Sunday, June 30, 2013

Umbrella tomolo!

Gonna rain tomolo, how about staying at home to suggest and vote on ideas at


via WordPress


What is Huginn?

Huginn is a system for building agents that perform automated tasks for you online. They can read the web, watch for events, and take actions on your behalf. Huginn’s Agents create and consume events, propagating events along a directed event flow graph. Think of it as Yahoo! Pipes plus IFTTT on your own server. You always know who has your data. You do.


What is talkatv?

talkatv is a comment service much like DISQUS or IntenseDebate.

talkatv is open source and free to use.

talkatv is embedded on any page and uses XMLHttpRequest level 2 and Cross-Origin Resource Sharing to post the comment back to the server.

talkatv requires JavaScript, but has a non-javascript fallback which is a link to the talkatv server with an optional but recommended ?uri={{ page_uri }} argument. If the uri argument is not provided, talkatv will try to get the page URI from the HTTP Referer header.

talkatv supports OpenID authentication.


== Convection

Convection is an open-source file upload tool for businesses and contractors
who need to host and swap files with their clients in a secure manner. Convection is designed to meet the needs of companies who need to swap files
with clients or contractors under the following constraints:

* Secure encrypted file transfer (via SSL)
* Access control for files, with group permissions
* Web based access so that access is not limited by firewalls that may
restrict access to SFTP or other port 22 solutions.


via WordPress

The IT Crowd – Series 2 – Episode 3: Piracy warning by ITCrowdChannel


via WordPress

Saturday, June 29, 2013

stuff that may be useful..

openssh..reusing ssh connections since 2006..

free for 5 services..what services???

diff in your browser..nice..


via WordPress

ASMR Binaural Psionic Initiation Role-Play by ardraneala


via WordPress

Umbrella tomolo!

Gonna rain tomolo, how about staying at home to suggest and vote on ideas at


Wednesday, June 26, 2013

india, bigger smartphone market than japan.

India is growing four times faster than the global average. Worldwide smartphone volumes expanded 39% YoY, compared with 163% YoY across India, during Q1 2013. The Indian market is rising quicker than China (86% YoY), Japan (24% YoY), the US (19% YoY) and almost all other major countries.

Nokia remains the number one manufacturer with overall 21.8% market share while South Korean electronics giant Samsung and homegrown mobile company Micromax are at second and third spot with 13.7% and 6.6% market share respectively.

but what is a smartphone? e.g. does brew count? ability to run j2me? , cool shit.

This is the first part in an on-going series about email backend. We'll cover a variety of high and low-level tricks we use to ensure you get the best possible email integration out there. Shoot us an email (engineering@) if you'd like to have us cover any particular aspects of our email integration.

Per-recipient tracking pixels

By utilizing SMTPs RCPT TO command, we can send unique message content to each recipient of an email while still having recipients believe they are receiving the same message. Modifying an example from Wikipedia's SMTP article, we can illustrate how this would work in practice:
S: 220 ESMTP Postfix
S: 250 Hello, I am glad to meet you
S: 250 Ok
S: 250 Ok
S: 354 End data with <CR><LF>.<CR><LF>
C: From: "Anthony" <>
C: To: "Alice" <>, "Bob" <>
C: Date: Thurs, 23 May 2013 16:02:43 -0500
C: Subject: Test message
C: Hello Alice!
C: .
S: 250 Ok: queued as 1234
S: 250 Ok
S: 250 Ok
S: 354 End data with <CR><LF>.<CR><LF>
C: From: "Anthony" <>
C: To: "Alice" <>, "Bob" <>
C: Date: Thurs, 23 May 2013 16:02:43 -0500
C: Subject: Test message
C: Hello Bob!
C: .
S: 250 Ok: queued as 1235
S: 221 Bye
Notice how we're sending 2 different messages (Hello Alice! vs Hello Bob!) with the same To/From/Cc/Date/Subject. This provides the basis to add unique tracking pixel to every email sent and maintain normal email behavior for our senders.
To generate our tracking pixels we encode both the and email address for every recipient in the TO/CC/BCC of the email. Remember that each recipient should have a different pixel_url.
for recipient in email_to + email_cc + email_bcc:
    pixel_url = "/email_opened/%s/tracking.png" % base64.b64encode(json.dumps({'email_id': 'emai_123ABC', 'email_address': recipient'}))
Every time a tracking image URL is requested from an email client, our app responds with the smallest transparent 1x1 PNG representation and asynchronously creates an EmailOpen(datetime_opened, email_id, email_address) event in our database.

