I’d like to mention two books that stood out for me in 2014: Nonfiction: The First 20 Minutes. Gretchen Reynolds is a New York Times columnist who distills health and exercise research down to practical, readable advice. I’ve never dog-eared as many pages in a book as The First 20 Minutes. Reynolds writes about why […]

Click to continue reading “My two favorite books of 2014″



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=617e23bf1ee8b12dcae10431b6d0f30a52eee530dee11b1df7ba63700c6841b54c2af2398ffa273766ddb98f34ac7a32ed3de88bb48c8bf520fe8dc75e291e5b17056497ca2dd64896c7b7f788361c8d096fc691b68f70bbd67143de63a83828348ad23c153c0919a5042f42b3abf1654d48563a0092bc6a46e1a18f9169913e3687c0fe142f96bdc6d86123d69863174c06a59264555491cea37b79e4cde67b69dfec630b11b305ceca8a130295e59769c7bb0708df973ccbf622fb1b96d7a15f808888b9cc6dfd953c187c2bf324542e6ee7331a822f5e07ece0bd6d03840deabc1b4226fe8a359974cc6db01a487e348694bddeeda5f95cd156b03c831b87268a79592aa3b2c6217844c91b5e8542512d8cd74e99144fe30db2cb3ee418857f4135bc084e33bd2a6512cbddd0e281d903696a7fd2e4690c16871e68cf1e58430f3060d1e67fe4a7ac967f280966925e13439d6724ccf4a29b69c6c9f608d958b6e5b088455652727cbf4da0721de95c91acca2e49d2b351bf5fac6d19393f15e2ac1faecb5e073c8db049597989bbf91b679b0c2a942d76ca09b2ca262c7f3bf1338563e8baa7ff7d66381b650365ecd2767bff3fb8021ccd3fce650769ce74ddd1074cc2cb5e1d2f75aa913d85d0dee06a9479fda48b79fda553[[T_F]]

A few months ago I saw a cool mosaic effect in a Wired ad for CA Technologies. Here’s what part of the ad looked like: I liked the ad, so I wondered how they did it. Can you see out how to create a similar effect? Take a minute to figure it out as an […]

Click to continue reading “Fun mosaic effect with Go”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

If you’ve read Scott Adams’ financial advice and my financial tips in case you win a startup lottery, then you might be interested in a few more pointers to good resources. Some web pages and books: – Don’t Play the Losers’ Game, by Henry Blodget. This is a short, accessible piece that explains why picking […]

Click to continue reading “An investment reading list”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

I’ve been spending more time surfing the web on my laptop than I’d like to. I’ve also noticed more emails that lure me into short tasks, but eventually eat up a large chunk of my day. I’d prefer to be spending more time working on projects, reading, and unplugging. So my new 30 day challenge […]

Click to continue reading “New 30 day challenge: “hermit mode””



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

So how did I do on my 30 day writing challenge? Well, the picture tells the story: Not too bad! I did miss one day, but here’s a secret about 30 day challenges: if you miss a day or two, you can just keep doing the challenge for another day or so at the end. […]

Click to continue reading “30 day challenge wrap-up: writing”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]