Sublime
An inspiration engine for ideas
A PRE-HISTORY OF THE CYPHERPUNKS:
Friends with Benefits (FWB) • A Political History of DAOs
"By building a peer-to-peer overlay on top of git, we find not only a performant solution, but one that is better adapted for code collaboration. Issues, comments and reviews become local artifacts that are cryptographically signed and interacted with offline."
Mirror • Welcome to The Block Pro - The Block Pro
Coding
Anton Gorshkov • 1 card
hacks
Clark Hancock • 15 cards
The group known as Volt Typhoon was exploiting the zero-day flaw — meaning the software maker was unaware of it before having time to patch — in Versa Director, a piece of software made by Versa Networks, according to researchers at Black Lotus Lab, which is part of cybersecurity firm Lumen.
Lorenzo Franceschi-Bicchierai • Chinese government hackers targeted U.S. internet providers with zero-day exploit, researchers say | TechCrunch
The fidelity of the system increases as extensions are added, or early versions are replaced by more complete versions of these parts of the software. In some cases, the parts may be low-fidelity versions or prototypes of the final functionality; in other cases, they may be surrogates that consume and produce data at the appropriate rates but do li... See more
Paul Clements • Software Architecture in Practice, 4th Edition
starts by crafting a signature bit.
Michael Port • The Referable Speaker: Your Guide to Building a Sustainable Speaking Career—No Fame Required
many key services that govern application behavior no longer have to be coded; instead, they can simply be configured as part of deployment.”
Ray Velez • Converge: Transforming Business at the Intersection of Marketing and Technology
The most pernicious and subtle bugs are system bugs arising from mismatched assumptions made by the authors of various components.