Remove any messages stored by the SMTP server

Google's SMTP servers store a copy of every message sent in your Sent Messages directory. Since we've created unique messages for each recipient, we need to delete all of these messages since we don't want our senders to accidentally trigger events by opening sent messages or be confused by multiple copies of the same message appearing in their sent folder.
To find these messages we perform the following search within each of our potential sent message IMAP folders.
# IMAPClient

def imap_search(email):
    query = ' '.join(['HEADER Message-ID %s' % msg_id for msg_id in email.message_ids])
    query = 'OR ' * (len(email.message_ids) - 1) + query
uids = imap_search(email)
We can then search for and set the flags of these messages to Deleted and expunge them from the server. If supporting Gmail, remember deleting messages is a bit different in that you must move a message first to the Trash folder and then delete it. Setting the Deleted flag on a message outside of Trash will be ignored.
if uids:
    Gmail only deletes messages if you move to their
    designated Trash mailbox and then delete.
    if gmail:
        imap.copy(uids, trash_mailbox)
        select_mailbox(imap, trash_mailbox)
        # uids change after a copy to another folder
        uids = imap_search(email)

Store sent mail in IMAP

When sending email through services like MailChimp, ConstantContact, or ToutApp, you may have been frustrated since sent mail isn't stored in your email account's Sent mail folder -- I know I was. So we made sure your mailbox stays up to date no matter if you're sending emails within or not.
If using a service like Gmail which stores all sent messages automatically in IMAP, we additionally ensure the headers are consistent so scenarios where the FROM header contains "" instead of "Anthony Nemitz <>" don't occur. This is just another way we try and make your email sending experience as consistent as possible.
So, to grab the original headers from one of our sent messages we use the FETCH command. Note that this operation should be preformed before the messages are deleted (previous section).
Store the original headers so our faked email stored in
the Sent folder looks legit. We only fetch a single UID
(in this case 5899) since the desired headers will be
consistent across copies.
results = imap.fetch([5899], ['BODY.PEEK[HEADER.FIELDS (FROM TO CC BCC)]'])
# the result is something of the form:
# {5899: {'BODY[HEADER.FIELDS (TO CC BCC)]': 'To:,\r\nFrom: Anthony Nemitz <>\r\n\r\n'}}

# implementation left to the reader
original_headers = fetch_result_to_dict(results)
Finally, we append a message constructed from the original text of the Email activity and the FROM/TO/CC/BCC fields of the sent messages we've since deleted (or our Email activity as a fallback).
message = Message(
            sender=original_headers.get('From', email.sender),
            bcc=original_headers.get('Bcc', email.bcc),
                    ) for att in email.attachments])
imap.append(sent_mailbox, message, flags=['\\Seen'], msg_time=email.date_created)

a gem of a comment...

The problem..
which is damn cool already.

Skip to the comment..

This is nothing. Our 100k line vod web app was ripped off wholesale, with a new backend built from scratch, and repurposed to show pirate content. This was some serious engineering chops and time investment that went into a ripping off a site with hundreds upon hundreds of templates and thousands of lines of js and ajax interacting with an unknown backend that had to be reverse-engineered. We discovered it because they forgot to change the Google Analytics code (which they were polite enough to fix once we brought it to their attention via their facebook page) so we saw this huge traffic content ramp up from Georgia. There is no way to view it as anything but flattering.

