public marks

PUBLIC MARKS from micah

08 February 2006

Mental State Called Flow

(via)
Do you plan to get into flow, does it come upon you more as a kind of inspiration, or is it not necessary for you? Do you use tactics to improve your team's ability to flow? Which particular events disrupt flow the most, and how do you solve them?

Boing Boing: Songbird, the "open source iTunes killer," flies today

(via)
A team led by ex-Winamp-er Rob Lord today released a preview edition of Songbird, a desktop media player that offers an open source alternative to services like Apple's iTunes and the Windows Media Player. Instead of connecting to one locked store full of DRMmed goods, it can connect to any and all available music (and video) on the internet.

The Fantasy Novelist's Exam

(via)
Ever since J.R.R. Tolkien and C.S. Lewis created the worlds of Middle Earth and Narnia, it seems like every windbag off the street thinks he can write great, original fantasy, too. The problem is that most of this "great, original fantasy" is actually poor, derivative fantasy. Frankly, we're sick of it, so we've compiled a list of rip-off tip-offs in the form of an exam.

07 February 2006

Lorem ipsum dolor sit amet - loremipsum.net

by 1 other (via)
www.loremipsum.net is a really well-designed website with much helpful information. (hehe)

06 February 2006

Whitedust 101 - Welcome to the world of security

(via)
We aim to provide the basic teaching and reference material to enable the less technical among us to better understand the relevance of the news posted on the site and it's application in everyday computing.

Power Shell Usage: Bash Tips & Tricks

by 1 other (via)
Tips for driving Bash better in everyday Linux use

Ecclesiastical Calendar: Enter a Year...

(via)
Easter is the Sunday after the Paschal Full Moon. The Paschal Full Moon may occur from March 21 through April 18, inclusive. Thus the date of Easter is from March 22 through April 25, inclusive.

EASTER DATES to 2010 - Christian Catholic Gregorian and Orthodox Easter Sunday Public Bank Holidays

(via)
The aim of the Easter Dating Method is to maintain, for each Easter Sunday, the same season of the year and the same relationship to the preceding astronomical full moon that occurred at the time of His resurrection in 30 A.D.

03 February 2006

Let the Good Times Roll--by Guy Kawasaki: The Effective Emailer

by 2 others (via)
I have strong feelings about email etiquette and what it takes to get your email read--and answered. As someone who gets dozens of emails every day and sends a handful of emails every day trying to get strangers to do things (“digital evangelism”), I offer these insights to help you become a more effective emailer.

Extra Man Sliding Puzzle Explained

(via)
At the start, there are twelve men in the image. After the two sections change places, there are thirteen men. The puzzle is figuring out where the thirteenth man came from.

Money-Saving Secrets : RealSimple.com

(via)
20 ways to plug hidden financial leaks — and save up to $3000 a year

4-1/2 tiny ways to master Mail.app | 43 Folders

Yeah, I know: your world would implode if you had two hours without email. You’d be fired, jailed, or might even miss that whole thread about lunch at Chili’s vs. Applebee’s. Friend, someday you will actually hear yourself defending your email addiction as a necessity, and it will seem very very weird to you.

02 February 2006

AIM Sniff

by 1 other (via)
AIM Sniff is a utility for monitoring and archiving AOL Instant Messenger messages across a network. You can either do a live dump (actively sniff the network) or read a PCAP file and parse the file for IM messages.

Splunk: Download Now

(via)
Splunk is the new way to see inside the data center. It's search software that indexes all your fast moving IT data as it happens. From one place, make sense of logs, configuration files, message queues, JMX, SNMP and database transactions from any system, application or device.

Malicious Malware: attacking the attackers, part 2

(via)
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two.

Influential Interactive Marketing: Using Blogs for Personal Marketing

(via)
Guy Kawasaki has an interesting post on his blog today about his traffic after 30 days of blogging. Not surprisingly, his blog is hugely popular, with lots of loyal readers ... but one really interesting point from this is how positively his blog has impacted sales of his book.

Slashdot | Linux Powers Military UGV

(via)
The prototype ran on Windows, but the robot arm had a tendency to keep throwing chairs at the enemy...

The Programmers Stone

by 1 other (via)
The purpose of this site is to recapture, explore and celebrate the Art of Computer Programming. By so doing we hope to help the reader either become a better programmer, understand what less experienced programmers are struggling with, or communicate more effectively with other experienced programmers.

Praise the Lord, pass the dinner - 02/01/06 - The Detroit News

(via)
On Monday night, WMUZ Christian Radio morning DJ Jon Culbert was leading his Bible study at Fuddruckers in Dearborn. Culbert happened to notice...Shaun Alexander , Seattle Seahawks starting running back and NFL MVP. What particularly caught Culbert's attention was that the fellows at the table...were saying grace before their meal.

XML.com: High-Performance XML Parsing With SAX

SAX is an event-driven model for processing XML. Rather than building a complete representation of the document, a SAX parser fires off a series of events as it reads the document from beginning to end. Those events are passed to event handlers, which provide access to the contents of the document.

Ten CSS tricks you may not know

by 29 others
CSS font shorthand rule, Two classes together, CSS border default value, CSS document for printing, Image replacement technique, CSS box model hack alternative, Centre aligning a block element, Vertically aligning with CSS, CSS positioning within a container, and Background colour running to the screen bottom

01 February 2006

Imagining the Google Future - January 01, 2006

by 2 others (via)
What kind of company will Google become in the coming decades? Will it succumb to hubris and flame out like so many of its predecessors? Or will it grow into an omnipresent, omnipotent force--not just on Wall Street or the Web, but in society?

Welcome to µTorrent

by 22 others (via)
µTorrent, the BitTorrent client that is..

» Can great software live in 130 kilobytes? | George Ou | ZDNet.com

(via)
When I first downloaded the software back in September 2005 when µTorrent was first released, I figured it was probably just a novelty application that weighed in at just over 100 kilobytes (compressed binary).

Malicious Malware: attacking the attackers, part 1

(via)
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two.

micah's TAGS

search:

limit:50 100 200

24   3d   ajax   amazing   apps   attitude   audio   bash   bestof2005   blogging   bookmarking   boxmodel   business   buttons   calendar   career   cars   christianity   creativity   css   design   detroit   drupal   dummy   ecommerce   effects   email   firewall   flash   food   free   fuel   funny   gadgets   games   geocaching   godbit   google   graphics   guykawasaki   hack   health   html   humor   images   infosec   kids   languages   lego   linux   marketing   midi   mp3   music   network   news   photos   php   plugins   podcast   podcasting   politics   productivity   programming   prostreet   python   racing   regexp   rss   satire   search   security   shell   sitcom   social   software   sound   speaking   starwars   stock   synth   tagging   technology   time   tolkien   tutorial   tv   usability   utilities   video   vst   web   web2.0   webstandards   why   wifi   windows   work   xhtml   xml