The “Chad” bug
The "chad bug".The Hangouts Dialer on Android absolutely REFUSES to find 2 of my contacts. I have 132 of them in the group "My Contacts" and all of them have phone numbers. Wanting to troubleshoot I...
View ArticleMake a Doom level, part 2: design
Part 1: the basics· Part 2: design· Part 3: cheatingI assume you’ve read the introduction, which tells you the basics of putting a world together.This post is more narrative than mechanical; it’s a...
View ArticleDo the math on your stock options
Are you considering an offer from a private company, which involves stock options? Do you think those stock options might be worth something one day? Are you confused? Then read this! I’ll give you...
View ArticleMost commonly used statistical tests and implementation in R
This chapter explains the purpose of some of the most commonly used statistical tests and how to implement them in R1. One Sample t-TestWhy is it used?It is a parametric test used to test if the mean...
View ArticleIntroducing Guesstimate, a Spreadsheet for Things That Aren’t Certain
Introducing Guesstimate, a Spreadsheet for Things That Aren’t CertainExisting spreadsheet software is made for analyzing tables of data. Excel, Google Sheets, and similar tools are fantastic for doing...
View ArticleHaskell Game Server – Part 2
Posted on January 1, 2016Previous PostsPart 1 - Networking & Message ProtocolsPart 1 Followup - A brief followup to my original post.TopicsIn today’s post I will cover which messages we shuffle...
View Article} // good to go
Okay, let's see what we've got. Two sets of annotated training materials. Six books. Over four dozen online videos. Some 80 articles, interviews, and academic papers. A slew of blog entries, and more...
View ArticleThe Website Obesity Crisis
This is the text version of a talk I gave on October 29, 2015, at the Web Directions conference in Sydney. [53 minute video].The CrisisFake FixesFat AdsFat AssetsChickenshit MinimalismInterface...
View ArticleClojure 2015 Year in Review
Another year, another year-in-review post. To be honest, I feel like any attempt I make to summarize what happened in the Clojure world this year is largely moot. Clojure has gotten so big, so — dare I...
View ArticleTor Anonymity: Things Not to Do
Contents1Things NOT to do1.1I wonder what my site looks like when I'm anonymous.1.2Login into your real life Facebook account and think you are anonymous.1.3Never login into accounts you ever used...
View ArticleUntangling an Accounting Tool and an Ancient Incan Mystery
PhotoPatricia Landa, an archaeological conservator, painstakingly cleans and untangles the khipus at her house in Lima.Credit William Neuman/The New York TimesLIMA, Peru â In a dry canyon strewn with...
View ArticlePeter Naur: Programming as Theory Building (1985)
IntroductionThe present discussion is a contribution to the understanding of what programming is. It suggests that programming properly should be regarded as an activity by which the programmers form...
View ArticleUp for Grabs: Projects which have curated tasks for new contributors
This is a list of projects which have curated tasks specifically for new contributors. These are a great way to get started with a project, or to help share the load of working on open source...
View ArticleAgromafia
In Italy, Bill Whitaker finds out that the long arms of the Mafia extend to agricultural products, especially olive oil, on which the mob makes huge profits by exporting imitationsThe following is a...
View ArticleIPv6 celebrates its 20th birthday by reaching 10% deployment
Twenty years ago this month, RFC 1883 was published: Internet Protocol, Version 6 (IPv6) Specification. So what's an Internet Protocol, and what's wrong with the previous five versions? And if version...
View ArticleThe Surreal Story of StubHub Screwing Over a Kobe Fan
January 6, 2016 As readers of TheLead know, we love nothing more than some good ol’ corporate muckraking, so when a reader named Jesse Sandler emailed us with a story that sounded too bizarre to be...
View ArticleThree Years as a One-Man Startup
3 Years as a One Man StartupI’ve spent most of the past 3 years creating one language learning web-app, Readlang.I wrote about my struggle to get this off the ground almost two years ago and was...
View ArticleQuiet naval hero who rescued Enigma machine dies aged 95
While the Germans jumped into the Atlantic, a 20-year-old David Balme and small team of sailors climbed into a rowing boat with simple instructions: Get what you can out of her.Balme, who’d been in the...
View ArticlePostgres 9.5 Release Notes
A dump/restore using pg_dumpall, or use of pg_upgrade, is required for those wishing to migrate data from any previous release.Version 9.5 contains a number of changes that may affect compatibility...
View ArticlePostgreSQL 9.5: UPSERT, Row Level Security, and Big Data
Posted on Jan. 7, 20167 JANUARY 2016: The PostgreSQL Global Development Group announces the release of PostgreSQL 9.5. This release adds UPSERT capability, Row Level Security, and multiple Big Data...
View Article