Monday, June 24, 2013

A Cruel and Unusual Record

THE United States is abandoning its role as the global champion of human rights.
Revelations that top officials are targeting people to be assassinated abroad, including American citizens, are only the most recent, disturbing proof of how far our nation’s violation of human rights has extended. This development began after the terrorist attacks of Sept. 11, 2001, and has been sanctioned and escalated by bipartisan executive and legislative actions, without dissent from the general public. As a result, our country can no longer speak with moral authority on these critical issues.
While the country has made mistakes in the past, the widespread abuse of human rights over the last decade has been a dramatic change from the past. With leadership from the United States, the Universal Declaration of Human Rights was adopted in 1948 as “the foundation of freedom, justice and peace in the world.” This was a bold and clear commitment that power would no longer serve as a cover to oppress or injure people, and it established equal rights of all people to life, liberty, security of person, equal protection of the law and freedom from torture, arbitrary detention or forced exile.
The declaration has been invoked by human rights activists and the international community to replace most of the world’s dictatorships with democracies and to promote the rule of law in domestic and global affairs. It is disturbing that, instead of strengthening these principles, our government’s counterterrorism policies are now clearly violating at least 10 of the declaration’s 30 articles, including the prohibition against “cruel, inhuman or degrading treatment or punishment.”
Recent legislation has made legal the president’s right to detain a person indefinitely on suspicion of affiliation with terrorist organizations or “associated forces,” a broad, vague power that can be abused without meaningful oversight from the courts or Congress (the law is currently being blocked by a federal judge). This law violates the right to freedom of expression and to be presumed innocent until proved guilty, two other rights enshrined in the declaration.
In addition to American citizens’ being targeted for assassination or indefinite detention, recent laws have canceled the restraints in the Foreign Intelligence Surveillance Act of 1978 to allow unprecedented violations of our rights to privacy through warrantless wiretapping and government mining of our electronic communications. Popular state laws permit detaining individuals because of their appearance, where they worship or with whom they associate.
Despite an arbitrary rule that any man killed by drones is declared an enemy terrorist, the death of nearby innocent women and children is accepted as inevitable. After more than 30 airstrikes on civilian homes this year in Afghanistan, President Hamid Karzai has demanded that such attacks end, but the practice continues in areas of Pakistan, Somalia and Yemen that are not in any war zone. We don’t know how many hundreds of innocent civilians have been killed in these attacks, each one approved by the highest authorities in Washington. This would have been unthinkable in previous times.
These policies clearly affect American foreign policy. Top intelligence and military officials, as well as rights defenders in targeted areas, affirm that the great escalation in drone attacks has turned aggrieved families toward terrorist organizations, aroused civilian populations against us and permitted repressive governments to cite such actions to justify their own despotic behavior.
Meanwhile, the detention facility at Guantánamo Bay, Cuba, now houses 169 prisoners. About half have been cleared for release, yet have little prospect of ever obtaining their freedom. American authorities have revealed that, in order to obtain confessions, some of the few being tried (only in military courts) have been tortured by waterboarding more than 100 times or intimidated with semiautomatic weapons, power drills or threats to sexually assault their mothers. Astoundingly, these facts cannot be used as a defense by the accused, because the government claims they occurred under the cover of “national security.” Most of the other prisoners have no prospect of ever being charged or tried either.
At a time when popular revolutions are sweeping the globe, the United States should be strengthening, not weakening, basic rules of law and principles of justice enumerated in the Universal Declaration of Human Rights. But instead of making the world safer, America’s violation of international human rights abets our enemies and alienates our friends.
As concerned citizens, we must persuade Washington to reverse course and regain moral leadership according to international human rights norms that we had officially adopted as our own and cherished throughout the years.
Jimmy Carter, the 39th president, is the founder of the Carter Center and the recipient of the 2002 Nobel Peace Prize.

a tokyo train's pov

Hyper Drive YURIKAMOME from darwinfish105 on Vimeo.
my blog(Japanese) :
camera : Panasonic DMC-GH3
lens : OLYMPUS M.ZUIKO DIGITAL ED 9-18mm F4.0-5.6
music : Solar Storm by BS

Sunday, June 23, 2013

A Democratic country that is not usa

"As a matter of fact, of the 92 elections that we've monitored, I would say that the election process in Venezuela is the best in the world."
Oblitas said that the gap between those able to vote and those registered had been reduced to 3.5%, something she characterised as “an advance... we have been applying a policy... of inclusion”.
Venezuela’s current growth is generally described as unsustainable, with various negative scenarios put forth, including spiraling debt, inflation, and balance of payments crises.  However, these pessimistic forecasts have been far off the mark for most of the past decade.  This paper looks at the available economic data to see if Venezuela’s economic recovery could be sustained, or even accelerated.  It finds that Venezuela’s current economic growth is sustainable and could continue at the current pace or higher for many years.

Remember Phil Zimmermann - back in 1996

Today we live in the information age. Everyone has computers. All the trappings of the information age are part of our lives. Paper mail is being replaced by electronic mail. Digital communications is taking over. We need encryption. The common person needs encryption to function effectively in the information age. So it's time for cryptography to step out of the shadows of spies and military stuff, and step out into the sunshine and be embraced by the rest of us.
If our government ever goes bad, as sometimes happens in a democracy... Sometimes in a democracy bad people can be elected, and if democracy is allowed to function normally, these people can be taken out of power by the next election. But if a future government inherits a technology infrastructure that's optimized for surveillance, where they can watch the movements of their political opposition, they can see every bit of travel they could do, every financial transaction, every communication, every bit of email, every phone call, everything could be filtered and scanned and automatically recognized by voice recognition technology and transcribed.
As we extrapolate our technologies into the future, if the incumbency has that political advantage over their opposition, then if a bad government ever comes to power, it may be the last government we ever elect.

incapsula already admit cloudflare is faster..
For those running Apache web servers, you can use mod_rewrite to issue HTTP redirects. The method for enabling mod_rewrite will vary depending on apache version and operating system, but for Apache 2, it is usually as simple as removing the # from the following line in the httpd.conf file.

