to … is to be human
The Narcassist's Prayer
	
	The Narcassist's Prayer
	
					Read more ⟶
				The worst IT invention ever
	
	dynamic linking
	
					Read more ⟶
				Why optimism?
	
	Why optimism is the better choice -- written by a pessimist
	
					Read more ⟶
				Wrong assumptions
	
	Wrong assumptions are at the hart of all doomsday predictions
	
					Read more ⟶
				phoenix questions
	
	The Phoenix questions checklist
	
					Read more ⟶
				Comments to 68 Bits of Unsolicited Advice
	
	Comments to 68 Bits of Unsolicited Advice
	
					Read more ⟶
				How to write code?
	
	How to write code? Or: things I would have loved to have heard 20 years ago.
DEFINE YOUR DATA FIRST
Start with your data-model. Make sure you define all data you need, what the types are, and how they are related.
If possible allow some flexibility, for instance by allowing key => value strings to extend the properties a entity can have.
In case of doubt, use SQLite for data-storage. Try to only use SQL that can also be used for MySQL, MS-SQL, PgSQL, etc.…
	
					Read more ⟶
				default security responses
	
	Dear Submitter,
We would like to thank you for the efforts you made in reporting this issue, but we’re afraid we can’t honor this as a valid bug-report.
The kind of bug you’re reporting is a:
 content injection attack XSS attack ‘missing features’ thingy (HSTS, X-XSS, DKIM, SPF, etc) set header because browser X is crappy and doing stupid, insecure things (X-Content-Type-Options,etc) report I think you should do X advisory valid bug Behavior that is there for a real purpose information disclosure report valid bug if it was exploitable on our platform Theoretical behavior that’s not exploitable in the real world (TM) Disclosure of info that might be used during the reconnaissance stage  The reason for not honoring the bug is that:…
	
					Read more ⟶
				How to get things done?
	
	a simple and effective Yellow note TODO system
	
					Read more ⟶
				My toaster
	
	My toaster
	
					Read more ⟶
				DARPA's Heilmeier Catechism
	
	George H. Heilmeier, a former DARPA director (1975-1977), crafted a set of questions known as the “Heilmeier Catechism” to help Agency officials think through and evaluate proposed research programs.
 What are you trying to do? Articulate your objectives using absolutely no jargon. How is it done today, and what are the limits of current practice? What is new in your approach and why do you think it will be successful?…
	
					Read more ⟶
				Drawbacks of smartphones
	
	Drawbacks of smart-phones  Planned obsolidence (no more updates after N years). All the time fighting with pre-installed apps and applications that always want to do the wrong thing Short battery life. There is always “range ancienty” with a smartphone. Smartphones do everything ok, except calling. Smartphone prevent you from seeing and interacting with the outside world. always distractions and notifications. They are expensive. No more almost daily updating of apps on your phone.…
	
					Read more ⟶
				Pen and Paper games
	
	Pen and paper games
	
					Read more ⟶
				Rob Pike's 5 Rules of Programming
	
	Rob Pike's 5 Rules of Programming
	
					Read more ⟶
				The Cattle mutilations wave of 1973-1980
	
	The Cattle mutilations wave of 1973-1980
	
					Read more ⟶
				The Cult of Done Manifesto
	
	The Cult of Done Manifesto
	
					Read more ⟶
				MSjoke
	
	MSjoke
	
					Read more ⟶
				Useful sed
	
	usefull sed tips and tricks
	
					Read more ⟶
				readline shortcuts
	
	readline shortcuts
	
					Read more ⟶
				Slashdot spamsolutions
	
	Slashdot spamsolutions
	
					Read more ⟶