recentpopularlog in

rbf : article   50

Here are 380 Ivy League courses you can take online right now for free
The 8 Ivy League schools are among the most prestigious colleges in the world. They include Brown, Harvard, Cornell, Princeton, Dartmouth, Yale, and Columbia Universities, and the University of Pennsylvania. All these universities offer free online courses across multiple online course platforms. These courses are know as MOOCs or Massive Open Online Courses.
So far, they’ve created around 500 courses, of which around 380 are still active. Class Central has made a collection of all these, which you can explore below. I’ve split these courses into the following categories: Computer Science, Programming, Business & Management, Humanities, Art & Design, Science, Health & Medicine, Mathematics, Education & Teaching and Engineering.
free  mooc  courses  resources  list  education  online  programming  learning  medium  blog  article 
26 days ago by rbf
Announcing: Our Online Learning Platform Upcase is Now Free!
If you’re not familiar, Upcase is our online learning platform. While mentoring client teams, we found that there was plenty of content available targeted at folks new to web development, but not much focused on the intermediate and advanced developers looking to take their skills up another notch. With Upcase we built that content.
For six years we’ve shared our thinking, workflows, and approach to building web apps via Upcase. We’ve been able to help thousands of developers level up their skills through workshops, videos, flash cards, and coding exercises. Until now, Upcase required a subscription fee, but as of today, everything on Upcase is completely free 🎉.
free  software  engineering  ruby  rubyonrails  programming  learning  tutorials  online  platform  company  blog  article  october  2018 
7 weeks ago by rbf
When you buy digital content on Amazon or iTunes, you don't exactly own it - Los Angeles Times
Buy an e-book on Amazon or an album on Apple's iTunes and you own it, right?
Maybe not as much as you think.
It's all about what the tech industry calls digital rights management, and the bottom line for consumers is that there are significant differences between owning a tangible product and owning its electronic equivalent.
digital  news  article  may  2016 
7 weeks ago by rbf
“La gente se radicaliza porque prefiere sentir a razonar” – Anna Rosling | La Contra | La Vanguardia
Tengo 43 años: el mundo es menos pobre, violento, desigual e injusto que cuando nací. Desconfíe de los relatos dramáticos e interesantes de periodistas, activistas y políticos: suelen ser interesados. Publicamos ‘Factfulness’ para ayudar a analizar la realidad con la razón y datos; no con instintos y prejuicios
interview  opinion  culture  stats  journalism  news  article  december  2018 
7 weeks ago by rbf
Why you should deploy on Friday afternoon - DEV Community 👩‍💻👨‍💻
"Don't deploy on Friday afternoons!"
This expression is taken as programmer wisdom but I hate it. I'm going to try and kill it, with words and experience.
The motivation behind it is sound. I don't want to spend my Friday nights debugging a production problem either.
To me the expressions smacks of unprofessionalism. Software development as an industry has a poor reputation and phrases like this do not help.
If you went to an ER on a Friday afternoon and was turned away because the doctors don't trust their own tools and know-how, how would you feel?
If we want people to take our craft seriously we need to own it and not give the impression that we dont understand the systems are we making enough to make changes at the end of the week.
devops  dev  agile  programming  advice  personal  blog  opinion  article  august  2018 
7 weeks ago by rbf
The Simple Truth Behind Reading 200 Books a Year – Member Feature Stories – Medium
Somebody once asked Warren Buffett about his secret to success. Buffett pointed to a stack of books and said, “Read 500 pages like this every day. That’s how knowledge works. It builds up, like compound interest. All of you can do it, but I guarantee not many of you will...”
reading  career  advice  personal  medium  blog  article  january  2017 
september 2018 by rbf
Everything I can remember. – jessicashortall – Medium
When I was about 8, my mother took my sister and me to a local state park, a place where we would often ramble among the rocks and trees and streams. I waded up a stream on this particular trip, and when I looked back for my mom, I had gone a bit too far. A man was standing there in the stream, blocking my way, looking at me. He held a long, sharpened stick. And he began to chase me, up the stream and away from my mom and my sister. My mom finally realized I was missing, and she ran up the stream, yelling. The man ran away.
