Wednesday, 24. January 12018
p3k dots

The Power of Serverless for Front-End-Developers.

True freedom of speech or simply monetization of social interaction? (Or both?)

AKASHA, the social network dApp.

With AKASHA your thoughts and ideas will echo throughout humanity's existence, thanks to a new kind of planetary-scale information network immune to censorship by design.

Boss key 2018.

genact – a nonsense activity generator (via github.com).

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills. Just open a few instances of genact and watch the show. genact has multiple scenes that pretend to be doing something exciting or useful when in reality nothing is happening at all.

How a Library Handles a Rare and Deadly Book of Wallpaper Samples.

(…) “those wanting to look at the book had to wear special gloves. There were restrictions on how long you could have it out, and you had to be very careful—don’t lick your fingers and turn the page.”

Blubbergarten vermittelt Grundlagen und Praxis wilder Fermentation.

When life gives you demons…

A new information engine is pushing the boundaries of thermodynamics.

A "Maxwell's demon" device achieved almost perfect efficiency, supporting the possibility of a lossless engine.

🖤

Burschenschaft Hysteria marschierte durch Wien.

Mit Parolen wie "Auf zum goldenen Matriarchat!" zogen die 700 Teilnehmerinnen zum Heldenplatz.

Relevant: Gendergerechte Sprache international. (The comment section alone justifies the mere existence of Hysteria.)

Ludbreg's ‘Center of the World’.

Colorful concentric circles honor a small Croatian town's supposed spot at the nucleus of it all.

Free Your Data is an initiative and a movement to enlighten, inform and challenge you with the truth behind what happens to your data. Together we will make our voices heard, initiate change and create a lasting impact on the way our data is treated.

Monday, 22. January 12018
p3k dots

Secrecy Is Dead. Here's What Happens Next.

Texts and emails leave a trail, making it easier to document incidents and interactions. Secrets used to be the purview of people. Now they are owned by the platforms and databases into which we deposit them—and those have proven easy to penetrate.