None of us can know the answers for sure until our own time comes, but the few individuals who have their brush with death interrupted by a last-minute reprieve can offer some intriguing insights.
Israel as being the United States’ “cop on the beat” in the Middle East. - Why do you hate America? - Have you ever been to a Wal-Mart? - immediate withdrawal? (Iraq)
by Fred Wilson - Most web apps will be monetized with some kind of media model. Don't think banner ads when I say that. Think of all the various ways that an audience that is paying attention to your service can be paid for by companies and people who wan
The age-old practice of turning the soil before planting a new crop is a leading cause of farmland degradation. Many farmers are thus looking to make plowing a thing of the past
When the schedule is shot and a game needs to ship, programmers may employ some dirty coding tricks to get the game out the door. In an article originally published in Gamasutra sister publication Game Developer magazine earlier this year, here are nine real-life examples of just that.
The term "sharding" was coined by Google engineers, and popularized through their publication of the Big Table architecture. However, the concept of "shared-nothing" database partitioning has been around for a decade or more and there have been many implementations over this period, especially high profile in-house built solutions by Internet leaders such as eBay, Amazon, Digg, Flickr, Skype, YouTube, Facebook, Friendster, and Wikipedia.
a chimpanzee named Jerry. He and his wife Dorothy were raising Jerry as their baby. Little Jerry slept in a crib and wore diapers just like a human baby.
Josh Berkus is well known as a PostgreSQL hacker, but, as it happens, he also picked up some valuable experience during his stint at "The Laboratory for the Destruction of Communities," otherwise known as Sun Microsystems
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
a different approach to image optimization, based on how image data is stored in different formats. Let’s start with the JPEG format and a simple technique called the eight-pixel grid.
First introduced by George Spafford in this article, the law states that the more the user is presented with false or erroneous alerts, the more they will ignore real alerts in the system.
Attributed to Bruce Beiser, the law states that every method you use to prevent or find bugs leaves a residue of subtler bugs against which those methods are ineffectual.
Sarcasm is usually innate; however, if you would still like to attempt developing this ability, your chances of success would be greatly increased if you are intelligent, or at the least not mentally incapable of detecting and reproducing sarcastic remarks.
In the fall of 1986, Eric Graham discovered that the Amiga 1000 personal computer, running at a meager 7.16 MHz, was powerful enough to ray trace simple 3D scenes. This is a recreation by coding from first principles.
Her sinking with the loss of almost 1,200 lives caused such outrage that it propelled the U.S. into the First World War. But now divers have revealed a dark secret about the cargo carried by the Lusitania on its final journey in May 1915. Munitions they found in the hold suggest that the Germans had been right all along in claiming the ship was carrying war materials and was a legitimate military target.
"It was only supposed to be a joke, I never thought people would take the book seriously. Anyone with half a brain can see that object-oriented programming is counter-intuitive, illogical and inefficient."
"Only one third of a search engine is devoted to fulfilling search requests. The other two thirds are divided between crawling (sending a host of single-minded digital organisms out to gather information) and indexing (building data structures from the results)." By George Dyson
"Things that, based on that diagnosis, he should not be able to do, he is doing. I mean, walking up and down the hall, riding a bike, holding a pencil or a pen to work on projects, using scissors."