100SILEX, de 0 à 100 s: Ask
1522 5 Simple steps to secure TT-RSS reader
secure tt-rss, tt-rss security 5 Simple steps to secure TT-RSS reader July 27, 2015 by Anand Leave a Comment secure-tt-rss-ft Share: share htpcBeginner We recently presented Tiny Tiny RSS to you as a great alternative to Google reader, which is one more way you can extend the functionality of your home server or your hosting space. Hopefully, you already exported your data from Google Reader. In this post, we will show you how to secure TT-RSS reader to prevent unauthorized access. Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible. As we previously explained, it makes an ideal candidate to replace Google Reader. While there are services like Feedly and Newsblur grabbing the crowd Google Reader, which some of you may prefer, there are a group of people who would like to run a RSS reader on their own server and keep things private. Assuming that you have already installed Tiny Tiny RSS on your alternative to Google reader or hosting space, we will now show you how to secure TT-RSS reader. Secure TT-RSS Reader One of the main reasons to move to an RSS aggregator like TT-RSS is maintaining your privacy. So if you do not secure TT-RSS reader well you are not only making your data available public but also making your system vulnerable to potential attacks. Choosing a strong username and password while setting your TT-RSS is the first basic thing that you can do to secure TT-RSS reader. Listed below are few more ways you can increase TT-RSS reader’s security. 1. Rename TT-RSS Folder One of the first lines of defense is to not use tt-rss in your URL to access your TT-RSS reader. To do this on your hosting account, use a folder name other than tt-rss while installing TT-RSS. On your Linux home server, edit /etc/tt-rss/apache.conf and change the first /tt-rss to something else. An example is shown below. TT-RSS Rename URL TT-RSS Rename URL After making the change, restart your TT-RSS and Apache to apply the changes: sudo service tt-rss restart sudo serivce apache2 reload Your TT-RSS reader is now available through the new URL (example: http://mydomain.com/myreader) only. Amazon Kindle Fire HDX 2. Enable SSL Accessing TT-RSS through http sends all information as unencrypted data. This could mean less privacy due to potential sniffing. The solution is to encrypt the data during transfer, which makes sniffing by hackers harder. To enable and enforce HTTPS access on Linux servers with Apache, install the following run-time libraries: sudo apt-get install libssl0.9.8 libpam0g openssl Restart your Apache server as shown above. You should now be able to access your TT-RSS reader with HTTPS. Note that you may have to have a SSL certificate generated. Refer to Apache documentation if you want to generate your own certificate. By default, the system will install self-signed certificates for you. These certificates are likely to raise warnings when you point your browser to the site. 3. Disable Single User Mode By default the single user mode is already disabled (in /etc/tt-rss/config.php). Enabling single user mode will also disable TT-RSS login system. Therefore, keep the single user mode disabled. Disable Single User Mode Disable Single User Mode A better way to make it a single user system is by limiting the number of registrations to 1 as described below. For whatever reason, you still want to enable single user mode, make sure you implement Apache Authentication method described below. 4. Self Registrations Self registrations allow a visitor to register themselves, which could reduce TT-RSS security. If your TT-RSS will be for personal use only, then you may want to disable user registration by setting “ENABLE_REGISTRATION” to “false”. TT-RSS Self Registrations TT-RSS Self Registrations To further secure TT-RSS Reader, uou may also want to change “REG_MAX_USERS” to “1” to make your account the only account on TT-RSS. asus n66uASUS RT-N66U Dual-Band Wireless-N900 Gigabit Router asus n66u reviewsFind out why it is rated the best wireless router in its class. 5. Apache Authentication Last but not the least, enable Authentication. This is even more important if you have enabled “Single User Mode” describe above. Every time you access TT-RSS, you will be asked for a username and password as shown in the picture below: Secure TT-RSS Reader On your hosting account this equivalent to password protecting a directory, in this case the TT-RSS directory. To do this on your Ubuntu server, you will have to create a .htpasswd file. More information is available in Apache documentation. But the easiest way to achieve this is to use one of the htpasswd generators available online. After you enter the username and password two code blocks will be generated. Copy the contents of the .htpasswd code block and save it to /etc/apache2/.htpasswd_ttrss. Next, copy the contents of the .htaccess code block and add it to /etc/tt-rss/apache.conf as shown below: TT-RSS Apache Authentication TT-RSS Apache Authentication Save and exit. Restart both TT-RSS and Apache previous shown above. You should be prompted for a password every time you try to access TT-RSS. Some may think that this double authentication method is an extra inconvenience. But I would rather be safe than sorry. Go ahead, secure Tiny Tiny RSS Reader and enjoy reading articles on your private secure RSS Reader.

1367 Dilraj Mann (ask me, ask me, ask me)


1347 Online-REPs-and-REPLs
Action Script 3: http://eval.hurlant.com/demo/ http://wonderfl.net/ Ada: http://ideone.com/ Arc: http://dabuttonfactory.com:8080/ http://jonathan.tang.name/files/arclite/ Assembler: http://ideone.com/ AWK: http://ideone.com/ Bash: http://ideone.com/ BASIC: http://colabv6.dan.co.jp/lleval.html bc: http://ideone.com/ BeanShell: http://lotrepls.appspot.com/ Bloop: http://repl.it/ brainfuck: http://ideone.com/ http://repl.it/ C: http://codepad.org/ http://ideone.com/ C#: http://ideone.com/ C++: http://codepad.org/ http://ideone.com/ Clojure: http://tryclj.licenser.net/ http://www.try-clojure.org/ http://ideone.com/ http://lotrepls.appspot.com/ COBOL: http://ideone.com/ CoffeeScript: http://jashkenas.github.com/coffee-script/ (Click "TRY COFFEESCRIPT") http://repl.it/ Common Lisp: http://ideone.com/ http://biobike.org/ http://colabv6.dan.co.jp/lleval.html http://www.solve-et-coagula.com/As3Lisp.html (subset) D: http://codepad.org/ http://ideone.com/ Emacs Lisp: http://colabv6.dan.co.jp/lleval.html Emoticon: http://repl.it/ Erlang: http://ideone.com/ F#: http://tryfs.net/ Forth: http://ideone.com/ http://repl.it/ Fortran: http://ideone.com/ Go: http://ideone.com/ http://golang.org/doc/play/ Groovy: http://trygroovy.appspot.com/tutorial http://lotrepls.appspot.com/ Haskell: http://tryhaskell.org/ http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html Icon: http://ideone.com/ Io: http://colabv6.dan.co.jp/lleval.html Intercal: http://ideone.com/ Java: http://ideone.com/ JavaScript: http://www.squarefree.com/shell/shell.html http://ideone.com/ http://lotrepls.appspot.com/ http://jsconsole.com/ http://colabv6.dan.co.jp/lleval.html http://repl.it/ http://webshell.io Kaffeine: http://repl.it/ LOLCODE: http://repl.it/ Lua: http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html http://repl.it/ MongoDB: http://try.mongodb.org/ Move: http://repl.it/ Nemerle: http://ideone.com/ Nice: http://ideone.com/ Objective-J: http://cappuccino.org/learn/console/ OCaml: http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html Oz: http://ideone.com/ Pascal: http://ideone.com/ Perl: http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html http://sunaba.plackperl.org/ Perl6: http://colabv6.dan.co.jp/lleval.html PHP: http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html Pike: http://ideone.com/ PostScript: http://colabv6.dan.co.jp/lleval.html Prolog: http://ideone.com/ Python: http://shell.appspot.com/ http://www.datamech.com/devan/trypython/trypython.py http://www.trypython.org/ http://try-python.mired.org/ http://codepad.org/ http://ideone.com/ http://lotrepls.appspot.com/ http://colabv6.dan.co.jp/lleval.html http://ironpython.net/try/ http://www.skulpt.org/ http://doc.pyschools.com/console http://pythonwebconsole.thomnichols.org/ http://repl.it/ QBasic: http://repl.it/ R: http://ideone.com/ Ruby: http://tryruby.org/ http://codepad.org/ http://ideone.com/ http://lotrepls.appspot.com/ http://repl.it/ Scala: http://www.simplyscala.com/ http://ideone.com/ http://lotrepls.appspot.com/ Scheme: http://sisc-scheme.org/sisc-online.php http://codepad.org/ http://ideone.com/ http://lotrepls.appspot.com/ http://colabv6.dan.co.jp/lleval.html http://repl.it/ Smalltalk: http://ideone.com/ Tcl: http://codepad.org/ http://ideone.com/ http://colabv6.dan.co.jp/lleval.html Unlambda: http://ideone.com/ http://repl.it/ Visual Basic .NET: http://ideone.com/ Whitespace: http://ideone.com/ See also: http://stackoverflow.com/questions/49092/online-interactive-consoles http://codepad.org/about http://ideone.com/faq http://repl.it/#:help

1257 CiteSeerX — Eigenrhythms: Drum pattern basis sets for classification and generation
CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): We took a collection of 100 drum beats from popular music tracks and estimated the measure length and downbeat position of each one. Using these values, we normalized each pattern to form an ensemble of aligned drum patterns. Principal Component Analysis on this data set results in a set of basis ñ€˜patterns ñ€™ that can be combined to give approximations and interpolations of all the examples. We use this low-dimension representation of the drum patterns as a space for classification and visualization, and discuss its application to generating continua of rhythms. Our classification results were very modest ñ€“ about 20 % correct on a 10-way genre classification task ñ€“ but we show that the projection into principal component space reveals aspects of the rhythm that are largely orthogonal to genre but are still perceptually relevant. CiteSeerX, Daniel P. W. Ellis, John Arroyo