society  personal  medium  blog  article  september  2018 
september 2018 by rbf
5 Ways to Write "I Hope You Are Doing Well" in Email | Grammarly
Anyone who gets a lot of email is familiar with the stock “I hope you are doing well.” It’s the business email equivalent of small talk that begins with “How are you?” We all know that etiquette requires us to answer with “I’m fine. How are you?” Although this back-and-forth exchange is a rather meaningless part of face-to-face conversation, it’s become socially mandated. In email, however, “hope you’re well” or “I hope this email finds you well,” comes across as extraneous at best and insincere at worst.
email  productivity  language  advice  company  blog  article  july  2012 
september 2018 by rbf
Table of Disruptive Technologies & Innovation | What's Next: Top Trends
The table consists of 100 potentially disruptive technologies, which we have defined as new technologies capable of significant social, economic or political upheaval.
One axis (Y Axis) ranks potential for disruption from high to low, while the other (X Axis) is time ranked from sooner to later. Importantly, time relates to common usage or ubiquity, not initial invention. All very subjective, I know, but it has been thought about quite a bit.
The 100 technologies (99 really) are then divided into four groups. Horizon one technologies (green on the table) are new technologies that are happening right now. Companies should be integrating and executing these technologies right now if they are appropriate.
Horizon two technologies (yellow) are probable near future technologies (10-20 years hence). Companies should be experimenting and discussing these technologies now.
Horizon three technologies (red) are things that are likely to emerge in the more distant future (20 years plus). Companies should keep an eye on developments in these areas and explore when appropriate.
The outer edge of the table (grey) contains what we’ve termed Ghost Technologies. This is the really good bit! This is fringe thinking territory with some ideas bordering on complete lunacy. However, while each example is highly improbable, very few, if any, are totally impossible.
future  technology  engineering  research  repo  famous  personal  blog  article  march  2018 
september 2018 by rbf
Make Something Great: Become an Open Source Contributor · An A List Apart Article
You may think that open source is not for you. After all, it has always been a developer-dominant ecosystem. But code is by no means the only thing a piece of software is made of. Open source is first and foremost about community. Whether you’re a designer, developer, writer, doctor, or lawyer, there are many paths to the open source world.
Learn what you need to know to set out on your journey, from first steps to becoming a core contributor. It might change your career.
opensource  programming  career  advice  blog  article  august  2018  source:newsletter 
august 2018 by rbf
Seriously, though. What is a progressive web app? - DEV Community 👩‍💻👨‍💻
I’ve been familiar with the “progressive web app” (PWA) concept for a while now. But there’s always been an itch in the back of my mind about it.
web  design  dev  personal  blog  article  august  2018  source:newsletter 
august 2018 by rbf
From Monospace to Duospace: In Search of the perfect writing font
Monospace is the typical choice that communicates writing. With iA Writer Duospace, we went a step ahead. After seven years of offering no font options to write, iA Writer now comes with a choice. Next to the monospace Nitti you will now find a brand new duospace font. Duospace?
iawriter  opensource  fonts  design  official  company  blog  article  november  2017 
july 2018 by rbf
When to use target=”_blank”
Anchor links may have a target attribute which controls what happens when that link is clicked. One of the possible values of that attribute is "_blank", which tells the browser to open a new window (or tab, if that's the user's preference) when that link is clicked.
This used to be "invalid" in HTML (maybe only XHTML?) but people used it anyway since it worked. It's now perfectly valid in HTML5. But are there good reasons to do so?
(spoiler: almost none)
from:email  html  css  programming  advice  article  january  2014 
july 2018 by rbf
Online Security Guide for Journalists - ProtonMail Blog
All this information is a lot to take in, but if we were to distill this guide into a few practical points, they would be the following:
- Set strong and unique passwords (and keep them hidden)
- Use two-factor authentication
- Be wary of phishing attempts (see our guide on preventing phishing attacks)
- Keep in mind the risk from linked accounts
- Encrypt your backups, and don’t “accidentally” back up sensitive files
- Use encrypted services (ProtonMail for email, Signal for chat, etc.)