#LoadModule rewrite_module modules/
Once mod_rewrite is enabled, you will need to insert rewrite rules into your httpd.conf file. For example, if your server is running, the following will redirect all files whose URL starts with to the Coralized version: 

RewriteEngine on
RewriteCond %{HTTP_USER_AGENT} !^CoralWebPrx
RewriteCond %{QUERY_STRING} !(^|&)coral-no-serve$
RewriteRule ^/images/foo(.*)$$1 [R,L]
You can also make use of the HTTP_HOST variable: 

RewriteRule ^/images/foo(.*)$ http://%{HTTP_HOST}$1 [R,L]
One upside of using rewrite links like this is that a server can still see each request in its webserver logs. Of course, the server will see receive an HTTP request per link; however, the upstream bandwidth will only be tiny HTTP redirects, not actual files.
A free super-fast CDN for developers and webmasters.
Search for javascript libraries, jQuery plugins, fonts, CSS frameworks and anything else you might need.
no i didnt.thinking about troublesome, must duplicate the file structure in dropbox...

and separately, why splunk is so hot...

which android device actually can run mainline linux???

among the chinese chips...

why the allwinner a10 is popular...
there's a link on that page to ubuntu lucid built for the a10("images").
honestly..this is dumb but my next question will be..will all the software it uses have to be compiled for it? "noarch" stuff will just work? hur hur...

Saturday, June 22, 2013

sounds good...this evergreen thing. except it smells like wordpress but for q&a?

Post public or private questions, solicit answers and comments, mark the best as "accepted" and organically build up a tagged, searchable database of knowledge around your product.
but i about wordpress with say the p2 theme and then load it up with auto tagging? then i dont even need to tag it then...

elsewhere..nice exchange that shows a bit of how shit works...

The scrapers could make up a cookie, yes, but then that would get checked against sessions, and if it's false then they'd get redirected to login page. So it wouldn't be pointful from a scraping perspective. It doesn't even need to be a DB hit for the most part, assuming you aren't stupid and are signing your cookies, it's a fairly simple thing to verify at least that it's a valid cookie to bother even checking. (Recent timestamp, cryptosig valid. These are fairly fast, and don't require DB hit.)

Tor doesn't have enough bandwidth for it to be pointful from merely a DDOS perspective, and anyway that's not a motivation for scrapers.

Plus there's the alternate option Liz mentioned: captcha to prevent scraping but still allow anonymous visitors. Which is basically just an anonymous variant of allowing people to sign in, something I would strongly support.
Tor Hidden Service integrate quite transparently into an existing infrastructure. To reduce complexity you could keep serving the resources from the CDN (since I see that you don't block Tor users from access to * and just have a HS setup for You could have on the load balancer a 302 redirect to the .onion for users that are detected to be using Tor.
Resurrecting a dead thread, because I've just gotten bitten by Yelp's policy of blocking all TOR exits (I assume because they're using something like Emerging Threats' TOR list).  What Yelp should do is run their own TOR exit node and throttle connections from the TOR network as they see fit.  If the TOR network sees an exit with the same address as the one being requested, it'll route all traffic through that exit instead of using other exits.  This way, Yelp can have direct control over how much TOR traffic it will accept.  This solution doesn't address the problem I have, however, which is the fact that I run an exit node, but I don't use the TOR network.
The AWS bit I can definitely answer... pretty much all AWS traffic to Yelp is scrapers. Obviously there's the occasional exception, but we're talking, like, far less than a percentage point of legitimate traffic out of AWS.

To put it frankly, the amount of Yelp engineering time required to implement (and perhaps even more importantly, maintain) one of the supposed solutions mentioned in various comments here probably isn't worth it to Yelp for the amount of benefit provided.

Obviously it's hard to get solid numbers on how many Tor users there are, but estimates the number of users in the US at around 80,000. Only a fraction of those are likely to care about Yelp, and a fraction of those are probably likely to only use Tor for some services (e.g. BitTorrent) and not others.

Compared to the overall number of Yelp users, the resulting figure is very small.

does it help?

Friday, June 21, 2013

more free stuff

the ios alternative to scriptkitty looks nice..

free ios icon psds

is it like github vs bitbucket then? where startssl has a free tier, globalsign is doing free for open source projects?

