I just finished upgrading all my websites so they use HTTPS, and automatically redirect people to the https:// URL. So now when you come visit Todd Bradley’s Galaxy, your browsing experience will be more secure. Here are my sites that have been securified:
And I learned that my personal laptop is part of the recall! I wonder if they were going to proactively contact me, since Apple know that computer belongs to me and where to find me. Regardless, I contacted them and am now taking it in to the Apple Store next Tuesday for warranty service to have the battery replaced.
It is supposed to take 1 to 2 weeks, but I guess that’s better than having the battery explode while I’m using it.
I just finished listening to the audiobook version of “The Odyssey” and there are so many cool names in it. Some of them, I’ve heard before and some I haven’t. And I thought it would be fun to use some of these names in role playing games. But how can I get a list of them?
I did some googling a while back for things like “list of names from the odyssey” but all it turned up were pages that listed some of the main characters. I wanted all the names. So, I wrote a script. Or rather, I chained several Unix commands together on my Mac to print out what I wanted.
Here is the command:
http -p b GET http://classics.mit.edu/Homer/odyssey.mb.txt | grep -o -E '\w+' | grep -w '[^ ]*[A-Z][a-z]\+' | sort | uniq | aspell list
If you’re not familiar with Unix/Linux/MacOS command line, this:
downloads the text of the book from MIT (since it’s in the public domain, you can find text versions all over the internet)
prints out all the individual words
removes words that don’t start with a capital letter
sorts them and removes duplicates
runs the result through a spell checking program to print out only words that appear to be misspelled – words that don’t appear in the dictionary
And here is the resulting list of 379 proper nouns from “The Odyssey”, alphabetized for your enjoyment.
Someone has made 12 fraudulent charges on one of my Visa credit cards since May 31, including buying 6 airline tickets on Allegiant Air, renting U-Haul trucks several times, and staying in a couple hotels.
Now, of course, the bank has canceled my card and are sending me a new one that’ll arrive Monday or so. What a hassle.
CDOT, the Colorado Department of Transportation, was the victim of a cyberattack that cost millions of dollars last year. They refused to pay the ransom requested, and instead had their technical people working “20 hour shifts” to try to dig them out of the mess, which apparently took about a month.
First off, anyone who’s managed knowledge workers knows working 20 hours straight is stupid. After somewhere between 8 and 15 hours, computer programmers start to make enough mistakes that it takes more time to fix those mistakes than is gained by working extra hours. Like the Pony Express knew, you gotta rest your programmers to keep your overall speed up.
Second, Kevin Klein, Colorado’s director of homeland security and emergency management, said at a recent conference, “We switched from Doritos and Mountain Dew to actual food.” As far as I can tell, he’s serious that the CDOT employees who were working 20 hour days, were living on junk food. That’s another management mistake that shows why I’d never work for the government. The Pony Express also knew that you’ve gotta keep your ponies nourished. Software engineers are the same way. Yeah, you can live for a few days on junk food. But if you know you need lots of work from your employees over the long haul, feed them well. The best software managers I’ve worked for know this and have been quick to bring in food when the team’s in “crunch mode”.
You can read more in this article:
Note that Governor Hickenlooper eventually declared a state of emergency due to this cyberattack, which enabled them to get help from other government agencies. That allowed the CDOT engineers to stop working 20 hour days and start eating real food again.