1247 Les commandes dos de Windows
Panneau de configuration * ACCESS.CPL : ouvre les options d'accessibilitĂ© (Pour XP uniquement) * APPWIZ.CPL : ouvre l'outil Ajouter/Supprimer un programme * AZMAN.MSC : ouvre le gestionnaire d'autorisations (Pour Vista uniquement) * CERTMGR.MSC : ouvre les certificats pour l’utilisateur actuel * CLICONFG : ouvre la configuration des clients SQL * COLLAB.CPL : ouvre le voisinage immĂ©diat (Pour Vista uniquement) * COMEXP.MSC ou bien DCOMCNFG : ouvre l'outil services et composants (Pour Vista uniquement) * COMPMGMT.MSC : ouvre l'outil de gestion de l'ordinateur * COMPUTERDEFAULTS : ouvrir l’outil des programmes par dĂ©faut (Pour Vista uniquement) * CONTROL /NAME MICROSOFT.BACKUPANDRESTORECENTER : ouvre le centre de sauvegarde et de restauration (Pour Vista uniquement). Tutoriel ICI * CONTROL ADMINTOOLS : ouvre les outils d'administrations * CONTROL COLOR : ouvre les paramĂštres de l'apparence * CONTROL FOLDERS : ouvre les options de dossiers * CONTROL FONTS : ouvre le gestionnaire de polices * CONTROL INTERNATIONAL ou bien INTL.CPL : ouvre les options rĂ©gionales et linguistiques * CONTROL KEYBOARD : ouvre les propriĂ©tĂ©s du clavier * CONTROL MOUSE ou bien MAIN.CPL : ouvre les propriĂ©tĂ©s de la souris * CONTROL PRINTERS : ouvre les imprimantes et les fax disponibles * CONTROL USERPASSWORDS : ouvre l’éditeur des comptes utilisateurs * CONTROL USERPASSWORDS2 ou bien NETPLWIZ : contrĂŽle les utilisateurs et leurs accĂšs< * CONTROL : ouvre le panneau de configuration * CREDWIZ : ouvre l’outil de sauvegarde et restauration des mots de passe des utilisateurs (Pour Vista uniquement) * DESK.CPL : ouvre les paramĂštres d'affichage * DEVMGMT.MSC : ouvre les gestionnaire de pĂ©riphĂ©riques. Tutoriel ICI * DRWTSN32 : ouvre Dr. Watson (Pour XP uniquement) * DXDIAG : ouvre l'outil de diagnostic DirectX * EVENTVWR ou bien EVENTVWR.MSC : ouvre l'observateur d'Ă©vĂšnements * FSMGMT.MSC : ouvre les dossiers partagĂ©s * GPEDIT.MSC : ouvre l’éditeur des stratĂ©gies de groupe (Pour les Ă©ditions professionnelles et plus de Windows) * HDWWIZ.CPL : ouvre l'assistant ajout de matĂ©riels * INFOCARDCPL.CPL : ouvre l'assistant compatibilitĂ© des programmes * IRPROPS.CPL : ouvre le gestionnaire d'infrarouge * ISCSICPL : ouvre l'outil de configuration de l'initiateur ISCI Microsoft (Pour Vista uniquement) * JOY.CPL : ouvre l'outil de contrĂŽleur de jeu * LPKSETUP : ouvre l’assistant d’installation et dĂ©sinstallation des langues d’affichage (Pour Vista uniquement) * LUSRMGR.MSC : ouvre l’éditeur des utilisateurs et groupes locaux * MDSCHED : ouvre l'outil de diagnostics de la mĂ©moire Windows (Pour Vista uniquement) * MMC : ouvre une nouvelle console vide * MMSYS.CPL : ouvre les paramĂštres de sons * MOBSYNC : ouvre le centre de synchronisation * MSCONFIG : ouvre l'outil de configuration du systĂšme * NAPCLCFG.MSC : ouvre l'outil de configuration du client NAP (Pour Vista uniquement) * NTMSMGR.MSC : ouvre le gestionnaire des supports de stockage amovibles * NTMSOPRQ.MSC : ouvre les demandes de l'opĂ©rateur de stockage amovible * ODBCAD32 : ouvre l'administrateur de sources de donnĂ©es ODBC * OPTIONALFEATURES : ouvre l’outil Ajouter/Supprimer des composants Windows (Pour Vista uniquement) * PERFMON ou bien PERFMON.MSC : ouvre le moniteur de fiabilitĂ© et de performances Windows. * POWERCFG.CPL : ouvre le gestionnaire des modes d’alimentation (Pour Vista uniquement) * REGEDIT ou bien REGEDT32 (Pour Vista uniquement) : ouvre l'Ă©diteur de registre * REKEYWIZ : ouvre le gestionnaire des certificats de chiffrement de fichiers (Pour Vista uniquement) * RSOP.MSC : ouvre le jeu de stratĂ©gie rĂ©sultant * SECPOL.MSC : ouvre les paramĂštres de sĂ©curitĂ©s locales * SERVICES.MSC : ouvre le gestionnaire de services * SLUI : ouvre l’assistant d’activation de Windows (Pour Vista uniquement) * SYSDM.CPL : ouvre les propriĂ©tĂ©s systĂšme * SYSEDIT : ouvre l’éditeur de configuration systĂšme (Attention, Ă  manipuler avec prudence) * SYSKEY : ouvre l’utilitaire de protection de la base de donnĂ©es des comptes Windows (Attention, Ă  manipuler avec extrĂȘme prudence !) * SYSPREP: ouvre le dossier contenant l'outil de prĂ©paration du systĂšme (Pour Vista uniquement) * TABLETPC.CPL : ouvre les paramĂštres pour Tablet pc (Pour Vista uniquement) * TASKSCHD.MSC ou bien CONTROL SCHEDTASKS : ouvre le planificateur de tĂąches (Pour Vista uniquement) * TELEPHON.CPL : ouvre l'outil de connexion tĂ©lĂ©phonique * TIMEDATE.CPL : ouvre les paramĂštres de l'heure et de la date * TPM.MSC : ouvre l'outil gestion de module de plateforme sĂ©curisĂ©e sur l'ordinateur local (Pour Vista uniquement) * UTILMAN : ouvre les options d’ergonomie (Pour Vista uniquement) * VERIFIER : ouvre le gestionnaire de vĂ©rification des pilotes * WMIMGMT.MSC : ouvre Windows Management Infrastructure * WSCUI.CPL : ouvre le centre de sĂ©curitĂ© Windows * WUAUCPL.CPL : ouvre le service de mise Ă  jour Windows (Pour XP uniquement) Programmes et outils Windows * %WINDIR%\SYSTEM32\RESTORE\RSTRUI.EXE : ouvre l’outil de restauration de systĂšme (Pour XP uniquement). Tutoriel ICI * CALC : ouvre la calculatrice * CHARMAP : ouvre la table des caractĂšres * CLIPBRD : ouvre le presse papier (Pour XP uniquement, pour l'ajouter Ă  Vista voir ICI) * CMD : ouvre l'invite de commandes * DIALER : ouvre le numĂ©rateur tĂ©lĂ©phonique de Windows * DVDPLAY : ouvre votre lecteur DVD * EUDCEDIT : ouvre l’éditeur de caractĂšres privĂ©s * EXPLORER : ouvre l'explorateur Windows * FSQUIRT : Assistant transfert Bluetooth * IEXPLORE : ouvre Internet explorer * IEXPRESS : ouvre l’assistant de crĂ©ation des archives auto-extractibles. Tutoriel ICI * JOURNAL : ouvre un nouveau journal (Pour Vista uniquement) * MAGNIFY : ouvre la loupe * MBLCTR : ouvre le centre de mobilitĂ© de Windows (Pour Vista uniquement) * MIGWIZ : ouvre l'outil de transfert de fichiers et de paramĂštres Windows (Pour Vista uniquement) * MIGWIZ.EXE : ouvre l'outil de transfert de fichiers et de paramĂštres Windows (pour XP uniquement) * MOVIEMK : ouvre Windows Movie Maker * MRT : lance l’utilitaire de suppression de logiciel malveillant. Tutoriel ICI * MSDT : ouvre l’outil de diagnostics et support Microsoft * MSINFO32 : ouvre les informations systĂšme * MSPAINT : ouvre Paint * MSRA : ouvre l'assistance Ă  distance Windows * MSTSC : ouvre l'outil de connexion du bureau a distance * NOTEPAD : ouvre le bloc-notes * OSK : ouvre le clavier visuel. Tutoriel ICI * PRINTBRMUI : ouvre l'assistant de migration d'imprimante (Vista uniquement) * RSTRUI : ouvre l'outil de restauration du systĂšme (Pour Vista uniquement) * SIDEBAR : ouvre le volet Windows (Pour Vista uniquement) * SIGVERIF : ouvre l'outil de vĂ©rification des signatures de fichiers * SNDVOL : ouvre le mĂ©langeur de volume * SNIPPINGTOOL : ouvre l'outil capture d'Ă©cran (Pour Vista uniquement). Tutoriel ICI * SOUNDRECORDER : ouvre le magnĂ©tophone * STIKYNOT : ouvre le pense-bĂȘte (Pour Vista uniquement) * TABTIP : ouvre le panneau de saisie Tablet PC (Pour Vista uniquement) * TASKMGR : ouvre le gestionnaire des tĂąches Windows * WAB : ouvre les contacts (Pour Vista uniquement) * WERCON : ouvre l'outil de rapports et de solutions aux problĂšmes (Pour Vista uniquement) * WINCAL : ouvre le calendrier Windows (Pour Vista uniquement) * WINCHAT : ouvre le logiciel Microsoft de chat en rĂ©seau (Pour Windows XP uniquement) * WINDOWSANYTIMEUPGRADE : permet la mise Ă  niveau de Windows Vista * WINVER : ouvre la fenĂȘtre pour connaĂźtre votre version Windows * WINWORD: ouvre Word (s'il est installĂ©) * WMPLAYER : ouvre le lecteur Windows Media * WRITE ou bien Wordpad : ouvre Wordpad Gestion des disques * CHKDSK : effectue une analyse de la partition prĂ©cisĂ©e dans les paramĂštres de la commande (Pour plus d’informations, tapez CHKDSK /? dans l’invite de commande CMD) * CLEANMGR : ouvre l'outil de nettoyage de disque * DEFRAG: DĂ©fragmente le disque dur (pour savoir comment utiliser, c'est ici ) * DFRG.MSC : ouvre l’outil de dĂ©fragmentation de disque * DISKMGMT.MSC : ouvre le gestionnaire de disques * DISKPART : ouvre l’outil de partitionnement (un peu lourd Ă  manipuler) Gestion des rĂ©seaux et Internet * CONTROL NETCONNECTIONS ou bien NCPA.CPL : ouvre les connexions rĂ©seau * FIREWALL.CPL : ouvre le pare-feu Windows * INETCPL.CPL : ouvre les propriĂ©tĂ©s internet * IPCONFIG : affiche les configurations des adresses IP sur l’ordinateur (Pour plus d’informations, tapez IPCONFIG /? dans l’invite de commande CMD) * NETSETUP.CPL : ouvre l’assistant configuration rĂ©seau (Pour XP uniquement) * WF.MSC : ouvre les fonctions avancĂ©es du pare-feu Windows (Pour Vista uniquement). Tutoriel ICI * À VOIR ÉGALEMENT : Commandes IP relatives aux rĂ©seaux sous Windows Commandes IP relatives aux rĂ©seaux sous Windows Il est parfois trĂšs utile de connaĂźtre les commandes IP, pour analyser voire configurer ses rĂ©seaux TCP/IP. Voici la liste de ces commandes Ă  utiliser dans une fenĂȘtre DOS : * Ping * Tracert * IpConfig * NetStat * Route * Arp * NbtStat * Telnet * Hostname * Ftp * NsLookUp * NetSh ------------------------------------------------------------------------------------------------------------------------------------------------ PING : Teste la connexion rĂ©seau avec une adresse IP distante ping -t [IP ou host] ping -l 1024 [IP ou host] * L’option -t permet de faire des pings en continu jusqu’à Ctrl-C. o Si vous avez prĂ©cisĂ© l'option -t vous pouvez Ă  tout moment avoir des statistiques sans interrompre les requĂȘtes ping en appuyant sur Ctrl+Attn (aussi nommĂ© Ctrl+Pause) Cette commande est aussi utile pour gĂ©nĂ©rer une charge rĂ©seau en spĂ©cifiant la taille du paquet avec l’option -l et la taille du paquet en octets. --------------------------------------------------------------------------------------------------------------------------------------------------- TRACERT : Affiche toutes les adresses IP intermĂ©diaires par lesquelles passe un paquet entre la machine locale et l’adresse IP spĂ©cifiĂ©e. tracert [@IP ou nom du host] tracert -d [@IP ou nom du host] Cette commande est utile si la commande ping ne donne pas de rĂ©ponse, afin d'Ă©tablir Ă  quel niveau la connexion est dĂ©faillante. -------------------------------------------------------------------------------------------------------------------------------------------------------------- IPCONFIG : Affiche ou rafraĂźchit la configuration rĂ©seau TCP/IP ipconfig /all [/release [carte]] [/renew [carte]] /flushdns /displaydns /registerdns [-a] [-a] [-a] Cette commande, exĂ©cutĂ©e sans option, affiche l’adresse IP en cours, le masque rĂ©seau ainsi que la passerelle par dĂ©faut au niveau des interfaces rĂ©seau connues sur la machine locale. * /all: Affiche toute la configuration rĂ©seau, y compris les serveurs DNS, WINS, bail DHCP, etc ... * /renew [carte]: Renouvelle la configuration DHCP de toutes les cartes (si aucune carte n'est spĂ©cifiĂ©e) ou d'une carte spĂ©cifique avec le paramĂštre carte. Le nom de carte est celui qui apparaĂźt avec ipconfig sans paramĂštre. * /release [carte]: Envoie un message DHCPRELEASE au serveur DHCP pour libĂ©rer la configuration DHCP actuelle et annuler la configuration d'adresse IP de toutes les cartes (si aucune carte n'est spĂ©cifiĂ©e) ou d'une carte spĂ©cifique avec paramĂštre carte. Ce paramĂštre dĂ©sactive TCP/IP pour les cartes configurĂ©es de maniĂšre Ă  obtenir automatiquement une adresse IP. * /flushdns: Vide et rĂ©initialise le cache de rĂ©solution du client DNS. Cette option est utile pour exclure les entrĂ©es de caches nĂ©gatives ainsi que toutes les autres entrĂ©es ajoutĂ©es de façon dynamique. * /displaydns: Affiche le cache de rĂ©solution du client