I’d like to mention two books that stood out for me in 2014: Nonfiction: The First 20 Minutes. Gretchen Reynolds is a New York Times columnist who distills health and exercise research down to practical, readable advice. I’ve never dog-eared as many pages in a book as The First 20 Minutes. Reynolds writes about why […]

Click to continue reading “My two favorite books of 2014″



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=501c7a896d0c2005d88b4c6e15fed7187a8ea5fa4ab55d4eefa8bcf1009037e4019ac9d70ed9adec9247970de382d9fa87c69f1fe3831ee5b2cb060c499bf278e0c409e05a956257e241a221dea2f7d53c1143eda3902fb9622c59720a91dd91e3d85f2e672c861fe6cfb45b539145e4a48c7fe6ca5b2d9cf9c3c2b24582473f7af0c93e71b27b20f80dc7d07a0dd774aec368107474780dd20da2313b78d77a2111e40a76964350e0b89a9e5a8d8748f134eec813ad4aa10550ab35d9b34302a51e610e8b0a9228f8300450c2f05b375ce4d9f9bd57438fd961cd38be90784f0cc83b90c36fddb18ad41e74a8f816c3eaf1d48d849021b8dc3260a66b9d3e11f7d0f893af677b99dd80b96f200377e69061a57a5204e2977422c9f25d83fec837106ee17c5e3322bdde7ba87583c64509914771eb6baec5882b723490f6ab02f6a721f2fd290548aec818dbd4ae7b336895a6b5e1d668f8024c1997eb40834b8fd5e5d8327cdfc6640480815a277ac08d73e55cfb478b07f498a4f9253b436de1e92c429b4dfb17a50e295f78c7e5e1fff9b1eda23daf4b9c4b6093fdd98f83e78490d92ea9c40813db81303502bef804c9041278e81ec9c3d1595301ce38a52c9db55da1121a43f3fe6f2c1fc29ba00cb4d06811d7467b5098277b5099fc[[T_F]]

A few months ago I saw a cool mosaic effect in a Wired ad for CA Technologies. Here’s what part of the ad looked like: I liked the ad, so I wondered how they did it. Can you see out how to create a similar effect? Take a minute to figure it out as an […]

Click to continue reading “Fun mosaic effect with Go”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

If you’ve read Scott Adams’ financial advice and my financial tips in case you win a startup lottery, then you might be interested in a few more pointers to good resources. Some web pages and books: – Don’t Play the Losers’ Game, by Henry Blodget. This is a short, accessible piece that explains why picking […]

Click to continue reading “An investment reading list”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

I’ve been spending more time surfing the web on my laptop than I’d like to. I’ve also noticed more emails that lure me into short tasks, but eventually eat up a large chunk of my day. I’d prefer to be spending more time working on projects, reading, and unplugging. So my new 30 day challenge […]

Click to continue reading “New 30 day challenge: “hermit mode””



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=501c7a896d0c2005d88b4c6e15fed7187a8ea5fa4ab55d4eefa8bcf1009037e4019ac9d70ed9adec9247970de382d9fa87c69f1fe3831ee5b2cb060c499bf278e0c409e05a956257e241a221dea2f7d53c1143eda3902fb9622c59720a91dd91e3d85f2e672c861fe6cfb45b539145e4a48c7fe6ca5b2d9cf9c3c2b24582473f7af0c93e71b27b20f80dc7d07a0dd774aec368107474780dd20da2313b78d77a2111e40a76964350e0b89a9e5a8d8748f134eec813ad4aa10550ab35d9b34302a51e610e8b0a9228f8300450c2f05b375ce4d9f9bd57438fd961cd38be90784f0cc83b90c36fddb18ad41e74a8f816c3eaf1d48d849021b8dc3260a66b9d3e11f7d0f893af677b99dd80b96f200377e69061a57a5204e2977422c9f25d83fec837106ee17c5e3322bdde7ba87583c64509914771eb6baec5882b723490f6ab02f6a721f2fd290548aec818dbd4ae7b336895a6b5e1d668f8024c1997eb40834b8fd5e5d8327cdfc6640480815a277ac08d73e55cfb478b07f498a4f9253b436de1e92c429b4dfb17a50e295f78c7e5e1fff9b1eda23daf4b9c4b6093fdd98f83e78490d92ea9c40813db81303502bef804c9041278e81ec9c3d1595301ce38a52c9db55da1121a43f3fe6f2c1fc29ba00cb4d06811d7467b5098277b5099fc[[T_F]]

So how did I do on my 30 day writing challenge? Well, the picture tells the story: Not too bad! I did miss one day, but here’s a secret about 30 day challenges: if you miss a day or two, you can just keep doing the challenge for another day or so at the end. […]

Click to continue reading “30 day challenge wrap-up: writing”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]