- Protect your internet traffic with a secure VPN
security  privacy  journalism  guide  advice  protonmail  official  company  blog  article  february  2018 
july 2018 by rbf
What I have learned from eight years of being a remote developer - DEV Community 👩‍💻👨‍💻
It's often difficult to see the hitches related to remote work. What I want with this post is not to give tips on how to handle to work properly, how to find remote work or how to purchase the proper equipment for that, but to show through my experience one face of it that is not easily perceptible. Only after some time you are capable to note details that make remote work amazing and are surprised by others that are extremely hard to anticipate when starting.
remote  work  dev  career  advice  personal  blog  article  june  2018 
july 2018 by rbf
Your Phone Is Listening and it's Not Paranoia - VICE
A couple years ago, something strange happened. A friend and I were sitting at a bar, iPhones in pockets, discussing our recent trips in Japan and how we’d like to go back. The very next day, we both received pop-up ads on Facebook about cheap return flights to Tokyo. It seemed like just a spooky coincidence, but then everyone seems to have a story about their smartphone listening to them. So is this just paranoia, or are our smartphones actually listening?
online  internet  privacy  security  professional  blog  article  june  2018 
june 2018 by rbf
It's perfectly fine to only code at work, don't let anyone tell you otherwise.
If you want to code in your spare time, go for it, but this career is an absolute marathon and being able to take yourself away from your computer more often is a strength as far as I'm concerned.
software  engineering  programming  career  culture  health  advice  blog  article  source:reddit  february  2018 
march 2018 by rbf
YAML Multiline Strings
Find the right syntax for your YAML multiline strings
Block Style Indicator: The block style indicates how newlines inside the block should behave. If you would like them to be kept as newlines, use the literal style, indicated by a pipe (|). If instead you want them to be replaced by spaces, use the folded style, indicated by a right angle bracket (>). (To get a newline using the folded style, leave a blank line by putting two newlines in. Lines with extra indentation are also not folded.)
yaml  syntax  dev  guide  article 
november 2017 by rbf
A Deep Dive into CSRF Protection in Rails – Ruby Inside – Medium
If you’re using Rails today, chances are you’re using CSRF protection. It’s been there almost since the beginning, and it’s one of those features in Rails that makes your life easier without needing to give it a second thought.
ruby  rubyonrails  rails  security  programming  web  dev  medium  personal  blog  article  july  2017 
october 2017 by rbf
Software development 450 words per minute - Vincit - Tuukka Ojala
"Something's a little bit off here." That's what I predict your first thought to be upon seeing my cubicle for the first time. There's no screen or mouse in sight. Instead there's a guy hammering away on a keyboard, staring at seemingly nothing.
motivation  software  programming  blog  article  source:reddit  august  2017 
september 2017 by rbf
Avoid phishing emails, fake 'virus' alerts, phony support calls, and other scams - Apple Support
If you see a message while browsing the web that your iPhone, Mac, or other Apple device has a virus, or someone claiming to be from Apple calls and asks for your account name and password, you’re likely the target of a scam.
Scammers use any means they can—fake emails, pop-up ads, text messages, even phone calls—to try to trick you into sharing personal information, such as your Apple ID password or credit card information. Use this information to protect your account and avoid scams.
apple  email  phishing  security  spam  official  support  article 
august 2017 by rbf
La complejidad matemática del “juego de la vida” | Tecnología | EL PAÍS
Lo que empezó siendo un sencillo entretenimiento matemático ha llevado su aplicación como simulación de procesos físicos y biológicos.