2 projects by the same people, both look quite cool..

in other news, i didnt realise south east asia so power..

free Free

OutputSocket: Beautiful website for $300 within 7 days
gem of a comment:
I love seeing stuff like this. If mediocrity and minimal effort can pay off, just imagine what genuine hard work and commitment can do.
Flat UI: Free Web User Interface Kit
by far better became a long exchange of who likes 'flat'...
and if u dig down the discussion, you'll encounter
as well..

more freebies...

and some people see startups...

Dumb Ways to Die by DumbWays2Die

Or how?

Haiz..still so far...

Fried chicken...

I want...

So far away...

if the future is in the cloud, where is vmware?
everybody is doing openstack..
developers are moving towards containers.

elsewhere, gartner does a trendy one..

Gartner Digital Marketing Transit Map

did Github really raise 100m to hire sales people?

A big chunk of the $100 million has been earmarked for more than additional salespeople and office hooch. 

the same journo quoted this a mere 2 paragraphs into the article:
Asked why GitHub would need so much money, Chief Executive Tom Preston-Werner replies with an answer that fits his laid-back persona: “To make more awesome.” 

why wont the journo believe them? has it read github's blog?

GitHub Has a Sales Team?
We sure do, but figuring out what sales means within a very developer-centric company wasn't all unicorns and octocats. The siren song of big revenue gains can easily disrupt your team's ultimate goals and culture if you're not careful. It wasn't difficult to spot the slippery slope after hiring even one dedicated salesperson, so how do we optimize sales for happiness?
By putting our product and people first. If that means turning down revenue opportunities to remain true to this philosophy, so be it. Making gobs of money has never been our main focus, but we can operate this way and enjoy massive revenue growth across all of our products.
The first (and most important) thing we had going for us was a product that sells itself. With an unwavering focus on building the best products possible, we're in a wonderful position that 99% of our customers require very little handholding. People just want to use GitHub, so we make it easy to pay for it, and essentially get out of their way.

why can't the journo comprehend "awesome"? why..

It’s an unsatisfying response

is it exactly because

If you’re outside the software world, it may be hard to comprehend how important GitHub has become. 
edit: how to build a github

How to Build a GitHub from Zach Holman on Vimeo.

Thursday, June 20, 2013

closer to home they exist too.

Mud-slinging Behind The Scenes As Malaysia’s Taxi Apps Duke It Out


posted 5 hours ago
taxi malaysia
There is an ongoing land grab for taxi drivers in Malaysia, with taxi app startups aggressively targeting the handful of taxi drivers keen to jump on a digital platform.
Two year-old taxi booking startup, MyTeksi has been busy recruiting cab drivers over to its service. When I visited its offices two weeks ago, Aaron Gill, MyTeksi’s product and marketing head, said the company ramped up its efforts over the past six months to convince drivers to get smartphones and data plans.
It’s had to sell the benefits of getting hooked up to a service that allows drivers to receive jobs, rather than have to drive around looking for passengers by the side of the road.
So far, MyTeksi has recruited about 2,500 drivers covering the capital city of Kuala Lumpur, as well as Putrajaya, Selangor and Negeri Sembilan. The platform receives one booking every eight seconds, or 10,000 per day, which nets the company about $3,100 (10,000 MYR) daily.
Several competitors have joined the fray: Hopcab and TaxiMonger launched last year.
But things really started heating up in the past month, when Rocket Internet debuted its Easytaxiservice in the country.
Since Easytaxi’s launch, there have been rumors of its staff approaching cabs with MyTeksi decals and getting them to hop over to Easytaxi instead. Sources close to the companies said that Easytaxi’s staff have also helped delete the MyTeksi app from drivers’ handsets, instead replacing them with Easytaxi’s app.
Joon Chan, managing director at Rocket Internet did little to deny the rumors. “Drivers are free to use any app they want on their phones. It’s only fair since they pay for their own phones and data plans,” he said.
He added that only about 10 to 15 percent of the drivers in the country have smartphones, indicating that the addressable pool of drivers is even smaller.
But MyTeksi may be deploying its own anti-competitive tactics. Chan produced a photo of the MyTeksi app apparently prompting the driver to remove the Easytaxi app.
Chan said Easytaxi started driver acquisition on the 12th of May, and has been putting up kiosks at gas stations to recruit drivers. The startup is expanding quickly—in the past month, it’s added five new employees each week, he said.
Gill of MyTeksi, commenting on Rocket’s entrance in its space, said: “They’ve made us better and sharper. We are growing our fleet at a faster pace now, enhancing our service levels and will continue to work hard to maintain our edge.
“We must be doing something right if a well-funded and experienced organization such as Rocket Internet finds this space worth their time and investment.”
MyTeksi is in the midst of raising its Series A, and has just expanded to Manila. Under Rocket Internet, the Easytaxi service is in 10 different countries now.
The App Gap For Booking Taxis
The opportunity for taxi apps in Malaysia has been created by the less-than-stellar reputation of taxi drivers there.
An old 2008 survey by The Expat ranked Malaysia’s taxis the worst in the world. And other accounts of errant behavior continue to pop up in the media, suggesting this hasn’t changed since.
When I was there two weeks ago, most of the taxis I flagged insisted on charging a flat (and significantly higher) fee, refusing to use the official meter for the ride. Some of the locals said being cheated or even robbed by cab drivers was still an issue in the country.
Gill said taxi apps have been helping to regulate drivers by registering them to the service, and allowing them to be tracked as they travel.
Another factor contributing to the opportunity is the lack of competition with any large taxi company in Malaysia. In Singapore, for example, the main cab operator, ComfortDelGro, produces an app for its fleet which covers more than 50 percent of the local market. The majority of cabs in Malaysia, however, still rely on radio transmission for job calls. The only cab operator that has produced an app appears to be Sunlight Taxi, but it only has about 10 percent market share. Its app was released this year.