DNS, qui inclut les entrĂ©es prĂ©chargĂ©es Ă  partir du fichier des hĂŽtes locaux ainsi que tous les enregistrements de ressources rĂ©cemment obtenus pour les requĂȘtes de noms rĂ©solues par l'ordinateur. Le service Client DNS utilise ces informations pour rĂ©soudre rapidement les noms frĂ©quemment sollicitĂ©s, avant d'interroger ses serveurs DNS configurĂ©s. * /registerdns: Actualise tous les baux DHCP et rĂ©inscrit les noms DNS. ------------------------------------------------------------------------------------------------------------------------------------------------------------------ NETSTAT : Affiche l’état de la pile TCP/IP sur la machine locale NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [intervalle] * -a Affiche toutes les connexions et ports d'Ă©coute (Les connexions cĂŽtĂ© serveur sont normalement inhibĂ©es). * -e Affiche les statistiques Ethernet. Peut ĂȘtre combinĂ©e avec l'option -s. * -n Affiche les adresses et les numĂ©ros de port sous forme numĂ©rique. * -p proto Affiche les connexions pour le protocole spĂ©cifiĂ© par proto; proto peut ĂȘtre TCP ou UDP. UtilisĂ© avec l'option -s pour afficher des statistiques par protocole, proto peut ĂȘtre TCP, UDP, ou IP. * -r Affiche le contenu de la table de routage. * -s Affiche les statistiques par protocole. Par dĂ©faut, des statistiques sur TCP, UDP et IP sont visualisĂ©es; l'option -p peut ĂȘtre utilisĂ©e pour spĂ©cifier un sous-ensemble du dĂ©faut. * intervalle: RĂ©affiche les statistiques sĂ©lectionnĂ©es, avec une pause de "intervalle" secondes entre chaque affichage. Appuyez sur Ctrl+C pour arrĂȘter l'affichage des statistiques. * -abnov Affiche les processus qui utilisent la connexion internet (Adresse IP local, port, adress IP distante et le PID du processus qui utilise la connexion ainsi que son nom). ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ROUTE : Affiche ou modifie la table de routage ROUTE [-f] [commande [destination] [MASK masque rĂ©seau] [passerelle] * -f Efface les tables de routage de toutes les entrĂ©es de passerelles. UtilisĂ© conjointement Ă  une des commandes, les tables sont effacĂ©es avant l'exĂ©cution de la commande. * -p Rend rĂ©manente l’entrĂ©e dans la table aprĂšs le reboot de la machine * commande SpĂ©cifie une des quatre commandes : o DELETE: Efface un itinĂ©raire. o PRINT: Affiche un itinĂ©raire. o ADD: Ajoute un itinĂ©raire. o CHANGE: Modifie un itinĂ©raire existant. * destination: SpĂ©cifie l'hĂŽte. * MASK: Si le mot clĂ© MASK est prĂ©sent, le paramĂštre suivant est interprĂ©tĂ© comme le paramĂštre masque rĂ©seau. * masque rĂ©seau: Fourni, il spĂ©cifie la valeur de masque de sous-rĂ©seau Ă  associer Ă  cette entrĂ©e d'itinĂ©raire. Non spĂ©cifiĂ©, il prend la valeur par dĂ©faut * passerelle: SpĂ©cifie la passerelle. * METRIC: SpĂ©cifie le coĂ»t mĂ©trique pour la destination ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- ARP : RĂ©solution des adresses IP en adresses MAC. Affiche et modifie les tables de traduction des adresses IP en adresses physiques utilisĂ©es par le protocole de rĂ©solution d'adresses ARP. ARP -s adr_inet adr_eth [adr_if] ARP -d adr_inet [adr_if] ARP -a [adr_inet] [-N adr_if] * -a Affiche les entrĂ©es ARP actives en interrogeant le protocole de donnĂ©es actif. Si adr_inet est spĂ©cifiĂ©, seules les adresses IP et physiques de l'ordinateur spĂ©cifiĂ© sont affichĂ©es. Si plus d'une interface rĂ©seau utilise ARP, les entrĂ©es de chaque table ARP sont affichĂ©es. * -g Identique Ă  -a. * adr_inet SpĂ©cifie une adresse internet. * -N adr_if Affiche les entrĂ©es ARP pour l'interface rĂ©seau spĂ©cifiĂ©e par adr_if. * -d Efface l'hĂŽte spĂ©cifiĂ© par adr_inet. * -s Ajoute l'hĂŽte et associe l'adresse Internet adr_inet avec l'adresse physique adr_eth. L'adresse physique est donnĂ©e sous forme de 6 octets hexadĂ©cimaux sĂ©parĂ©s par des tirets. L'entrĂ©e est permanente. * adr_eth SpĂ©cifie une adresse physique. * adr_if PrĂ©cisĂ©e, elle spĂ©cifie l'adresse Internet de l'interface dont la table de traduction des adresses devrait ĂȘtre modifiĂ©e. Non prĂ©cisĂ©e, la premiĂšre interface applicable sera utilisĂ©e. --------------------------------------------------------------------------------------------------------------------------------------------------------------------- NBTSTAT : Mise Ă  jour du cache du fichier Lmhosts. Affiche les statistiques du protocole et les connexions TCP/IP actuelles utilisant NBT (NetBIOS sur TCP/IP). NBTSTAT [-a Nom Distant] [-A adresse IP] [-c] [-n] [-r] [-R] [-s] [S] [intervalle] * -a (Ă©tat carte) Liste la table de noms de la machine distante (nom connu). * -A (Ă©tat carte) Liste la table de noms de la machine distante (adresse IP). * -c (cache) Liste le cache de noms distants y compris les adresses IP. * -n (noms) Liste les noms NetBIOS locaux. * -r (rĂ©solus) Liste les noms rĂ©solus par diffusion et via WINS. * -R (Recharge) Purge et recharge la table du cache de noms distantes. * -S (Sessions) Liste la table de sessions avec les adresses destination IP. * -s (sessions) Liste la table de sessions convertissant les adresses de destination IP en noms d'hĂŽtes via le fichier hĂŽtes. Un Exemple : nbtstat -A @IP Cette commande renvoie le nom NetBIOS, nom du systĂšme, les utilisateurs connectĂ©s ...de la machine distante. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- TELNET telnet telnet La commande telnet permet d'accĂ©der en mode Terminal (Ecran passif) Ă  un host distant. Elle permet Ă©galement de vĂ©rifier si un service quelconque TCP tourne sur un serveur distant en spĂ©cifiant aprĂšs l’adresse IP le numĂ©ro de port TCP. C’est ainsi que l’on peut tester si le service SMTP, par exemple, tourne sur un serveur Microsoft Exchange en utilisant l’adresse IP du connecteur SMTP et puis 25 comme numĂ©ro de port. Les ports les plus courants sont : * ftp (21), * telnet (23), * smtp (25), * www (80), * kerberos (88), * pop3 (110), * nntp (119) * et nbt (137-139). --------------------------------------------------------------------------------------------------------------------------------------------------------------------- HOSTNAME : Affiche le nom de la machine Ftp FTP: Client de tĂ©lĂ©chargement de fichiers ftp –s: * -s cette option permet de lancer des FTP en mode batch : spĂ©cifie un fichier textuel contenant les commandes FTP. --------------------------------------------------------------------------------------------------------------------------------------------------------------------- NsLookUp: envoie des requĂȘtes DNS sur un serveur DNS au choix nslookup [domaine] [serveur dns] La commande NsLookUp permet d'envoyer des requĂȘtes DNS Ă  un serveur. Par dĂ©faut, si vous ne mettez pas le serveur DNS, la commande utilisera celui qui est configurĂ© pour votre interface rĂ©seau (celui que vous utilisez pour naviguer sur internet, par exemple) mais vous pouvez forcer l'utilisation d'un autre serveur. Par exemple, pour demander au serveur DNS l'adresse IP correspondante Ă  l'adresse www.commentcamarche.net: nslookup www.commentcamarche.net * Si vous ne prĂ©cisez aucun paramĂštre pour nslookup, un shell s'ouvrira en attente de requĂȘtes de votre part. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- Netsh (network shell : shell rĂ©seau) est un utilitaire en ligne de commande inclus dans la gamme des systĂšmes d'exploitation Windows NT (NT, 2000, XP, 2003 Serveur, Vista) Ă  partir de Windows 2000. Il permet la configuration du rĂ©seau, localement ou Ă  distance. Une utilisation classique de netsh est la rĂ©initialisation de la pile TCP/IP Ă  ses paramĂštres d'origines (Sous Windows 98, cette opĂ©ration nĂ©cessitait la rĂ©installation de l'adaptateur TCP/IP). Dans ce mode, vous devez fournir Ă  la commande un fichier journal (log). Celui-ci sera rempli avec les valeurs affectĂ©es par netsh. Netsh permet aussi (entre autres) de changer l'adresse IP de la machine. Exemples d'utilisations : - RĂ©initialisation de la pile TCP/IP : netsh interface ip reset C:\resetlog.txt - Adresse IP statique : netsh interface ip set address local static - Adresse IP dynamique : netsh interface ip set address name="Connexion au rĂ©seau local" source=dhcp - Netsh et IPv6 : Netsh peut Ă©galement ĂȘtre utilisĂ© pour lire des informations provenant de la pile IPv6, cette commande est plus facile Ă  utiliser que la commande IPv6.exe et fournit quasiment le mĂȘme niveau d'information. Pour afficher votre adresse IPv6 en utilisant netsh : netsh interface ipv6 show address Autres commandes * %HOMEDRIVE% : ouvre l'explorateur sur la partition ou le systĂšme d'exploitation est installĂ© * %HOMEPATH% : ouvre le dossier d'utilisateur connectĂ© actuellement C:\Documents and settings\[nom d'utilisateur] * %PROGRAMFILES% : ouvre le dossier d’installation d’autres programmes (Program Files) * %TEMP% ou bien %TMP% : ouvre le dossier temporaire * %USERPROFILE% : ouvre le dossier du profil de l'utilisateur connectĂ© actuellement * %WINDIR% ou bien %SYSTEMROOT% : ouvre le dossier d’installation de Windows * %WINDIR%\system32\rundll32.exe shell32.dll,Control_RunDLL hotplug.dll : affiche la fenĂȘtre "Supprimer le pĂ©riphĂ©rique en toute sĂ©curitĂ©" * AC3FILTER.CPL : ouvre les propriĂ©tĂ©s du filtre AC3 (Si installĂ©) * FIREFOX : lance Mozilla FireFox (Si installĂ©) * JAVAWS : Visualise le cache du logiciel JAVA (Si installĂ©) * LOGOFF : ferme la session actuelle * NETPROJ : autorise ou pas la connexion Ă  un projecteur rĂ©seau (Pour Vista uniquement) * VĂ©rificateur des fichiers systĂšme (NĂ©cessite un CD de Windows si le cache n’est pas disponible): (Tutoriel ICI) o SFC /SCANNOW : scanne immĂ©diatement tous les fichiers systĂšme et rĂ©pare les fichiers endommagĂ©s o SFC /VERIFYONLY : scanne seulement les fichiers systĂšme o SFC /SCANFILE="nom et chemin de fichier" : scanne le fichier prĂ©cisĂ©, et le rĂ©pare s’il est endommagĂ© o SFC /VERIFYFILE="nom et chemin de fichier" : scanne seulement le fichier prĂ©cisĂ© o SFC /SCANONCE : scanne les fichiers systĂšme au prochain redĂ©marrage o SFC /REVERT : remet la configuration initiale (Pour plus d’informations, tapez SFC /? dans l’invite de commande CMD. * SHUTDOWN : Ă©teint Windows * SHUTDOWN –A : interrompe l’arrĂȘt de Windows * VSP1CLN : supprime le cache d'installation du service pack 1 de Vista (Tutoriel ICI) CrĂ©er votre propre commande Pour ceux qui aiment tout faire avec le clavier, il est possible de crĂ©er vos propres commandes exĂ©cutables dans Menu dĂ©marrer > ExĂ©cuter. Nous allons prendre l'exemple de la commande netnavig qui exĂ©cutera Mozilla FireFox. * Ouvrez la base de registre. * Allez vers la clĂ© HKEY_LOCAL_MACHINE puis les sous-clĂ©s successives \SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths * Allez dans le menu Édition > Nouveau > ClĂ© et donnez-lui le nom netnavig.exe * Faites un double-clic sur la valeur que vous venez de crĂ©er, puis allez de nouveau dans le menu Édition > Nouveau > Valeur ChaĂźne et donnez-lui le nom Path * Faites encore un double-clic sur la valeur crĂ©Ă©e et entrez le chemin complet de l'application que vous voudrez lancer, dans notre exemple c'est C:\Program Files\Mozilla Firefox, puis validez. Il est possible de copier ce chemin Ă  partir de la barre d'adresse de l'explorateur directement. * Un autre double-clic sur la valeur (par dĂ©faut) et entrez l'exĂ©cutable de l'application avec son chemin complet : C:\Program Files\Mozilla Firefox\firefox, dans notre exemple. Ensuite, validez et fermez l'Ă©diteur de registre. Ainsi vous pouvez exĂ©cuter Mozilla Firefox juste en faisant: Menu dĂ©marrer > ExĂ©cuter > taper netnavig et valider. Vous pouvez faire la mĂȘme chose pour toutes les applications auxquelles vous voulez un accĂšs rapide avec le clavier.

