Follow a sufficiently diverse set of feeds and you’ll eventually see filter bubbles in “real time”. Across countries, technology, corporate blogs, politics, news, food, entertainment, you name it — there’s selective information filtering. All of us are in our own distorted perception of reality.
Another wandering soul whispering into the void. If you are looking for my blog you are in the wrong place. The profile and header pictures are brought to you by cdd20.
Another wandering soul whispering into the void. If you are looking for my blog you are in the wrong place. The profile and header pictures are brought to you by cdd20.
I finally “get” why most social media web designs use a narrow 2/3 base column layout. There’s a lot of practicality involved. For example, it’s easier to control media delivery and responsiveness with narrower dimensions.
I’m not too fond of narrow holy grail layouts. If time allows, I’ll add options for swapping between a few “cool” base layouts.
Another wandering soul whispering into the void. If you are looking for my blog you are in the wrong place. The profile and header pictures are brought to you by cdd20.
Everything cryptocurrency purports to solve has been “technically” solved, but it’ll become indispensable because of the elusive idea of post scarcity.
The perceived ownership of this message and the surrounding content (my blog) can be trivially duplicated a million times over at little to no cost by anyone.
I don’t care about that, but I guarantee you that a lot of other people do. Cryptocurrency brings scarcity to a post scarcity (digital) world. This is something that people desperately want.
Bing Images
Herd of African elephants in Amboseli National Park, Kenya (© Susan Portnoy/Shutterstock)
Index: Cache · Source
unixsheikh.com
The term zero trust is a security model, also known as “perimeterless security” that has been known for a long time and that was e.g. implemented internally at Google in 2009 in a project called BeyondCorp. In recent years, mainly due to the high …
Blog – WebKit
Safari Technology Preview Release 151 is now available for download for macOS Monterey 12.3 or later and macOS Ventura beta.
Recent RFCs
Service Function Chaining (SFC) uses the Network Service Header (NSH) (RFC 8300) to steer and provide context metadata (MD) with each
Recent RFCs
This document describes the command/response protocol currently used in the management of Uninterruptible Power Supply (UPS) units and
Another wandering soul whispering into the void. If you are looking for my blog you are in the wrong place. The profile and header pictures are brought to you by cdd20.
I now think (lost a bet) that there’s a pathology that drives genres (tags) in content propagation. If you observe people “consuming” content then you’ll inevitably realize that there’s an overwhelming consensus for just more of the same, but not forever.
Diversity and homogeneity
Organizing content “strictly” into genres is a compromise. Auto–generating tags looks like a trap though. Is this even a muse?
Bing Images
Mount Tsubakuro near Azumino, Nagano, Japan (© Joshua Hawley/Getty Images)
Index: Cache · Source