math  programming  computing  news  article  es  july  2017 
july 2017 by rbf
Zug Online: News: Blockchain-Identität für alle Einwohner
Ab September 2017 bietet die Stadt Zug als weltweit erste Gemeinde allen Einwohnerinnen und Einwohner die Möglichkeit, eine digitale Identität zu bekommen. Diese basiert auf einer App, welche persönliche Informationen mithilfe von Blockchain-Technologie sichert und mit einer Crypto-Adresse verknüpft. Die Einwohnerinnen und Einwohner registrieren ihre Identität eigenständig über die App. Anschliessend wird die Identität bei der Einwohnerkontrolle der Stadt Zug beglaubigt. Bis im September will die Stadt Zug mit Blockchain-Anwendungen weitere Erfahrungen sammeln und voraussichtlich im Frühling 2018 unter den Einwohnerinnen und Einwohnern eine «e-Voting»-Konsultativabstimmung durchführen.
ethereum  blockchain  cryptocurrencies  switzerland  official  gov  news  article  source:reddit  july  2017 
july 2017 by rbf
Five Reasons Why You Should Hire an Old Programmer
You should hire an old programmer. It’s true! Sure.. older programmers are not going to work as many hours as someone fresh out of college. They have kids and spouses and mortgages and softball games to attend. They won't hang out at the office playing Xbox and ping-pong all night. They will not work 80 hour weeks and they will actually use their vacation time. And of course they cost more than young programmers. Despite all of those reasons not to hire an older programmer, you still should. For one simple reason: they are worth it. I know this, because I am one.
programming  career  hiring  personal  blog  article  july  2017  source:reddit 
july 2017 by rbf
¿Hay peligro en usar las estaciones públicas para recargar el móvil? | Tecnología | EL PAÍS
Se trata de un elemento cada vez más común y que los huéspedes de los hoteles o los viajeros en tránsito en los aeropuertos agradecen: en lugar de un enchufe convencional, que además puede resultar diferente dependiendo del país que se visite, un puerto USB en la pared nos soluciona de un plumazo el problema de carga de nuestros equipos. No hay que volverse loco con cargadores, voltajes ni adaptadores: se enchufa el cable de carga a la pared, o a una estación de carga, y el móvil o tableta comienzan a cargarse. Sin embargo, este sencillo gesto podría implicar unos riesgos que la mayoría de los usuarios desconocen.
security  privacy  mobile  usb  news  article  june  2017  es 
july 2017 by rbf
The 1% fallacy | Successful Software
These markets are massive. The CRM market alone is estimated at around $18 billion per year. 1% of that is $180 million. How hard can it be to get one measly percent of a market? Ka-ching!
Except of course, it doesn’t work, unless you have massive amounts of funding or a brilliant idea that can completely disrupt the existing the market. Even then, you probably still need a fair amount of luck.
software  business  advice  personal  blog  article  may  2013 
june 2017 by rbf
How Ethereum Will Completely Change the World
(...) The above quote is taken from the first episode of the latest season of HBO’s Silicon Valley. It describes the seemingly crazy idea of building an entirely new layer of the internet — one that is decentralized and free from the chance of fraud, censorship, or any third-party interference. (...) The solution to this problem is to instead build an entirely distributed and secure layer of the Internet, what some are calling a “world computer.” Using a computing platform inspired by Bitcoin’s blockchain technology, this world computer would allow for decentralized applications that remove third-party interference from the equation. This platform, for those who aren’t already aware, is known as Ethereum. Ethereum is the leading offshoot of its widely known predecessor Bitcoin, but it goes far beyond the realm of cryptocurrency.
bitcoin  ethereum  blockchain  cryptocurrencies  finance  review  blog  article  april  2017  source:reddit 
may 2017 by rbf
Why You Should Never Use Google Authenticator Again
There can never be enough security. On the other hand, using faulty or weak protections may merely make you feel safe, while you remain exposed to various threats.
Using passwords only is generally a bad idea, which we have learned since the beginning of the Internet. We are making progress to a password-free world, but in the meantime, many websites offer an additional user account protection with Two-Factor Authentication (2FA).
