I’m glad to see that WCAG 2.1 is being adopted so quickly. It was released on June 5, 2018, WCAG 2.0 took a while to be adopted as the standard. 2.1 does a lot to address the needs of not only people with disabilities, but also people who are older, (sorry screen reader users, it’s not just about us and it never has been), and I’m pleased to see that we didn’t have to wait two years to see it adopted. I’m also glad the National Federation of the Blind resorted to structured negotiation and not a lawsuit, and would like to see more campaigning in the organization’s ranks for this approach.
DigitalOcean, along with GitHub and new partner Twilio, are sponsoring the 5th annual Hacktoberfest. The event was created to encourage participants to make meaningful contributions to open source …
I’m wondering if @DictationBridge has any issues that need pull requests. I’m also wondering if pull requests on docs count. I should check the rules because a limited edition Hacktoberfest t-shirt would be nice to add to the collection.
A senior U.S. intelligence official saw early warning signs that something was wrong as they went to meet with the village elder in Tongo Tongo, Niger, on Oct. 4.
Are you looking for something to work on for 3.6, but don’t know where to start? Here a breakdown of a few open UIUI UI is an acronym for User Interface – the layout of the page the user interacts with. Think ‘how are they doing that’ and less about what they are doing. & […]
The Rolling Stone profile of Stanley McChrystal that changed history
A patent application filed by IBM engineers reveals the company's developing technology that will allow governments to shut down the engines of private automobiles via traffic signals. It's like Skynet... only much worse.
This paper examines mechanical lock security from the perspective of computer science and cryptology. We focus on new and practical attacks for amplifying rights in mechanical pin tumbler locks. Given access to a single master-keyed lock and its associated key, a procedure is given that allows discovery and creation of a working master key for the system. No special skill or equipment, beyond a small number of blank keys and a metal file, is required, and the attacker need engage in no suspicious behavior at the lock’s location. Countermeasures are also described that may provide limited protection under certain circumstances. We conclude with directions for research in this area and the suggestion that mechanical locks are worthy objects for study and scrutiny.
The Revocation of Indpendence as executed by Alan Baxter & Peter Rieden, 8th Nov 2000, apparently inspired by an email sent by Dan Fox (who claims to be the "ultimate originator") or Kevin O'Connor (who also claims to be the "ultimate originator"). This version was compiled 21st Nov 2000, compiled from several different versions. Early drafts, showing how it grew, are further down. Responses and related pieces are also included further down. Important note: The "Revocation of Independence" is NOT by John Cleese. During 2005, a version was wrongly attributed to him and was circulated crediting Cleese as the author. He did not write it. It was present on Usenet and the Internet long before his name became associated with it.