1244 CiteSeerX — Eigenrhythms: Drum pattern basis sets for classification and generation
CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): We took a collection of 100 drum beats from popular music tracks and estimated the measure length and downbeat position of each one. Using these values, we normalized each pattern to form an ensemble of aligned drum patterns. Principal Component Analysis on this data set results in a set of basis ñ€˜patterns ñ€™ that can be combined to give approximations and interpolations of all the examples. We use this low-dimension representation of the drum patterns as a space for classification and visualization, and discuss its application to generating continua of rhythms. Our classification results were very modest ñ€“ about 20 % correct on a 10-way genre classification task ñ€“ but we show that the projection into principal component space reveals aspects of the rhythm that are largely orthogonal to genre but are still perceptually relevant. CiteSeerX, Daniel P. W. Ellis, John Arroyo

1114 Custom EMS Oscillator Bank in Euro module format | Hinton Instruments News
Hinton Instruments has provided a custom rebuild of an EMS Board “C” into a 3U 62HP Eurorack format module incorporating all of Graham Hinton’s modifications and more, all within a 40mm depth. This is not a clone, we don’t do clones so don’t ask. The module is shown here mounted in our new four rail open Euro frame with rear mounted Triple 1A PSU module and our new ModMix module. The combination provides a very high specification, comprehensive modular synthesizer front end.

1104 Custom EMS Oscillator Bank in Euro module format | Hinton Instruments News
Hinton Instruments has provided a custom rebuild of an EMS Board “C” into a 3U 62HP Eurorack format module incorporating all of Graham Hinton’s modifications and more, all within a 40mm depth. This is not a clone, we don’t do clones so don’t ask. The module is shown here mounted in our new four rail open Euro frame with rear mounted Triple 1A PSU module and our new ModMix module. The combination provides a very high specification, comprehensive modular synthesizer front end.

1090 Nord Modular Index
Patches The Nord Modular patch archive. All patches ordered by author Patches catagorized by Kristof Middendorf Patches catagorized by 'sound' or 'style'. Most of these patches can also be found in the regular archive. Patches catagorized by Tony Smyth Patches catagorized by 'sound' or 'style'. Most of these patches can also be found in the regular archive. Patches zipped This folder holds the .ZIP-ed archives of the patches and interesting threads. These archives are updated every day, so all recent patches can be found here too. Interesting threads A growing collection of interesting articles from the Nord Modular mailing list. Workshops Workshops... Miscellaneous Here we keep everything that doesn't fit elsewhere Recent patches This folder contains patches that are extracted from the Nord Modular mailinglist automaticly. These files are not manually checked and might be broken, copyrighted or might contain doubles. Here you can find the latest patches only posted minutes ago ! FAQ FAQ stands for Frequently Asked Questions. Here you can find answers on subjects that arise frequently on the mailinglist.