2fa  learning  resource  company  medium  blog  article  october  2016 
may 2017 by rbf
Generation Smart | Die Weltwoche, Ausgabe 20/2006
Mittwoch, 3. Mai 2017 - Die Welt der 30-Jährigen ist so bunt, da würde Babyblau nur stören. Sie lieben es, gefordert zu werden, doch sie möchten bitte selbst entscheiden, von wem. Und was Glück ist, lässt sich dieser schlaue Jahrgang nicht vorschirrmachern. - Von Simon Brunner
social  switzerland  opinion  article  2006  design 
may 2017 by rbf
How the internet found a better way than illegible squiggles to prove you're not a robot | Technology | The Guardian
The experience of squinting at distorted text, puzzling over small images, or even simply clicking on a checkbox to prove you aren’t a robot could soon be over, if a new Google service takes off.
google  ai  machinelearning  technology  news  article  march  2017 
april 2017 by rbf head 'heartbroken' that users found out it sells their inbox data | Technology | The Guardian
The chief executive of email unsubscription service has said he is “heartbroken” that users felt betrayed by the fact that his company monetises the contents of their inbox by selling their data to companies such as Uber.
uber  privacy  news  article  april  2017  source:reddit 
april 2017 by rbf
Daring Fireball: On Uber’s ‘Identifying and Tagging’ of iPhones
“Secretly identifying and tagging iPhones even after its app had been deleted and the devices erased” is a rather startling accusation, because it sounds like it should be technically impossible. It’s also very much unclear what information Uber was able to glean from these “identified and tagged” iPhones other than some sort of unique device identifier.
privacy  apple  dev  api  uber  carsharing  app  professional  technology  blog  article  april  2017  source:reddit 
april 2017 by rbf
Brains Sweep Themselves Clean Of Toxins During Sleep : Shots - Health News : NPR
While the brain sleeps, it clears out harmful toxins, a process that may reduce the risk of Alzheimer's, researchers say. During sleep, the flow of cerebrospinal fluid in the brain increases dramatically, washing away harmful waste proteins that build up between brain cells during waking hours, a study of mice found.
health  article  source:reddit  october  2013 
april 2017 by rbf
370 Free Online Programming & Computer Science Courses You Can Start This Month
Five years ago, universities like MIT and Stanford first opened up free online courses to the public. Today, more than 700 schools around the world have created thousands of free online courses. I’ve compiled this list of over 370 such free online courses that you can start this month. For this, I leveraged Class Central’s database of over 7,000 courses. I’ve also included each course’s average rating.
free  courses  resources  list  education  online  programming  learning  medium  blog  article 
april 2017 by rbf
No, you are not ‘running late’, you are rude and ...
Man, do we HOPE we’re timely in passing this content onto to you. Greg Savage, founder of Firebrand (an Aquent brand down under) posted this no-holds-barred post about the importance of showing up on time. We thought it was too good not to share.
time  culture  blog  article 
april 2017 by rbf
About Two-Factor Authentication - GitHub User Documentation
Two-factor authentication, or 2FA, is a way of logging into websites that requires more than just a password. Using a password to log into a website is susceptible to security threats, because it represents a single piece of information a malicious person needs to acquire. The added security that 2FA provides is requiring additional information to sign in.
github  2fa  security  guide  official  support  article 
april 2017 by rbf
Congress, ISPs, and You - Cloak's super-simple VPN blog
Cloak’s VPN encrypts all of your data before it leaves your devices. Importantly, your data stays encrypted while it transits through your ISP’s network. This means that, while your ISP might be able to see that you use a VPN, they won’t be able to see anything about what you’re actually doing online. Once your data reaches Cloak’s network, we decrypt it and send it onward, far outside the reach of your ISP.
security  privacy  internet  isp  privacypolicy  official  company  blog  article  march  2017 
april 2017 by rbf
How can I be safer online? - Info Sec Recommendations
We are often asked "How can I be safer online?" Over the years we've accumulated 25 total recommendations, which we've divided into four categories
privacy  security  technology  duckduckgo  company  blog  article  february  2017  source:twitter 
february 2017 by rbf
Why we choose profit - Jason Fried
Jason Fried, Founder & CEO at Basecamp. Co-author of Getting Real, Remote, and REWORK.
