A command line google search interface
This is pretty interesting. In that it works. I wonder if it will get blocked by some corporate firewalls as it is a means to bypass content filtering right now...http://goosh.org/
View ArticleShooting Fireworks by Hacking My Camera
Well 2 days of preparation and a lot of reading really paid off. The last few years I have not been very happy with my photographic results from events like the 4th of July shows. So this year I...
View ArticleTechnical Tidbits
Over the years I have run into hundreds of technical "oh that is cool" or "that is good to know" items. Of course months later I forget them but I remember that some little slight of hand is possible....
View ArticleWindows Keyboard Shortcuts
This is just a random list of keyboard shortcuts for use with any version of the Microsoft Windows Operating System. Each keyboard shortcut is designed to increase user productivity by eliminating the...
View ArticleAll of bash history forever and across multiple sessions
The last terminal to exit wins the "who's history is saved" game. Unless you pull a cute Linux stunt or three.Update: A better solution is now available All bash history revisited: Load time solved...
View ArticleA friend asked about using Dropbox vs. Carbonite
Today a friend asked me which was a better backup solution Dropbox (http://dropbox.com/ if your going to sign up please use this referral URL http://db.tt/74rAyEsm) or Carbonite (http://carbonite.com)....
View ArticleNatural Order is the future of concurrent processing
David Ungar gave a Talks on Computing Systems (TOCS) at Carnegie Mellon University called "Everything You Know (About Parallel Programming) Is Wrong!: A Wild Screed About the Future."...
View ArticleAll of bash history revisited: load time solved plus directory history
Imagine logging into a box after a nice long three day weekend and asking yourself "self, what was I doing last Thursday?" or "what did I do on this server when I was here nearly a month ago?"What if...
View ArticleReal world damaged caused by a cyber warfare weapon
Cyber warfare HAS cause real world damage on purpose. The Stuxnet computer virus was designed and used to purposefully damage a specific Iranian nuclear facility. It got there by typical computer virus...
View ArticleThe Little Known Label Option For diff
I love it when I run over a simple solution to what seemed like a difficult (or at least convoluted) problem. Today I needed to generate some patch files to create a Crucible code review PRIOR to...
View Article
More Pages to Explore .....