a cool read, i suppose

“Imagine an NFL coach,” writes Roger Martin, Dean of the Rotman School of Management at the University of Toronto, in his important new book, Fixing the Game, “holding a press conference on Wednesday to announce that he predicts a win by 9 points on Sunday, and that bettors should recognize that the current spread of 6 points is too low. Or picture the team’s quarterback standing up in the postgame press conference and apologizing for having only won by 3 points when the final betting spread was 9 points in his team’s favor. While it’s laughable to imagine coaches or quarterbacks doing so, CEOs are expected to do both of these things.”
Imagine also, to extrapolate Martin’s analogy, that the coach and his top assistants were hugely compensated, not on whether they won games, but rather by whether they covered the point spread. If they beat the point spread, they would receive massive bonuses. But if they missed covering the point spread a couple of times, the salary cap of the team could be cut and key players would have to be released, regardless of whether the team won or lost its games.
Suppose also that in order to manage the expectations implicit in the point spread, the coach had to spend most of his time talking with analysts and sports writers about the prospects of the coming games and “managing” the point spread, instead of actually coaching the team. It would hardly be a surprise that the most esteemed coach in this world would be a coach who met or beat the point spread in forty-six of forty-eight games—a 96 percent hit rate. Looking at these forty-eight games, one would be tempted to conclude: “Surely those scores are being ‘managed’?”
Suppose moreover that the whole league was rife with scandals of coaches “managing the score”, for instance, by deliberately losing games (“tanking”), players deliberately sacrificing points in order not to exceed the point spread (“point shaving”), “buying” key players on the opposing team or gaining access to their game plan. If this were the situation in the NFL, then everyone would realize that the “real game” of football had become utterly corrupted by the “expectations game” of gambling. Everyone would be calling on the NFL Commissioner to intervene and ban the coaches and players from ever being involved directly or indirectly in any form of gambling on the outcome of games, and get back to playing the game.
Which is precisely what the NFL Commissioner did in 1962 when some players were found to be involved betting small sums of money on the outcome of games. In that season, Paul Hornung, the Green Bay Packers halfback and the league’s most valuable player (MVP), and Alex Karras, a star defensive tackle for the Detroit Lions, were accused of betting on NFL games, including games in which they played. Pete Rozelle, just a few years into his thirty-year tenure as league commissioner, responded swiftly. Hornung and Karras were suspended for a season. As a result, the “real game” of football in the NFL has remained quite separate from the “expectations game” of gambling. The coaches and players spend all of their time trying to win games, not gaming the games.

this apparently inspired a eyeball licking fetish craze in japan.....

It's Not About The Nail by Jason Headley

she knows about ???

make it worth the paper its printed on
eh..when will newspapers catch up to blogs' article quality?

yea, about right if u r optician..

do you use any of these?