"We’re outspoken about running a profitable company in an industry that so often eschews profits for potential. So why? People ask us why all the time. Why choose profit?"
business  career  advice  basecamp  medium  company  blog  article  february  2017 
february 2017 by rbf
Controlling your own wealth as a basic human right
A few months ago, the Indian government withdrew 86% of banknotes in circulation. Ostensibly, it was to cut down on the black market economy and tax cheats, but it also wiped out a large percentage of the wealth of the poorest people, who hold their wealth in cash. A few weeks later, Venezuela followed with a similar measure.
bitcoin  economy  coinbase  company  medium  blog  article  from:reeder  january  2017 
january 2017 by rbf
How to Use Both Your Wits in a Startup
For example, look at this word: “tmesis.” Your System 2 can quickly determine that a) you don’t know this word, and b) there is a way to find its meaning. Your intuitive System 1 quickly intuited its resemblance to the word “nemesis” or focus on the odd pairing of T and M.
business  advice  blog  article  from:reeder 
january 2017 by rbf
Es busca fotògraf per a un merescut homenatge
Tom Sponheim va comprar [el 2001] un tresor de cel·luloide per 3,5 euros als Encants i, ara, des de Seattle, tracta de localitzar a l'autor.
photography  news  article  ca  january  2017 
january 2017 by rbf
Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too. - The New York Times
James Comey, FBI director: “I saw something in the news, so I copied it,” Mr. Comey said. “I put a piece of tape — I have obviously a laptop, personal laptop — I put a piece of tape over the camera. Because I saw somebody smarter than I am had a piece of tape over their camera.”
online  security  privacy  fbi  facebook  news  article  june  2016 
january 2017 by rbf
Venture capital is going to murder Medium
It’s a crying shame, really. I love Medium. It’s the best writing environment on the web, and they sweat the details like nobody else. The community too is just peach. This could have been a love story for the ages.
medium  article  business  january  2017 
january 2017 by rbf
The memory models that underlie programming languages
There are about six major conceptualizations of memory, which I’m calling “memory models”², that dominate today’s programming. Three of them derive from the three most historically important programming languages of the 1950s — COBOL, LISP, and FORTRAN — and the other three derive from the three historically important data storage systems: magnetic tape, Unix-style hierarchical filesystems, and relational databases.
programming  history  memory  longform  article  online  learning  resource  source:hackernews  2016 
january 2017 by rbf
5 secure email services to encrypt your email in 2016 | #encryption - SiliconANGLE
Believe it or not, email is still a very popular means of communication. There are more than 2.5 billion email users worldwide sending 122,500,453,020 emails every hour and chances are you’re one of them. Edward Snowden showed us that our most private (or so we thought) communications are not safe from prying eyes. And now the FBI is trying to make Apple bypass its own encryption, potentially creating a backdoor into millions of devices. (...) we share with you five secure email services to protect yourself against snooping.
article  review  technology  encryption  security  privacy  email  providers  march  2016 
november 2016 by rbf
List of Secure Email Providers that take Privacy Serious - FreedomHack
Here is a list of secure email providers that take your privacy serious and do not track you (* = recommended, last updated February 5, 2016).
The list of secure email providers above is a comprehensive list of privacy focused providers that has been vetted by our team of security experts. These are not big name providers or privacy-violators that can be found scattered across the front page of search engines and ads. If you don’t wish to switch email providers, we recommend you begin implementing some form of encryption, such as PGP.
article  security  privacy  email  providers  list  february  2016 
november 2016 by rbf
The Ultimate Guide to Writing & Publishing with Markdown
Once you get the hang of Markdown, it’s an incredibly powerful writing tool which will allow you to write rich content for the web far faster than almost any other method. To get to that point, however, there’s a little bit of a learning curve. We thought we’d put together an all inclusive guide to make that curve a little bit shorter, and potentially teach you a few super-user tricks to Markdown that you might not have known.
blog  article  guide  markdown  blogging  march  2015 
november 2016 by rbf

Copy this bookmark:

to read