Category: Design | c: | m:

Y'know things that are all the rage? Blogs. Everyone has one; or at least had one before Facebook, Twitter et al diluted the realtime pool.

Since I'm nu-old skool — and watching endless streams of people validate their own self-importance makes me long for a 'Shut up' button — I figured why not make a blog? The main difference here compared with other people's blogs is that instead of being limited to one topic, you get a little slice of everything all mashed up. I can now omit vowels and apostrophes with impunity.

  • The curse of the intermittent fault

    · 1480 words (munches about 7 mins)

    When your boiler’s broke. And your water’s cold. Who you gonna call? Ghostbusters? A heating engineer? Or someone with a soldering iron and dogged determination?

  • Down with negative logic in programming

    · 699 words (vacuums up about 4 mins)

    I’m on the warpath against any programmers that employ negative logic in their code. Desist from never supplying positive assertions. Right now.

  • Sorting out the Windows trash

    · 759 words (laps up about 4 mins)

    Why is the Windows trash can called a Recycle Bin? You don’t take the contents, melt it down and make something else out of it.

  • Learning the drill

    · 1077 words (laps up about 5 mins)

    I admit I suck at DIY. But it’s not through lack of trying, it’s lack of training. And sometimes a serious lack of common sense.

  • The smoking PC: lessons in dust and fans

    · 839 words (eats up about 4 mins)

    In twenty years of building and maintaining computer systems I’ve never seen this level of damage due to heat. The devil is in the dust, it seems.

  • Yahoo email now with sponsored spam

    [10 comments] · 402 words (devours about 2 mins)

    People logging into Yahoo’s email accounts (like rocketmail) may have noticed a rather nasty-looking advert directly in their inbox. Oh dear, Yahoo, oh dear.

  • Mobile devices make it easy to hack passwords

    [2 comments] · 917 words (laps up about 5 mins)

    If you use your mobile phone or tablet for any kind of Internet application that requires authentication — Facebook, Twitter or online banking, for example — you’re setting yourself up to get hacked.

  • Don't cross the blades

    [2 comments] · 204 words (wastes less than a minute)

    Marketing material should always be taken with a mountain of salt, but sometimes it would pay manufacturers to be slightly less terse, or at least consider the reader.