1033 "I'm a technical lead on the Google+ team. Ask me anything."
I helped design and build a lot of the circles model and sharing UI for Google+. I was recruited to Google to work on "getting social right" in early 2010. Prior to that, I was CTO of Plaxo, and also its first employee (since March 2002). I've also spent many years working on open standards for the social web (OpenID, OAuth, Portable Contacts, WebFinger, etc.) Since I work for a big/public company (albeit a pretty cool one), I can't provide specific stats, dates for future features, or details of confidential code/algorithms. But I will do my best to be "refreshingly frank" about everything else. :)

1015 Aliens Project » SynxsS Studio News #082
Endlich sind die Umbaumaßnahmen soweit beendet, der ganze MĂŒll und Dreck ist raus und ich kann wieder ganz normal hier arbeiten. Kein Staub mehr -jaaaa. Alle Synthies, die ich vorrĂŒbergehend weggepackt hatte, sind wieder soweit einsatzbereit. Okay, hier und da fehlt noch ein Kabel, aber das ist ja schnell eingesteckt. Das neue Regal fĂŒr die Kleinsynthies macht sich prima, so hab ich kĂŒnftig alle GerĂ€te sofort greifbar. Praktisch, wenn ich meine Livesachen in die Koffer packe. Das grĂŒne Licht hat verschiedene Farben und reicht von blĂ€ulichem bis zu gelblichen GrĂŒntönen. Irgendwie kann ich das mit meiner Einfachknipse auf den Bilden garnicht richtig einfangen, schaut aber in natura schon sehr spacig aus. Der ganze Dekokram hĂ€ngt auch, hatte noch ein paar alte Munitionskisten hier rumliegen, die habe ich auch gleich mit verbaut. “Eigentlich” wollte ich ja “nur” ein paar Alubleche an die Wand schrauben
 Im oberen Bereich hatte ich ja schon umgebaut, da hat sich seit Februar eigentlich nichts mehr verĂ€ndert. Nun denn, viel Spaß mit den Bildern. Wenn ihr “Synxxs Studio News” in die Suchmaske eingebt, findet ihr noch ganz viele Bilder mehr.

989 Blog de Hugues Truttmann: Entretien d'embauche et intelligence émotionnelle : la méthode I.D.E.A.L.
Entretien d'embauche et intelligence Ă©motionnelle : la mĂ©thode I.D.E.A.L. Pour un candidat, quelle est la diffĂ©rence entre un entretien d’embauche rĂ©ussi et un entretien d’embauche ratĂ© ? Partons de l’hypothĂšse que 2 candidats de formation et d’expĂ©rience Ă©quivalente passent un entretien pour un mĂȘme poste. Tous les 2 ont eu un entretien avec le mĂȘme recruteur. Pour le premier, le recruteur donne une suite favorable, pour le 2Ăšme, cela n’ira malheureusement pas plus loin, le candidat Ă©tait dans un mauvais jour certainement... Ayant fait passer des entretiens Ă  des centaines de candidats, j’ai constatĂ© que j’ai systĂ©matiquement donnĂ© une suite favorable Ă  ceux qui ont rĂ©ussi Ă  me faire “passer Ă  l’action”, c’est-Ă  dire qu’ils ont suscitĂ© chez moi l’intĂ©rĂȘt, puis le dĂ©sir qui m’a motivĂ© Ă  parler positivement et avec enthousiasme de leur candidature Ă  mes clients. Le candidat qui rĂ©ussit est donc celui qui est capable de transfĂ©rer de la sincĂ©ritĂ©, de l’intĂ©rĂȘt, de la motivation, de l’enthousiame ou toute autre Ă©motion positive. Le candidat qui rate a quant Ă  lui transfĂ©rĂ© des Ă©motions nĂ©gatives (dĂ©sintĂ©rĂȘt, peur, tristesse, ennui, etc...). Une Ă©motion positive fait passer Ă  l’action, une Ă©motion nĂ©gative, jamais. RĂ©ussir un entretien consiste donc Ă  utiliser efficacement son intelligence Ă©motionnelle. Voici une dĂ©finition de l’intelligence Ă©motionnelle : “HabiletĂ© Ă  percevoir et Ă  exprimer les Ă©motions, Ă  les intĂ©grer pour faciliter la pensĂ©e, Ă  comprendre et Ă  raisonner avec les Ă©motions, ainsi qu’à rĂ©guler les Ă©motions chez soi et chez les autres.” Une des composante de cette forme d’intelligence est l’empathie qui est la “capacitĂ© Ă  partager les Ă©motions avec autrui, sans confusion entre soi et l’autre”. Comment activer son intelligence Ă©motionnelle et motiver un recruteur ? En appliquant la mĂ©thode I.D.E.A.L : Cette mĂ©thode n’est pas une technique, mais plutĂŽt une attitude Ă  adopter. Avant chaque entretien dites - vous ceci et APPLIQUEZ - LE ! I Decide to act with Empathy by Asking questions and Listening Soit “Je dĂ©cide d’agir avec empathie en posant des questions et en Ă©coutant” Poser des questions (sincĂšres et honnĂȘtes) permet de garder le contrĂŽle d’un entretien, Ă©couter (sans faire semblant) permet de diriger une conversation et de montrer que l’on s’intĂ©resse Ă  son interlocuteur. Le meilleur des candidats n’est pas celui qui parle le plus, mais celui qui saura vĂ©hiculer une bonne Ă©nergie et des Ă©motions positives dans ses paroles et son attitude. Motiver un recruteur ne consiste pas Ă  savoir se vendre en faisant l’étalage de tous les avantages que l’on peut avoir. Ne faites pas comme ce (mauvais) vendeur de voiture qui vous prĂ©sente toutes les caractĂ©ristiques et superbes options d’une voiture SAUF celle qui va vous faire passer Ă  l’action, c’est - Ă  - dire vous engager en signant un bon de commande ! Posez donc LA question que jamais personne ne pose, mais qui vous fera obligatoirement ressortir du lot : Candidat : “Monsieur le Recruteur, pour ce poste, pourriez-vous me dĂ©crire quel est selon vous le candidat IDEAL ?” > ECOUTE Recruteur : “Pour ce poste le candidat IDEAL doit avoir les qualitĂ©s suivantes :” QualitĂ© A QualitĂ© B QualitĂ© C Etc... Candidat : “De toutes ces qualitĂ©s, quelle est selon vous LA PLUS IMPORTANTE ?" > ECOUTE Recruteur : “Sans AUCUN DOUTE, la qualitĂ© B” Candidat : “J’ai la qualitĂ© B, parce que (prouvez par des FAITS, expĂ©rience, formation, vĂ©cu) et d’autre part j’ai Ă©galement la qualitĂ© A, parce que...... et la qualitĂ© C, parce que...... > PASSAGE A L’ACTION Candidat : “Monsieur le Recruteur, dans ce cas, comment pouvons - nous envisager la suite des Ă©vĂšnements ? Testez, c’est puissant et cela fonctionne !

767 The 5 types of programmers « Steven Benner's Blog
In my code journeys and programming adventures I’ve encountered many strange foes, and even stranger allies. I’ve identified at least five different kinds of code warriors, some make for wonderful comrades in arms, while others seem to foil my every plan. However they all have their place in the pantheon of software development. Without a healthy mix of these different programming styles you’ll probably find your projects either take too long to complete, are not stable enough or are too perfect for humans to look upon. The duct tape programmer The code may not be pretty, but damnit, it works! This guy is the foundation of your company. When something goes wrong he will fix it fast and in a way that won’t break again. Of course he doesn’t care about how it looks, ease of use, or any of those other trivial concerns, but he will make it happen, without a bunch of talk or time-wasting nonsense. The best way to use this person is to point at a problem and walk away. The OCD perfectionist programmer You want to do what to my code? This guy doesn’t care about your deadlines or budgets, those are insignificant when compared to the art form that is programming. When you do finally receive the finished product you will have no option but submit to the stunning glory and radiant beauty of perfectly formatted, no, perfectly beautiful code, that is so efficient that anything you would want to do to it would do nothing but defame a masterpiece. He is the only one qualified to work on his code. The anti-programming programmer I’m a programmer, damnit. I don’t write code. His world has one simple truth; writing code is bad. If you have to write something then you’re doing it wrong. Someone else has already done the work so just use their code. He will tell you how much faster this development practice is, even though he takes as long or longer than the other programmers. But when you get the project it will only be 20 lines of actual code and will be very easy to read. It may not be very fast, efficient, or forward-compatible, but it will be done with the least effort required. The half-assed programmer What do you want? It works doesn’t it? The guy who couldn’t care less about quality, that’s someone elses job. He accomplishes the tasks that he’s asked to do, quickly. You may not like his work, the other programmers hate it, but management and the clients love it. As much pain as he will cause you in the future, he is single-handedly keeping your deadlines so you can’t scoff at it (no matter how much you want to). The theoretical programmer Well, that’s a possibility, but in practice this might be a better alternative. This guy is more interested the options than what should be done. He will spend 80% of his time staring blankly at his computer thinking up ways to accomplish a task, 15% of his time complaining about unreasonable deadlines, 4% of his time refining the options, and 1% of his time writing code. When you receive the final work it will always be accompanied by the phrase “if I had more time I could have done this the right way”. Where do you fit? Personally, I’d have to classify myself as the perfectionist. So, which type of programmer are you? Or perhaps you know another programming archetype that is missing from my list? Post a comment below and I’ll add it to a new updated list.

