This counterintuitive advice is one of a dozen-plus productivity practices preached by Scott Hanselman, a program manager at Microsoft, author and avid blogger and speaker. Hanselman’s not the person you’d to expect to hear encourage dropping the ball and discourage burning the midnight oil.
via Pocket http://ift.tt/1pwzfwX
MOUNTAIN VIEW, Calif. — LAST June, in an interview with Adam Bryant of The Times, Laszlo Bock, the senior vice president of people operations for Google — i.e., the guy in charge of hiring for one of the world’s most successful companies — noted that Google had determined that “G.P.A.
via Pocket http://ift.tt/1frfjdl
In this last chapter we will look at the security aspects of HTTP, including how to identify users, how HTTP authentication works, and why some scenarios require HTTPS (secure HTTP). Along the way, we are also going to learn a bit about how to manage state with HTTP.
via Pocket http://ift.tt/1bFS0b9
Today at the Chaos Computer Congress (30C3), xobs and I disclosed a finding that some SD cards contain vulnerabilities that allow arbitrary code execution — on the memory card itself.
via Pocket http://ift.tt/19vp3O7
Our mind is not a camera. Seeing is not a passive act. We see what we expect to see, or, as Anaïs Nin put it so beautifully: “We don’t see things as they are, we see them as we are.”
via Pocket http://ift.tt/14NJf09
Yes, these two iconoclasts have disrupted multiple industries, but TED curator Chris Anderson goes much deeper and argues that what Musk and Jobs really have in common is a rare form of design thinking powered by unfettered conviction.
via Pocket http://ift.tt/1eloABU