TL;DR summary of stories on the internet
I am an experienced designer of 8×8 bitmap fonts and I have made them freely available for use in games. In return, I ask for a mention in the credits section. These fonts have been used in 199 games and tools so far! Each page on my website showcases screenshots, provides background information on the […]
Read more »
On July 11, 2023, Microsoft addressed a security breach in a blog post. The threat actor Storm-0558 used a acquired Microsoft account to gain unauthorized access to OWA and Outlook.com. Microsoft conducted a thorough investigation into the acquisition of the account and has released its findings. The company has strict controls in place to protect […]
Paul Buchheit, an engineer and partner at Y Combinator, sat down with Harj Taggar, the co-founder and CEO of Triplebyte, to discuss his journey from programming to joining Google and becoming a successful engineer. Buchheit initially became interested in programming while playing a video game and realizing he could manipulate the game’s data file. He […]
According to the author, in order to ensure that there is no angular misalignment in the layout, the number of left pieces minus the number of right pieces must be a multiple of 12. The author also mentions that the vectors from the start to the end of each piece should add up to zero […]
This web content discusses how to run Visual Studio Code (VSCode) on your device, specifically the Linux desktop edition. It mentions that the installation is minimal and requires the addition of packages and extensions based on individual needs, such as C++ development. The article highlights that versions configured for other development flows will be added […]
Feature flagging tools like Launch Darkly, PostHog, and Flagsmith offer valuable capabilities such as A/B testing and phased rollouts. However, there is a hidden cost. Often, I use flags to commit unfinished code without creating a separate branch, allowing for a single source of truth and promoting agile development. For instance, while implementing a Gift […]
In this web content, the author marks the 10-year anniversary of the Snowden revelations and provides an overview of the disclosures. They mention that over 200 press reports and 1200 classified documents were published between 2013 and 2019. They also highlight books on the topic, including Glenn Greenwald’s “No Place To Hide,” which takes a […]
This web content provides a quick start guide for the SAM.cpp project, which is an implementation of Meta’s Segment Anything Model in pure C/C++. The guide includes instructions for cloning the repository, downloading and converting the model checkpoint, building the project, and running the inference. The author notes that certain dependencies, such as cmake and […]
The author discusses their approach to writing small, stand-alone command line programs in Common Lisp. They prefer to have each program as a single file, with the necessary libraries and user interface properly implemented. The author also explains the directory structure they use for their programs and provides a skeleton structure for the .lisp files, […]
Hardware has always fascinated me as a technologist. It has the power to create physical outcomes that software alone cannot achieve. However, building hardware products comes with its own set of challenges, including complexity and the constraints of the physical world. Despite these challenges, building hardware products has never been easier than it is today. […]