5 postMessage function.PermalinkCommentshtml5 html script xss csrf chrome browser google security web technical

Keep Calm and Carry Yarn poster 12 x 18 red by jenniegee on Etsy

2010 Jan 26, 1:42
PermalinkCommentshumor photo sign terrorism propaganda yarn

michaelv.org

2010 Jan 25, 7:47Windows 3.1 done in HTML and Javascript. Memories...PermalinkCommentswindows windows31 humor web microsoft javascript html

How Flash Drives and Social Engineering can Compromise Networks

2010 Jan 22, 1:44"He seeded the customer's parking lot with USB flash drives, each of which had a Trojan horse installed on it. When the employees arrived for work in the morning, they were quite excited to find the free gadgets laying around the parking lot. Employees eagerly collected the USB drives and plugged them into the first computers they came across: their own workstations."PermalinkCommentsvia:ericlaw security usb windows social-engineering computer technical

Vampire Prevention Fail - FAIL Blog: Epic Fail Pictures and Videos of Owned, Pwnd and Fail Moments

2010 Jan 21, 4:25You cannot argue with his logic.PermalinkCommentshumor video garlic vampire news fail fail-blog

Coding Horror: You're Reading The World's Most Dangerous Programming Blog

2010 Jan 20, 8:28GZip vs Deflate execution speeds. Deflate found to be much faster in particular cases and about the same in the rest.PermalinkCommentsgzip deflate performance technical http compression programming development blog

McAfee Security Insights Blog » Blog Archive » Operation “Aurora” Hit Google, Others

2010 Jan 20, 8:26McAfee on the China v Google attack.PermalinkCommentshack hackers security google browser web ie china microsoft malware ie6 technical
Older EntriesNewer Entries Creative Commons License Some rights reserved.