Wednesday, June 19, 2013

whats a bittorrrent bundle?
kaskade is using it now.
yammer u can run urself.
again. i'm thinking whats the diff, from jappix or irc.
Google does not bother to look at your gpa, nor do they ask dumb questions about golf balls and buses.

and er, whats a "weapon of mass destruction"?

start your email crawlers now!

there's a big TRUSTed logo on the page.

trusted says 

Your website is often the first chance you will have to make an impression with your customers. Make it count. Assure customers of their privacy when they interact with your website by showing that your practices are to the highest standard with TRUSTed Websites or TRUSTed Mobile Websites for mobile-optimized sites. TRUSTed Websites seal signifies online trust.

but check this out!

its all "under maintenance" now, but check out the google cache!

thats how you get PCI DSS Level 1 compliance i suppose?

The Last Of Us - The Movie (Marathon Edition) - All Cutscenes/Story With Gameplay (HD) by dansg08

"We Are The World Of Warcraft" (Jimmy Fallon) by latenight

How To Uninstall McAfee Antivirus by John Mcafee


all your apps...

it came from

separately, i recalled there was this

and thought it actually resembled
and perhaps even

Reinstalling IIS


CMD /C start /w pkgmgr /uu:IIS-WebServerRole;IIS-WebServerManagementTools;IIS-IIS6ManagementCompatibility;IIS-Metabase;IIS-WMICompatibility;IIS-ManagementConsole;IIS-ManagementScriptingTools;IIS-WebServer;IIS-CommonHttpFeatures;IIS-StaticContent;IIS-DefaultDocument;IIS-DirectoryBrowsing;IIS-HttpErrors;IIS-HttpRedirect;IIS-ApplicationDevelopment;IIS-ASP;IIS-ASPNET;IIS-ISAPIExtensions;IIS-ISAPIFilter;IIS-NetFxExtensibility;IIS-ServerSideIncludes;IIS-HealthAndDiagnostics;IIS-HttpLogging;IIS-HttpTracing;IIS-LoggingLibraries;IIS-RequestMonitor;IIS-Performance;IIS-HttpCompressionStatic;IIS-Security;IIS-RequestFiltering;IIS-WindowsAuthentication;WAS-WindowsActivationService;WAS-ProcessModel;WAS-NetFxEnvironment;WAS-ConfigurationAPI


CMD /C START /w PKGMGR.EXE /l:log.etw /iu:IIS-WebServerRole;IIS-WebServer;IIS-CommonHttpFeatures;IIS-StaticContent;IIS-DefaultDocument;IIS-DirectoryBrowsing;IIS-HttpErrors;IIS-HttpRedirect;IIS-ApplicationDevelopment;IIS-ASP;IIS-CGI;IIS-ISAPIExtensions;IIS-ISAPIFilter;IIS-ServerSideIncludes;IIS-HealthAndDiagnostics;IIS-HttpLogging;IIS-LoggingLibraries;IIS-RequestMonitor;IIS-HttpTracing;IIS-CustomLogging;IIS-ODBCLogging;IIS-Security;IIS-BasicAuthentication;IIS-WindowsAuthentication;IIS-DigestAuthentication;IIS-ClientCertificateMappingAuthentication;IIS-IISCertificateMappingAuthentication;IIS-URLAuthorization;IIS-RequestFiltering;IIS-IPSecurity;IIS-Performance;IIS-HttpCompressionStatic;IIS-HttpCompressionDynamic;IIS-WebServerManagementTools;IIS-ManagementScriptingTools;IIS-IIS6ManagementCompatibility;IIS-Metabase;IIS-WMICompatibility;IIS-LegacyScripts;WAS-WindowsActivationService;WAS-ProcessModel;IIS-FTPServer;IIS-FTPSvc;IIS-FTPExtensibility;IIS-WebDAV;IIS-ASPNET;IIS-NetFxExtensibility;WAS-NetFxEnvironment;WAS-ConfigurationAPI;IIS-ManagementService;MicrosoftWindowsPowerShell

Tuesday, June 18, 2013

seeks seeking help

download it..

run your own node..

put it on your website..

and maybe contribute..
With others, I've started the Seeks Project, a while ago, but development has stalled for a while now because of a lack of developers to help with it. Users and demand is still there, especially wrt. the recent Prism scandal.<p>This is an appeal for help ;)

very nice, if u got your own website to try this on

Some words on why this is an important milestone and why others failed: Mobile browsers try to save battery wherever they can. That's why mobile browsers delay the execution of JavaScript while you are scrolling. iOS in particular does this very aggressively and completely stops JavaScript. And in short that's the reason why many scrolling libraries either don't work on mobile devices or they come with their own scrollbar which is a usability nightmare on desktop. It was an important requirement while I developed skrollr that I don't force you to scroll the way I want it. skrollr on desktop uses a native scrollbar and you can scroll the way you want to (keyboard, mouse, etc.).
You just told me it doesn't work on mobile, but why does it? The answer is simple. When using skrollr on mobile you don't actually scroll. When detecting a mobile browser skrollr disables native scrolling and instead listens for touch events and moves the content (more specific the #skrollr-body element) using CSS transforms. 

separately, more about scaling...this time its mailbox...another endorsement of AWS...

