Names for Name Conventions
Names I’ve seen used to refer to naming conventions: snake_case, hacker_case, unix_hacker_style : Everything is lower case, though exceptions exist. E.g. HTTP_foo_bar. SCREAMING_SNAKE_CASE : Usually reserved for macros and constants. camelCase : The first letter is lowercase. PascalCase : The first letter is uppercase. kabob-case : Like snake_case, but uses dashes instead of underscores. Common for command-line options1, CSS styles, commands (e.g. git-receive-pack). While looking idly looking for details on this, I stumbled on this Medium post which is relevant.
#Engineering
How This Blog Works
How I put this site together and why.
#Meta
The Comcast Technician Problem
Given a set of tasks, incentives are often aligned towards dropping a task rather than allowing for perpetual accretion of delays.
#Math
Vim: Use Drop Not Edit, SBuffer Not Buffer
I’m going to assume you are a Vim user. Say you have a several windows open in Vim and you want to edit another file. Using :edit works if you want to open the file in the current window unconditionally. But that’s often not what you want. If you have the same file open in another window, then the most efficient and least disruptive thing to do is to switch to that window.
#Tools #Vim
Notes from Crash Course's Videos on Fact Checking Information You See On The Internet
Hank Green’s Crash Course YouTube channel has an excellent series about navigating digital information. It’s an excellent guide to how internet users could intelligently consume information they see on the internet. These are my (incomplete) notes from the series.
#Curiosity
Easier CLI for ad-hoc Ansible tasks and playbooks
Encode the host and group names into the name of a wrapper script for quick ad-hoc invocation of Ansible tasks and playbooks.
#Tools
Identity Domains
An Identity Domain is a scope within which we assume that the user’s identity can roam freely.
#Privacy
Ephemeral Fingerprinting On The Web
Any ephemeral low-entropy web observable property whose changes are concurrently observable by multiple sites can lead to cross site identity joining.
This method of identity joining does not require coordination between multiple first parties. A single third party embedded within multiple first parties can also use this method.
#Privacy