Recently in Technology Category

Google's Culture of Fear

From the article: "Before the pernicious or the insidious, we of course begin with the deeply, hilariously stupid: from screenshots I've obtained, an insistence engineers no longer use phrases like "build ninja" (cultural appropriation), "nuke the old cache" (military metaphor), "sanity check" (disparages mental illness), or "dummy variable" (disparages disabilities). One engineer was "strongly encouraged" to use one of 15 different crazed pronoun combinations on his corporate bio (including "zie/hir," "ey/em," "xe/xem," and "ve/vir"), which he did against his wishes for fear of retribution. Per a January 9 email, the Greyglers, an affinity group for people over 40, is changing its name because not all people over 40 have gray hair, thus constituting lack of "inclusivity" (Google has hired an external consultant to rename the group)."

From the comments: "It is fascinating how so many successful organizations end up accidentally setting up incentives that reward and increase the influence of the dumbest people in the room. There are undoubtedly thousands of genius level engineers at Google, and yet they get their marching orders from people who couldn't pass a freshman calculus class."

FIRST - Mouser

| | TrackBacks (0)

FIRST - Mouser - Dean Kamen intervew

Mouser is an electronic parts company that sponsors FIRST Robotics. They've got a great little 9 minute interview on their website with founder Dean Kamen about the value of FIRST Robotics. "Every player can turn pro!"

cPanel: Enable domains' DKIM records

If you have a cPanel account and have a DKIM key to validate outgoing email, but none of your email is being signed with the key, here's the shell command to fix the problem.

W. Jason Morgan, discoverer of plate tectonics (1935-2023)

"In 1967, Jason Morgan presented a groundbreaking paper at the annual meeting of the American Geophysical Union (AGU) in Washington DC. It showed that Earth's surface consists of about a dozen rigid plates. They are created at mid-ocean ridges, destroyed in subduction zones where they converge, and move past one another along great faults, such the San Andreas Fault in California. Other papers followed, explaining that volcanoes occur where plates subduct, mountains rise where and when continents collide, and earthquakes result from jostling and shearing at plate margins."

Rob's tips for uncovering radio station stream URLs | The SWLing Post

Many radio-listening apps and some old-time internet radio appliances need a stream URL to find a station. This article describes how to use diagnostic tools in your desktop browser to dig through all the Javascript to find the actual stream URL for a radio livestream.

RELATED: radio-browser.info is a crowdsourced database of over 40,000 radio streams around the world. A GeoMap makes it easy to browse for streams in a particular part of the world. You can add map entries: I just added one for 4RPH Reading Radio in Brisbane. In turn, apps like RadioDroid use this database to find streams for listening. Unfortunately, some radio megacorporations s use stream-hopping techniques to force listeners to use their apps.

A 2014 article (updated in 2020) suggests using packet-sniffer tools to grab URLs and has a list of frequently used streaming domains, media types, and file extensions to look for.

Long gone, DEC is still powering the world of computing | Ars Technica

"In 1977, DEC introduced the VAX, a new line of minicomputers that featured a 32-bit instruction set architecture and virtual memory. Its operating system, VMS, was a multi-user, multitasking OS that provided features we now take for granted, including virtual memory, file sharing, and networking. It amassed a wide variety of third-party software packages that made it the most popular system in its class."

In 1982, 6.001, MIT's first-semester computer science course, used a DECsystem 20 running TOPS-20, with Emacs for the editor. In '89 I had to adapt code from a PDP-11/55 to a PDP-11/70 on a British Airways 737 ground maintenance simulator and hope nothing clobbered the brute-force entry I stuffed in the memory map; I carried the software with me from Oklahoma to England on a 20 MB disk pack the size of a large pizza. In the early '90s, we had a machine running VAXeln (a preemptive RTOS) as host computer for a human centrifuge. The same model computer and OS was used for years to run Oklahoma's Pikepass toll tag system, something I spotted when visiting the Pikepass office at the Tulsa end of the Turner Turnpike. 1993 was probably the last time I touched anything DEC except perhaps for the occasional VT100. When I graduated, Digital Equipment Corporation was a major employer along Boston's Route 128 beltway, but they were overtaken by the PC revolution.

BASIC Computer Games - Wikipedia

I have memories of typing computer programs printed in a magazine (Byte, Creative Computing) into our TRS-80 Model I, with the cassette drive for storage. The favorite was the Star Trek text-based game, where you chase Klingons across an 8x8 map of quadrants, and try to destroy them with phasers and photon torpedos, one command at a time. We had it on the Wang 2200 at school as well. Here's the 1978 edition of BASIC Computer Games. Hunt the Wumpus was another favorite; I modified the playing field from a dodecahedron (12 nodes, 3 adjacent to each) to an icosahedron (20 nodes, 5 adjacent ).

MORE: History and source of the 1971 version of Star Trek, with screenshots.

How to maintain Folder attributes (date created/modified) on a 'Copy' - when a new file is added

Use ROBOCOPY /MIR to create a mirror of an entire folder tree, with consistent create and modified times and date stamps. Pro tip: add /R:3 /W:3 to restrict retries to three times for three seconds each. You can also add a /LOG option to write results in a log file to find any files that failed to copy and try again manually. Here's the manual page for ROBOCOPY, with all of the options.

Unable to unmount an ISO image, An error occurred while ejecting - Microsoft Community

Increasingly software is distributed as large files that are images of CDs or DVDs rather than the physical objects. They can be mounted as Windows drives, but then they can't be unmounted with the Eject command that works with a real CD/DVD drive or a thumbdrive.

What's funny/infuriating is how the Microsoft employees' answers all follow the same script that someone with no knowledge of Windows internals would try, steps that require hours or days and may be destructive -- reboot in safe mode, do a system restore -- while some random user comes up with the actual answer that solves the problem in seconds.

(The answer is to use PowerShell, and probably need to run it as Administrator: mountvol DRIVELETTER: /d )

How to Hide or Show User Accounts from Login Screen on Windows 10/11? | Windows OS Hub

If you don't want everyone in the airport lounge / coffee shop to see your name when you unlock your laptop....