756 Matmos - Supreme Balloon
The arcs of rising and falling pitches that start this song reminded us of a rainbow, and the title stuck: any resemblance to fluttering symbols of homo-nationalist pride are side effects. People have asked us about the Latin kitsch aspect of the song, and we plead guilty to a great love of the Richard Hayman "The Genuine Electric Latin Love Machine" Moog novelty LP from 1969. Having lived in the Mission District of San Francisco for seven years up until our recent move to Baltimore, we have had enough casual exposure to actual Mexican and Salvadorean music to know that this bears only the faintest relation to the real thing. Keith Fullerton Whitman contributed some tasty squelches and zaps from his Doepfer modular synth to brighten the corners, but not everything on here is that high-tech. Consider the lowly stylophone, a handheld novelty instrument popular with British schoolkids that was immortalized during the rave era in the cheesy techno banger "Stylophonia" by the fabulously named UK crew Two Little Boys. The stylophone that is played on this record was sent to us in the mail by a well-wisher and we thank him for this unexpected present. We are even more grateful to Safety Scissors, who forgave us when M. C. Schmidt broke his MS-20 filter knob by tweaking it too vigorously while recording the "horn" part of this song. It's all been patched up now.

741 17 Useful Htaccess Tricks and Tips
I have collected 17 htaccess methods in this article which I have used or tested it before, and I think some of them are essential tricks and tips to protect your webserver against malicious attacks and other would able to perform simple tasks efficiently such as redirection and web server optimization. queness,kevin liew,tips, tools

722 Making AJAX Applications Crawlable - Google Code
If you're running an AJAX application with content that you'd like to appear in search results, we have a new process that, when implemented, can help Google (and potentially other search engines) crawl and index your content. Historically, AJAX applications have been difficult for search engines to process because AJAX content is produced dynamically by the browser and thus not visible to crawlers. While there are existing methods for dealing with this problem, they involve regular manual maintenance to keep the content up-to-date. Learn more Learn why search engines don't see the content you see and what needs to happen to fix this. Getting started guide Get started in making your AJAX application visible to search engines. If you are in a hurry, you can start here, but AJAX crawling is a complex topic, so we recommend reading all the documentation. Creating HTML snapshots Learn more about creating HTML snapshots, and which technique might be best suited for your application. Frequently asked questions Having trouble? Check out the frequently asked questions. Specification Get the details.

714 30 free programming eBooks « citizen428.blog()
Since this post got quite popular I decided to incorporate some of the excellent suggestions posted in the comments, so this list now has more than 40 books in it. [UPDATED: 2010-10-12] Learning a new programming language always is fun and there are many great books legally available for free online. Here’s a selection of 30 of them: Lisp/Scheme: How to Desing Programs Interpreting Lisp (PDF, suggested by Gary Knott) Let Over Lambda On Lisp Practical Common Lisp Programming in Emacs Lisp Programming Languages. Application and Interpretation (suggested by Alex Ott) Structure and Interpretation of Computer Programs Teach Yourself Scheme in Fixnum Days Visual LISP Developer’s Bible (suggested by “skatterbrainz”) Ruby: Data Structures and Algorithms with Object-Oriented Design Patterns in Ruby Learn to Program MacRuby: The Definitive Guide Mr. Neighborly’s Humble Little Ruby Book (suggested by @tundal45) Programming Ruby Read Ruby 1.9 Ruby Best Practices Ruby on Rails Tutorial Book (suggested by @tundal45) Javascript: Building iPhone Apps with HTML, CSS, and JavaScript Eloquent Javascript jQuery Fundamentals Mastering Node Haskell: Learn You a Haskell for Great Good Real World Haskell Erlang: Concurrent Programming in Erlang Learn You Some Erlang for Great Good Python: Dive into Python How to Think Like a Computer Scientist – Learning with Python Smalltalk: Dynamic Web Development with Seaside Pharo by Example (based on the next book in this list, suggested by Anonymous) Squeak by Example Misc: Algorithms The Art of Assembly Language Beginning Perl Building Accessible Websites (suggested by Joe Clark) The C Book C# Yellow Book (suggested by Joe Wyatt) Compiler Construction Dive Into HTML 5 (suggested by @til) Higher-Order Perl The Implementation of Functional Programming Languages (suggested by “Def”) An Introduction to R Learn Prolog Now! Objective-C 2.0 Essentials Programming Scala Of course there are many more free programming eBooks, but this list consists of the ones I read or want(ed) to read. This is far from comprehensive and languages that are completely missing are mostly left out on purpose (e.g. PHP, C++, Java). I’m sure somebody else made a list for them somewhere.

670 Blocket.se - Sveriges största Köp & SÀlj marknad
Sveriges största köp- och sÀljmarknad. Bilar, bÄtar, möbler, lÀgenheter, fritidsboende, klÀder & skor, tjÀnster m.m. Bilar,Bildelar,Biltillbehör,BÄtar,BÄtdelar,tillbehör,Husvagnar,Husbilar,Mopeder,A-traktor,Motorcyklar,MC-delar,tillbehör,Snöskotrar,Snöskoterdelar,tillbehör,Lastbil,Truck,Entreprenad,Skogs-,Lantbruksmaskiner,Bygg,TrÀdgÄrd,Verktyg,Möbler,Heminredning,HusgerÄd,Vitvaror,LÀgenheter,Fritidsboende,Tomter,GÄrdar,Utland,Villor,Radhus,BarnklÀder,Skor,Barnartiklar,Leksaker,Accessoarer,Klockor,KlÀder,Skor,Datorer,TV-spel,Ljud,Bild,Telefoner,Biljetter,Resor,Böcker,Studentlitteratur,Cyklar,Djur,Hobby,Samlarprylar,HÀstar,Ridsport,Jakt,Fiske,Musikutrustning,Sport,Fritid,AffÀrsöverlÄtelser,Inventarier,Maskiner,Lokaler,Fastigheter,TjÀnster,Jobb,Efterlysningar,Övrigt

629 SynthFrog
A synthesizer DIY page. Synth DIY users get visited by a frog. Synth DIY projects SDIY, SynthDIY, Synth DIY, Mr. Braska, Braska, synth frog, SID, Sequencer, midibox, MIDI, DIY, panel, Modular synthesizer, Modular, Yusynth

583 dictée magique bending
dictée magique bending

553 Gearjunkies.com - Comprehensive resource for music production and DJ equipment
New gear in this Category Categories Digital Pianos Drum computers Drum modules Expansion and effect boards Modulair synths Sampler workstations Samplers Sequencers Sound modules Synthesizer filters Synthesizer modules Synthesizer workstations Synthesizers Vintage Exotics Latest news Roxy Music consider releasing new material as downloads only on 21/07/2010 Continuum Fingerboard version 4.08 released on 21/07/2010 Teenage Engineering OP-1 featured in a music video on 17/07/2010 Get closer to the music with Producer Sessions Live on 16/07/2010 Moogfest 2010 will be held in Asheville from October 29-31 on 16/07/2010 The Fingerist keytar for iPhone or iPad on 15/07/2010 New gear at Deadmau5 studio: Modular Mau5 on 15/07/2010 Next Generation M-Audio Axiom Keyboard Controller Series unveiled on 13/07/2010 Click here for more news! Hyperlinks Ableton Denver User Group - Site for Ableton users and electronic music producers, based around Denver Indaba Music - Online musicians community SoftSynthForum review page (dutch) - Our dutch SoftSynth forum review page Collabs - Seek electronic musician partners (dutch) EMS Synthi - Everything EMS! 440 TV - Audio en music video\'s Digital Audio Service - German gear blog SoftSynthForum - Dutch softsynth forum Lydmaskinen - Audio forum from Denkmark Wrongroom - Blog about adventurous projects in the world of audio-electronics. Click here for a complete list of hyperlinks New gear Roland Lucina AX-09 Dave Smith Mopho Keyboard MFB Nanozwerg MFB Urzwerg Analogue Solutions Europa Hardsid UPlay Evol Audio Fucifier Clavia Nord Piano Kawai ES 6 Korg SV-1 Roland V-Piano Kurzweil PC3LE6 GotharMusic deMOON Roland SP-404SX Akai Pro MINIAK Clavia Nord C2 Dave Smith Tetr4 Roland Juno Di Yamaha S90 XS MFB Schlagzwerg Jomox MBase11

