I’d like to mention two books that stood out for me in 2014: Nonfiction: The First 20 Minutes. Gretchen Reynolds is a New York Times columnist who distills health and exercise research down to practical, readable advice. I’ve never dog-eared as many pages in a book as The First 20 Minutes. Reynolds writes about why […]

Click to continue reading “My two favorite books of 2014″



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

A few months ago I saw a cool mosaic effect in a Wired ad for CA Technologies. Here’s what part of the ad looked like: I liked the ad, so I wondered how they did it. Can you see out how to create a similar effect? Take a minute to figure it out as an […]

Click to continue reading “Fun mosaic effect with Go”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=67291ab8595dd734da0e2ae8013ff9ed5427b39bb53bcfc0168aff19e12ae7b2be2cf60ae60dbb97244295eb90a18d9c2362292e90db2e13b804e27f45a8a0a5110366910babee48900fb1bf8e30198b030694da94df1a8e291b70453ea18da990ec5d81d3812bca121ebb6ce8b9c39333e75eec44ccf1af0582803a4c0042de5c1905de5645cc64d97782895c840a5bf61c914f97535445fecc3f14472ee1970ab625ffefda9ef2846f2d3f0d3e0dc44021c03f0f3ea19f1accf0270fcec456bb5698e924e737b7f052f267f0a9ca9756be3d82c9643ebb7e19b580f3b2481631acf66b0e9dfc20d0e3a93bb0c66f277ed41c50f17db1d6331f732cc6f409601a942fe362ac88cddd836715226a9c130f52f0355b3c62573b8a71c93afa926413fb12d0f627fdc8f42ad367a7179ee9f737e2b28ac76edaafd94fcf0bbc0f0afc71c17dff95c236dc44bd7a18b9b2cd6b0b63650dc0df9058e50237cf362a256364da90042033555d1d40a772b91dc22b40cd99aa83b66c637403649a9f33b2015eecd9249fa319c005d47bb33275b8263121c52188ad20926894240c2fddc41369c7c7dceeac91df420118f1d85b012a095e4e47f4392441dbf6fbc590b926ca1625e374c5cd585bc885ac973b83d0657d0c6007edc62507edc7fd[[T_F]]

If you’ve read Scott Adams’ financial advice and my financial tips in case you win a startup lottery, then you might be interested in a few more pointers to good resources. Some web pages and books: – Don’t Play the Losers’ Game, by Henry Blodget. This is a short, accessible piece that explains why picking […]

Click to continue reading “An investment reading list”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

I’ve been spending more time surfing the web on my laptop than I’d like to. I’ve also noticed more emails that lure me into short tasks, but eventually eat up a large chunk of my day. I’d prefer to be spending more time working on projects, reading, and unplugging. So my new 30 day challenge […]

Click to continue reading “New 30 day challenge: “hermit mode””



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

So how did I do on my 30 day writing challenge? Well, the picture tells the story: Not too bad! I did miss one day, but here’s a secret about 30 day challenges: if you miss a day or two, you can just keep doing the challenge for another day or so at the end. […]

Click to continue reading “30 day challenge wrap-up: writing”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]