The Null Device
The results of Eurovision 2014 are in, and, as reported here, the big winner was Austria's Conchita Wurst, a bearded drag performer, with a resolute and melodramatic torch song titled Rise Like A Phoenix. Wurst (whose real name is Tom Neuwirth) won a runaway victory, with 290 points and a string of 12s, including ones from countries who might otherwise haver found a bearded drag performer too transgressive. The runner-up was the Netherlands, 52 points behind with a rather nice piece of slow-burning Americana. 2014 was arguably the most geopolitically charged Eurovision Song Contest in years, if not decades; the kitschy music equivalent of the World Chess Championship of 1972, in that, within its formalised, tightly circumscribed arena, the tensions of an active geopolitical fault line manifested themselves. As back then, the fault line was between the West and Russia, only the ideologies and alignments were different. Were I in Melbourne, I would probably be at a Eurovision party.
7 tips for communicating with people with disabilities
Glenda Watson Hyatt, who blogs at Doitmyselfblog.com (“Your Accessibility Conscience”), gave an extraordinary presentation here at the SOBCon, Business School for Bloggers, talking about how to make websites and blogs more accessible to the disabled. It took her three months to perfect her presentation. I conducted a video interview with her that I’ll post here soon.
FONTSPRING
Families with Free Fonts Fontspring has tons of free fonts for designers on a budget. Free Fonts Standard Ligatures Contextual Alternates Stylistic Alternates Swash Lining Figures Oldstyle Figures Proportional Figures Tabular Figures
VM8246 – Vimrod
Welcome. This site is no longer being updated! Vimrod's new home is lastlemon.com/vimrod Skip to content prevnext
Largest data breaches of all time
As Sony deals with their most recent data breach of one million passwords, we look at the the largest data loss incidents on record, according to DataLossDB. As I'm sure you know, Sony has been having all sorts of data breach problems lately — namely a million passwords from the Sony Pictures site, 77 million accounts from the PlayStation Network, and nearly 25 million user accounts from Online Entertainment. I was curious how these recent attacks compared to the largest known data loss incidents, so I headed over to DataLossDB.
FORM CREATION
Just follow the instructions below. If you're already a Jotform user, you can skip to step 2 and integrate your existing forms. 1.Create your Upload form Go to Jotform Form Builder and drag a File Upload field from the Form Tools menu to your workspace.
According to Math, the Worst Color Shirt to Wear on Star Trek Is Actually Yellow
It’s a well known maxim that nobody wants to be a redshirt on Star Trek: The Original Series. The proud members of Operations, Engineering, and Security are the space-expendables, the first line of defense, the… well the ones who always get sent down with the away party full of more important characters and get murdered by the space monster of the week. Like, all the time. But what if, instead of considering this from the viewer’s perspective, you considered it from the perspective of a crewman choosing a line of work? What if you’re just a redshirt, and not “this episode’s redshirt?” Matthew Barsalou took this perspective and applied math to it, and lets just say that Kirk, Chekov, and Sulu might not be to happy about it.
Security and Protection: Understand the Social in a Crime Network and How to Protect Yourself
While the following is a bit off-topic, my head is spinning with all the layers and networks I’ve uncovered within this recent experience. A friend of mine called this a combination assembly line meets Wikipedia of crime social networks. It begins with my car being broken into and my purse stolen a few months ago, explores the social web of a crime network, and ends with some helpful tips and techniques for protecting yourself online and off.
SCI-GEN
SCIgen - An Automatic CS Paper Generator About SCIgen is a program that generates random Computer Science research papers, including graphs, figures, and citations.
A great tool to look smart, people will believe almost anything...and is hella fun too by yogurtito Jul 2