AWS [Amazon Web Services] was an awesome partner, giving us the flexibility to iterate and scale out our system. The platform proved to be both cost-effective and efficient for our team to build on top of, which was a necessity given our limited resources and tight timeline.

Sunday, June 16, 2013

how many ways to contact u?

do you hipchat(atlassian), hall(dunno who they are), campfire(basecamp)...maybe chatter(salesforce) or yammer(microsoft!)? is actually quite cool..its actually irc..any irc client can connect to it...

if u got your own xmpp server with bosh then you can give it a webclient jappix(i know this can attach files/photos) or candy(dunno anything abt it). then it'd behave pretty much like the stuff above, no?

in other news..
are quite nice...
and surprisingly ibm doesnt autoscale..
and there's a cloudflare alternative, tho somewhere on hn i read that they admit cloudflare is faster...

Thursday, June 13, 2013

hetzner and ovh really quite big eh?

Hosting provider December 2012 June 2013 Growth Growth (%)
Amazon 134,117 165,438 +31,321 +23.35%
Shore Network Tech (Linode)54,05157,701+3,650+6.75%

Wednesday, June 12, 2013

Sony reveals used game policy, crowd goes WILD! E3 2013 by cvg

holy anomaly! the loupe stack!

why. dont they just buy whatsupgold or something? hur.
At Etsy, we’ve got a bunch of tools that we use to help us monitor our systems. You might be familiar with some of them: Nagios, StatsD, Graphite, and Ganglia. Today, we’d like to introduce you to a new tool that we’ve been working on for the past few months.

Monday, June 10, 2013

liar liar pants on fire

Mr Obama said “often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out.” He added that “such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled.”

the test for whats scary it still scary tomorrow?

and elsewhere, no finnish email passes thru Sweden

Sunday, June 9, 2013

iain banks , happiness and privacy

neil gaiman on iain banks, with or without the M.

costco can do it. why cant NTUC or Sheng Shiong?

do u really believe if u got nothing to hide then its ok to be spied on?

if u dun, then note some of the people on your side..

dark cloud

dark <em>cloud</em> <a href="" class=""></a>


@cloud_duel イントゥのプロモほしいし、クロスファイアのぷろもほしい!ガイアールカイザーといい、覇といい、今回といいプロモ厨がどんどんいなくなるな(笑)

@<em>cloud</em>_duel イントゥのプロモほしいし、クロスファイアのぷろもほしい!ガイアールカイザーといい、覇といい、今回といいプロモ厨がどんどんいなくなるな(笑)


Interest In Private Cloud Area Shapes Up As The Market Matures – CloudTweaks News | PrivateCloudAPI:

Interest In Private <em>Cloud</em> Area Shapes Up As The Market Matures – CloudTweaks News | PrivateCloudAPI: <a href="" class=""></a>


RT @DelfiBabaglio: @cami_cloud si, esa. Juro que me tente

RT @<a class="" href="">DelfiBabaglio</a>: @<a class="" href="">cami_</a><em>cloud</em> si, esa. Juro que me tente


The 'free market' on-line world is under attack from all directions: who wants to save what and why?

The storm of media cover for PRISM , the NSA equivalent for what the Communications Bill was intended to support in the UK , raises many questions, including the future of competition in the provision of the infrastructures over which we access the on-line world.


Snaer is Worth the Magic's Interest

I've spent these last few years fortunate enough to witness Snaer's greatness here at FSU and feel I can provide some insight for those that haven't had this privilege.


CrunchBase Adds 13,689 Companies And 1,462 Venture Rounds In May

This week, CrunchBase released the May Excel Export Sheet , which includes charts and graphs that illustrate recent U.S. investments, acquisitions, IPOs and more.


3D Printer Manufacturer Stratasys In Acquisition Talks With Makerbot

Alexia Tsotsis is the co-editor of TechCrunch. She attended the University of Southern California in Los Angeles, CA, majoring in Writing and Art, and moved to New York City shortly after graduation to work in the media industry.


United States Government Secrecy News Byte: National Intelligence...

National Intelligence Director Again Defends NSA Data Gathering as Lawful. CIA-Funded Startup Palantir Denies Link to NSA ? but They Both Make a 'Prism'.


Tuesday, June 4, 2013