484 Why did so many successful entrepreneurs and startups come out of PayPal? Answered by Insiders
Why did so many successful entrepreneurs and startups come out of PayPal? I long have been fascinated by the extraordinary achievement from the ex-Paypal team and wonder about the reasons behind their success. In the past, mass media tried to answer this question several times but still couldn’t give us a clear answer. I once asked David Sacks the same question during an event in Los Angeles. He told me the secret is that Paypal has built a “scrappy” culture. No matter what problems they faced, they would find a way to solve them. I kind of got the idea, but was still confused about the execution details. So when I saw some of the past Paypal employees answering this question on Quora, I was super excited! After all, they should be the only ones who can tell people the inside stories. Below are some highlights of their answers. *If you want to check out the sources or leave your comments, please go to here and here. On Talent Management “Peter and Max assembled an unusual critical mass of entrepreneurial talent, primarily due to their ability to recognize young people with extraordinary ability (the median age of *execs* on the S1 filing was 30). But the poor economy allowed us to close an abnormal number of offers, as virtually nobody other than eBay and (in part) google was hiring in 2000-02.” (by Keith Rabois, former Executive Vice President of Paypal) “Extreme Focus (driven by Peter): Peter required that everyone be tasked with exactly one priority. He would refuse to discuss virtually anything else with you except what was currently assigned as your #1 initiative. Even our annual review forms in 2001 required each employee to identify their single most valuable contribution to the company.” (by Keith Rabois, former Executive Vice President of Paypal) “Dedication to individual accomplishment: Teams were almost considered socialist institutions. Most great innovations at PayPal were driven by one person who then conscripted others to support, adopt, implement the new idea. If you identified the 8-12 most critical innovations at PayPal (or perhaps even the most important 25), almost every one had a single person inspire it (and often it drive it to implementation). As a result, David enforced an anti-meeting culture where any meeting that included more than 3-4 people was deemed suspect and subject to immediate adjournment if he gauged it inefficient. Our annual review forms in 2002 included a direction to rate the employee on “avoids imposing on others’ time, e.g. scheduling unnecessary meetings.” (by Keith Rabois, former Executive Vice President of Paypal) “Refusal to accept constraints, external or internal:We were expected to pursue our #1 priority with extreme dispatch (NOW) and vigor. To borrow an apt phrase, employees were expected to “come to work every day willing to be fired, to circumvent any order aimed at stopping your dream.” Jeremy Stoppelman has relayed elsewhere the story about an email he sent around criticizing management that he expected to get him fired and instead got him promoted. Peter did not accept no for answer: If you couldn’t solve the problem, someone else would be soon assigned to do it.” (by Keith Rabois, former Executive Vice President of Paypal) “Driven problem solvers: PayPal had a strong bias toward hiring (and promoting / encouraging, as Keith mentions) smart, driven problem solvers, rather than subject matter experts. Very few of the top performers at the company had any prior experience with payments, and many of the best employees had little or no prior background building Internet products. I worked on the fraud analytics team at PayPal, and most of our best people had never before done anything related to fraud detection. If he’d approached things “traditionally”, Max would have gone out and hired people who had been building logistic regression models for banks for 20 years but never innovated, and fraud losses would likely have swallowed the company.” (by Mike Greenfield, former Sr. Fraud R&D Scientist of Paypal) “Self-sufficiency – individuals and small teams were given fairly complex objectives and expected to figure out how to achieve them on their own. If you needed to integrate with an outside vendor, you picked up the phone yourself and called; you didn’t wait for a BD person to become available. You did (the first version of) mockups and wireframes yourself; you didn’t wait for a designer to become available. You wrote (the first draft of) site copy yourself; you didn’t wait for a content writer.” (by Yee Lee, former Product & BU GM of Paypal) On Culture & Ideology “Extreme bias towards action – early PayPal was simply a really *productive* workplace. This was partly driven by the culture of self-sufficiency. PayPal is and was, after all, a web service; and the company managed to ship prodigious amounts of relatively high-quality web software for a lot of years in a row early on. Yes, we had the usual politics between functional groups, but either individual heroes or small, high-trust teams more often than not found ways to deliver projects on-time.” (by Yee Lee, former Product & BU GM of Paypal) “Willingness to try – even in a data-driven culture, you’ll always run in to folks who either don’t believe you have collected the right supporting data for a given decision or who just aren’t comfortable when data contradicts their gut feeling. In many companies, those individuals would be the death of decision-making. At PayPal, I felt like you could almost always get someone to give it a *try* and then let performance data tell us whether to maintain the decision or rollback.” (by Yee Lee, former Product & BU GM of Paypal) “Data-driven decision making – PayPal was filled with smart, opinionated people who were often at logger-heads. The way to win arguments was to bring data to bear. So you never started a sentence like this “I feel like it’s a problem that our users can’t do X”, instead you’d do your homework first and then come to the table with “35% of our [insert some key metric here] are caused by the lack of X functionality
” (by Yee Lee, former Product & BU GM of Paypal) “Radical transparency on metrics: All employees were expected to be facile with the metrics driving the business. Otherwise, how could one expect each employee to make rational calculations and decisions on their own every day? To enforce this norm, almost every all-hands meeting consisted of distributing a printed Excel spreadsheet to the assembled masses and Peter conducting a line by line review of our performance (this is only a modest exaggeration).” (by Keith Rabois, former Executive Vice President of Paypal) “Vigorous debate, often via email: Almost every important issue had champions and critics. These were normally resolved not by official edict but by a vigorous debate that could be very intense. Being able to articulate and defend a strategy or product in a succinct, compelling manner with empirical analysis and withstand a withering critique was a key attribute of almost every key contributor. I still recall the trepidation I confronted when I was informed that I needed to defend the feasibility of my favorite “baby” to Max for the first time.” (by Keith Rabois, former Executive Vice President of Paypal) “Extreme Pressure – PayPal was a very difficult business with many major issues to solve. We were able to see our colleagues work under extreme pressure and hence we learned who we could rely on and trust.” (by Keith Rabois, former Executive Vice President of Paypal)

474 Why Intelligent People Fail
Why Intelligent People Fail Content from Sternberg, R. (1994). In search of the human mind. New York: Harcourt Brace. 1. Lack of motivation. A talent is irrelevant if a person is not motivated to use it. Motivation may be external (for example, social approval) or internal (satisfaction from a job well-done, for instance). External sources tend to be transient, while internal sources tend to produce more consistent performance. 2. Lack of impulse control. Habitual impulsiveness gets in the way of optimal performance. Some people do not bring their full intellectual resources to bear on a problem but go with the first solution that pops into their heads. 3. Lack of perserverance and perseveration. Some people give up too easily, while others are unable to stop even when the quest will clearly be fruitless. 4. Using the wrong abilities. People may not be using the right abilities for the tasks in which they are engaged. 5. Inability to translate thought into action. Some people seem buried in thought. They have good ideas but rarely seem able to do anything about them. 6. Lack of product orientation. Some people seem more concerned about the process than the result of activity. 7. Inability to complete tasks. For some people nothing ever draws to a close. Perhaps it’s fear of what they would do next or fear of becoming hopelessly enmeshed in detail. 8. Failure to initiate. Still others are unwilling or unable to initiate a project. It may be indecision or fear of commitment. 9. Fear of failure. People may not reach peak performance because they avoid the really important challenges in life. 10. Procrastination. Some people are unable to act without pressure. They may also look for little things to do in order to put off the big ones. 11. Misattribution of blame. Some people always blame themselves for even the slightest mishap. Some always blame others. 12. Excessive self-pity. Some people spend more time feeling sorry for themselves than expending the effort necessary to overcome the problem. 13. Excessive dependency. Some people expect others to do for them what they ought to be doing themselves. 14. Wallowing in personal difficulties. Some people let their personal difficulties interfere grossly with their work. During the course of life, one can expect some real joys and some real sorrows. Maintaining a proper perspective is often difficult. 15. Distractibility and lack of concentration. Even some very intelligent people have very short attention spans. 16. Spreading oneself too think or too thick. Undertaking too many activities may result in none being completed on time. Undertaking too few can also result in missed opportunities and reduced levels of accomplishment. 17. Inability to delay gratification. Some people reward themselves and are rewarded by others for finishing small tasks, while avoiding bigger tasks that would earn them larger rewards. 18. Inability to see the forest for the trees. Some people become obsessed with details and are either unwilling or unable to see or deal with the larger picture in the projects they undertake. 19. Lack of balance between critical, analytical thinking and creative, synthetic thinking. It is important for people to learn what kind of thinking is expected of them in each situation. 20. Too little or too much self-confidence. Lack of self-confidence can gnaw away at a person’s ability to get things done and become a self-fulfilling prophecy. Conversely, individuals with too much self-confidence may not know when to admit they are wrong or in need of self-improvement.

460 Vacuum Tube Modules for Electronic Music by Metasonix - S-1000 Wretch Machine
Vacuum Tube Modules for Electronic Music by Metasonix Metasonix, Vacuum Tube, Tube, Electronic Music, Electronic, Eric Barbour, Vacuum Tube Valley, synth

441 How To Become a Millionaire In Three Years | Jason L. Baptiste
/* This was originally a comment made in response to a hacker news thread titled:  Ask HN: How to become a millionaire in 3 years? .  The comment has over must reads,startups

440 A List Apart: Articles: Taking Advantage of HTML5 and CSS3 with Modernizr
Ten years ago, only the most cutting-edge web designers used CSS for layouts and styling. Browser support for CSS layouts was slim and buggy, so these people advocated for web standards adherence, while creating hacks that made CSS layouts work in all browsers. One hack that became widely used was browser sniffing: Detecting which browser and version the user had by looking at the navigator.userAgent property in JavaScript. Browser sniffing allowed for quick and easy code forking, allowing developers to target different browsers with different instructions. Today, CSS-based layouts are commonplace and every browser has pretty solid support for them. But now we have CSS3 and HTML5, and the situation is repeating itself—different browsers demonstrate varying levels of support for these new technologies. We’ve smartened up, however, and no longer employ CSS hacks nor use browser sniffing—an unreliable, poor practice. We’ve also convinced more and more clients that websites don’t need to look exactly the same in every browser. So how do we deal with this new but familiar problem? Simple: We use feature detection, which means that we do not ask the browser “who are you?” and make unreliable assumptions from there on. Instead we ask the browser, “can you do this and that?” It’s a simple way to test browser capabilities, but doing all these tests manually all the time gets tiresome. To solve that problem (and others), you can use Modernizr.

