Names for Name Conventions

Names I’ve seen used to refer to naming conventions: snake_case, hacker_case, unix_hacker_style : Everything is lower case, though exceptions exist. E.g. HTTP_foo_bar. SCREAMING_SNAKE_CASE : Usually reserved for macros and constants. camelCase : The first letter is lowercase. PascalCase : The first letter is uppercase. kabob-case : Like snake_case, but uses dashes instead of underscores. Common for command-line options1, CSS styles, commands (e.g. git-receive-pack). While looking idly looking for details on this, I stumbled on this Medium post which is relevant.

#Engineering

How This Blog Works

How I put this site together and why.

#Meta

The Comcast Technician Problem

Given a set of tasks, incentives are often aligned towards dropping a task rather than allowing for perpetual accretion of delays.

#Math

Vim: Use Drop Not Edit, SBuffer Not Buffer

I’m going to assume you are a Vim user. Say you have a several windows open in Vim and you want to edit another file. Using :edit works if you want to open the file in the current window unconditionally. But that’s often not what you want. If you have the same file open in another window, then the most efficient and least disruptive thing to do is to switch to that window.

#Tools #Vim

Notes from Crash Course's Videos on Fact Checking Information You See On The Internet

Hank Green’s Crash Course YouTube channel has an excellent series about navigating digital information. It’s an excellent guide to how internet users could intelligently consume information they see on the internet. These are my (incomplete) notes from the series.

#Curiosity

Easier CLI for ad-hoc Ansible tasks and playbooks

Encode the host and group names into the name of a wrapper script for quick ad-hoc invocation of Ansible tasks and playbooks.

#Tools

Identity Domains

An Identity Domain is a scope within which we assume that the user’s identity can roam freely.

#Privacy

Ephemeral Fingerprinting On The Web

Any ephemeral low-entropy web observable property whose changes are concurrently observable by multiple sites can lead to cross site identity joining.

This method of identity joining does not require coordination between multiple first parties. A single third party embedded within multiple first parties can also use this method.

#Privacy