article thumbnail

Radio Shack Catalog Archive (1939-2011)

Hacker News

Archive of 1939-2011 Radio Shack Catalogs of electronics, computers and technology. Flip-through every page of these Radio Shack catalogs that included stereos, speakers, CB radios, tube radios, computers, communication equipment, electronic test equipment & gadgets. pdf catalogs catalogues

107
107
article thumbnail

Apple Execs on Facebook (2011)

Hacker News

On Jul 11, 2011, at 8:03 PM, Steve Jobs wrote: I agree - if we eliminate Fecebooks third proposal it sounds reasonable.

128
128
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Understanding Understanding Media (2011)

Hacker News

David Bobbitt, Wesleyan College Enculturation: [link] (Published: December 30, 2011) “After three thousand years of explosion, by means of fragmentary and mechanical technologies, the Western world is imploding” (McLuhan 3).1 1 With these words on the first page of Understanding Media published in 1964, Marshall McLuhan burst onto the

95
article thumbnail

Nobody Cares (2011)

Hacker News

All the mental energy you waste complaining would be far better used trying to find the one, seemingly impossible way out of your current mess.

181
181
article thumbnail

Servicing a iRobot Roomba from 2011

Hacker News

This week it was time for some maintenance on my iRobot Roomba robot vacuum cleaner. Read along to learn how I did it.

123
123
article thumbnail

The First Law of Complexodynamics (2011)

Hacker News

A few weeks ago, I had the pleasure of attending FQXi's Setting Time Aright conference, part of which took place on a cruise from Bergen, Norway to Copenhagen, Denmark. Why aren't theoretical computer science conferences ever held on cruises? If nothing else, it certainly cuts down on attendees sneaking away from the conference venue.)

article thumbnail

The Cryptographic Doom Principle (2011)

Hacker News

When it comes to designing secure protocols, I have a principle that goes like this: if you have to perform any cryptographic operation before verifying the MAC on a message you’ve received, it will somehow inevitably lead to doom.

107
107