428 Alain Neffe and the Home-Taped Electronic Music Revolution
Alain Neffe launched his first tape label at home in Belgium in 1981. He called it Insane Music Contact and his first installment was called Insane Music for Insane People. Thus began a nearly thirty year foray into home-made, visionary and utterly unfashionable electronic music that has hardly made anyone involved a household name. Insane Music released 55 titles in its most prolific years (1981-87). Five of these were vinyl records and the rest were cassettes tapes. Why cassettes tapes? Magnetic tape was the obvious solution to the problem facing many artists working without record contracts in those days. Cassettes could be recorded at home, produced at home, dubbed at home, and sold or traded by mail. No need for tasteless outside producers and marketing mojo—one needed only leave home to buy more tapes. Says Neffe, “I could copy the tapes on demand. Releasing an LP required that you print 500 copies and 1000 copies of the cover sleeve, and everything had to be paid up front 
 if the buyer didn’t like the music, he or she could wipe it out and record something else on it.” Mr. Neffe was not the only one out there recording, selling and trading tapes by mail. On both sides of the Atlantic, home cassette technology was permitting the release of much groundbreaking and breathlessly beautiful work, as well as some noxious and otherwise self-indulgent wanking—that coat of many colors we call the DIY (do-it-yourself) Revolution. As early as 1974, Albrecht/d. self-released a cassette entitled Amsterdam Op De Dam in Germany. In 1976, Throbbing Gristle was distributing tapes of their infamous live recordings, and in 1977, the French electro-industrial unit Die Form began releasing tapes on their own Bain Total label. 1980 saw the release of two monumental self-released cassettes, The Storm Bugs’ A Safe Substitute and Colin Potter’s The Ghost Office. In Japan, 1980 saw the release of Merzbow’s first two cassettes, Remblandt Assemblage and Fuckexercise. And in the USA, 1981 saw John Bender’s Plaster: The Prototypes, a laconic and mysterious series of tone and vocal poems. Home taping was not limited to electronic music. R. Stevie Moore, one of the elder living ancestors of the lo-fi rock aesthetic, began releasing distributing home-made tapes via the R. Stevie Moore Cassette Club sometime in the 1970s. And tapes of live punk shows from the era continue to trade hands. Soon, cassettes were coming from everywhere: mysterious PO boxes in the Midwest, to which you sent a blank tape and three dollars and received the tape back with something on it. The Tellus Audio Cassette Magazine was a Fluxus-inspired subscription audio-journal dedicated to music as well as poetry and drama and other forms of audio-art. Zines like Factsheet Five and Unsound devoted entire columns to the material they received from bands on home-made cassette, and demo tapes began leaking to radio stations prior to official record release dates. It was a grassroots movement that marched in association with the self-publication of zines, comics, chapbooks, and other media. The medium had begun to become the message. Insane Music for Insane People (which eventually reached 25 volumes) was a series compiling all home-made electronic music made by artists from across the globe. By including in the liner notes the contact address for each artist featured, Neffe helped pioneer a snail-mail network for those interested in more of what they heard. Artists from all over Europe and the USA, from Japan, New Zealand, and beyond contributed over the years. One could send a few dollars to Insane Music Contact, receive tapes in the mail, write to artists involved and receive more cassettes. Insane Music Contact (now known as Insane Music) has always been a vehicle for Mr. Neffe’s own electronic music projects as well, many of which are periodically active to this day. Though he now makes liberal use of the CD format, Neffe’s artistic approach remains undiluted by years of underexposure. He expects very little acknowledgment of or remuneration for his efforts, which, for him, are emotional articulation, continued experimentation, and purity. It seems nothing but nothing could possibly catapult such heavily uncommercial sounds into the public consciousness–not even this thirty-year retrospective box-set entitled The Insane Box released (ironically, on vinyl) by the venerable Frank Maier of Vinyl-on-Demand Records, an outfit devoted to preserving the precious gems of cassette culture before the evidence disintegrates. For this retrospective (4 LPs + a 7” 45), Mr. Neffe has reached into dusty attic boxes, wherein lay unreleased (or hardly available) material by five projects of which he has been a part: BeNe GeSSeRiT, Human Flesh, Pseudo Code, I Scream and Subject. Each has a unique cerebral orientation and emotional vibe made possible by the combined efforts of invited guests; each runs the high fever of a man very much committed to a personal vision of artistic purity without virtuosity, and each is distinctly French. BeNe GeSSeRiT was not the first of Mr. Neffe’s projects to be recorded and distributed, but is, to my understanding, the genesis of his approach to music as “texts” or “photographs”, or as he puts it, “potlatch music”. On these early tracks we also detect a burgeoning interest in the endless expressive properties of the human voice, both explicitly human and as heavily-treated sound sculpture, both French and English At times, voices shout like besotted Celine parlor workers at each other from tenement windows; at other times a high-pitched female voice wails up and down like Catherine Ribeiro alone in her bathroom. In these tracks, one can also detect the half-digested influence of electro-rock luminaries Silver Apples, the avant-lashings a la Yoko Ono, and occasionally the thunder-beat of early Laibach. Primitive Casio electronics, stage whispers, delay echoes, tape loops, and a certain absurdist humor redolent of Erik Satie, neither dampen the fabric with melodrama, nor detract from the integrity of the grist, nor from the topical seriousness of the text’s subjects. BeNe GeSSeRiT is difficult music, even in the moments that risk elegy, yet it is still more accessible than some of the other Francophone avant-dada outfits of the day, such as DDAA and Étant DonnĂ©s, or Nurse with Wound in the UK. Human Flesh is decidedly more structurally cohesive and song-oriented than BeNe GeSSeRiT, and its predecessors and influences are less clear. Still there is a clear interest in the human voice, its textures and timbers when removed of sign value by backwards-masking, and the new textures that emerge when disassembled and reassembled. Even rock-oriented at times, Human Flesh chases a more delirious climax, for the hounds of the carnival are snapping at their heels as they run. This is also a project of varied angles and pursuits, sliding as it does into poetic electro-pop (the supple and Chicago-accented voice of the late Lydia Tomkiw, of Algebra Suicide, appears on two tracks), and moments of Half Japanese-style primitivism. The side-long track “Langsam” is more reminiscent of Piper-era Pink Floyd and Brainticket, as well as other Krautrock, yet is still distinctly French. These early and rare tracks are, in contrast to the more ambitious Pseudo Code and the more intimate recordings by I Scream, more oblique for being a mix-down of materials sent to Neffe from artists around the globe. The track “Sons of God?” is also notable for what is perhaps the first recorded sample of the American fire-and-brimstone preacher Ferrell Griswold, whose voice has appeared in music by Front 242, Phallus Dei, Pragha Khan, et cetera. The cassette medium, for all its benefits to individual artistic expression and culture, is for the selfsame reasons impermanent. Magnetic tape has a thirty year lifespan if properly archived, which means both that preserving their contents in other formats is important, and that paying hundreds of dollars for the original artifacts is a questionable collectors’ pursuit (nevertheless, you can watch it happen daily). With the advent of the mp3 and the efforts of Vinyl-on-Demand and other labels, Insane Music’s CD-r reissue program included, some of this exquisite material has been rescued from oblivion.

364 What every programmer should know about memory, Part 1 [LWN.net]
Editor's introduction: Ulrich Drepper recently approached us asking if we would be interested in publishing a lengthy document he had written on how memory and software interact. We did not have to look at the text for long to realize that it would be of interest to many LWN readers. Memory usage is often the determining factor in how software performs, but good information on how to avoid memory bottlenecks is hard to find. This series of articles should change that situation. The original document prints out at over 100 pages. We will be splitting it into about seven segments, each run 1-2 weeks after its predecessor. Once the entire series is out, Ulrich will be releasing the full text. Reformatting the text from the original LaTeX has been a bit of a challenge, but the results, hopefully, will be good. For ease of online reading, Ulrich's footnotes have been placed {inline in the text}. Hyperlinked cross-references (and [bibliography references]) will not be possible until the full series is published. Many thanks to Ulrich for allowing LWN to publish this material; we hope that it will lead to more memory-efficient software across our systems in the near future.

340 7-things-to-stop-doing-now-on-facebook: Personal Finance News from Yahoo! Finance
Using a Weak Password Avoid simple names or words you can find in a dictionary, even with numbers tacked on the end. Instead, mix upper- and lower-case letters, numbers, and symbols. A password should have at least eight characters. One good technique is to insert numbers or symbols in the middle of a word, such as this variant on the word "houses": hO27usEs! Leaving Your Full Birth Date in Your Profile More from ConsumerReports.org: ‱ Millions of Users Exposing Personal Information ‱ Tested: 119 Laptops, Desktops, Netbooks and iPad ‱ Electronics Reviews It's an ideal target for identity thieves, who could use it to obtain more information about you and potentially gain access to your bank or credit card account. If you've already entered a birth date, go to your profile page and click on the Info tab, then on Edit Information. Under the Basic Information section, choose to show only the month and day or no birthday at all. Overlooking Useful Privacy Controls For almost everything in your Facebook profile, you can limit access to only your friends, friends of friends, or yourself. Restrict access to photos, birth date, religious views, and family information, among other things. You can give only certain people or groups access to items such as photos, or block particular people from seeing them. Consider leaving out contact info, such as phone number and address, since you probably don't want anyone to have access to that information anyway. Popular Stories on Yahoo!: ‱ 20 Best Cities to Ride Out the Recession ‱ Wealth Ranking: You're Richer Than You Think ‱ 7 Expenses You Can Ditch in Retirement More from Yahoo! Finance Posting Your Child's Name in a Caption Don't use a child's name in photo tags or captions. If someone else does, delete it by clicking on Remove Tag. If your child isn't on Facebook and someone includes his or her name in a caption, ask that person to remove the name. Mentioning That You'll Be Away From Home That's like putting a "no one's home" sign on your door. Wait until you get home to tell everyone how awesome your vacation was and be vague about the date of any trip. Letting Search Engines Find You To help prevent strangers from accessing your page, go to the Search section of Facebook's privacy controls and select Only Friends for Facebook search results. Be sure the box for public search results isn't checked. Permitting Youngsters to Use Facebook Unsupervised Facebook limits its members to ages 13 and over, but children younger than that do use it. If you have a young child or teenager on Facebook, the best way to provide oversight is to become one of their online friends. Use your e-mail address as the contact for their account so that you receive their notifications and monitor their activities. "What they think is nothing can actually be pretty serious," says Charles Pavelites, a supervisory special agent at the Internet Crime Complaint Center. For example, a child who posts the comment "Mom will be home soon, I need to do the dishes" every day at the same time is revealing too much about the parents' regular comings and goings.

284 MATRIXSYNTH: Alesis Andromeda A6 Tip
Alesis Andromeda A6 Tip If you own an Andromeda, give this a try. Via this gearslutz thread where you'll find additional details, via mister bunty on AH: "For those that asked, here's the thread on gearslutz that explains the waveshaping that happens above level 30. I know it sounds crazy, but if you keep the levels pre-mix below 30 total (yes, total!) and then the filter/ringmod/postmix levels around 70 at sum, you'll hear a whole new definition. I tried it on a crappy set of headphones and was amazed. Then, I listened through my bluesky monitors and a set of NS-10s, and couldn't believe the detail I had been missing. For me, at least, the juice and "vintage-ness" of the Andy was discovered." http://www.gearslutz.com/board/electronic-music-instruments-electronic-music-production/473535-what-does-andromeda-do-better-6.html#post5206610

255 Create a Calendar Using Scripting in Photoshop | Psdtuts+
Creating a graphic calendar by hand is not an easy task. That is why it is best if you can find some way of automating the process. In today’s tutorial we

207 The State of the Internet Operating System - O'Reilly Radar
Ask yourself for a moment, what is the operating system of a Google or Bing search? What is the operating system of a mobile phone call? What is the operating system of maps and directions on your phone? What is the operating system of a tweet? cloud computing, internet operating system, location, social networking, speech recognition, web 2.0

101 - 201