The brain is fascinating. It’s complex and powerful, and despite the best efforts of neuroscientists, so much of it is still unknown. Too often, folk neuroscience or simply brain-related words are used to sell us products or ideas without any real basis.
Knockoutjs context debuggerShows the knockout context & data for the selected dom node in a sidebar of the elements pane. Knockoutjs debugging extension. Adds a extra sidebar in the elements pane of the chrome dev tools with the relevant knockout context and data for the selected element.
Selecting Hair with Refine Edge in Photoshop CS5If there’s one thing every Photoshop user wants to know, it’s how to select someone’s hair in a photo.
C#/.NET Little Pitfalls: The Dangers of Casting Boxed ValuesStarting a new series to parallel the Little Wonders series. In this series, I will examine some of the small pitfalls that can occasionally trip up developers. What happens when we try to assign from an int and a double and vice-versa?
Securing Internal ApplicationsA common infrastructure problem is managing access to internal applications.
Compile-Time Verification and I/OA surprisingly common question people ask me when I talk about compile-time checking of pre-/post-conditions and invariants is: how do you deal with I/O? To understand what the difficulty is, let’s consider a simple example in Whiley: define nat as int where $ >= 0 define pos as int where $ > 0
An HTTP reverse proxy for realtimePushpin makes it easy to create HTTP long-polling and streaming services using any web stack as the backend. It’s compatible with any framework, whether Django, Rails, ASP, or even PHP.
In-kernel memory compressionAmdahl's law tells us that there is always a bottleneck in any computing system. Historically, the bottleneck in many workloads on many systems is the CPU and so system designers have made CPUs faster and more efficient and also continue to increase the number of CPU cores even in low-end systems.
Running a software team at GoogleI'm often asked what my job is like at Google since I left academia. I guess going from tenured professor to software engineer sounds like a big step down.
Twisted Oak Studios : Unity3D Consulting : Technical MagicLast week I talked about checking preconditions, which is a well known tenet of defensive programming. This week I want to talk about another “obvious” rule of thumb: using methods that have been purposefully weakened.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.