Dolly Zoom Tutorial for Timelapse Hyperlapse

This photography technique produces awesome results, maybe some of my photographer friends would like to try it?  What really impresses me about this, is that this is an art form that could only come into widespread use today, when video screens are ubiquitous and digital images are extremely cheap to make. Truly, a 21st century art.

D: A native-compiled programming language that has every conceivable feature

Didi programmingThe release of Google’s ‘Go’ language seems to have shaken the world of computer languages in general and native-compiled languages in particular. That world was exclusively dominated by C and C++, but now we’re seeing more and more new languages appear and gain programmer mind-share.

In recent years, it seems the progress of programming languages was happening mainly in the realms of interpreted languages and byte-code-compiled languages. Native-compiled languages looking to attract developers accustomed to the convenience of those languages must provide similarly convenient features. The D language is no exception for this rule, hence it provides the following features:

  • Type inference – So programmers don’t need to manually specify the type of each variable.
  • Automatic memory and resource management. D includes a garbage collector as well as a ‘scope’ statement that allows setting up code to always run when exiting the current scope (Looks and feels similar to the ‘trap’ statement of shell languages).
  • Built-in high-level data structures such as hashes and dynamic arrays.

Continue reading

Cory Doctorow lecture about freedom, surveillance and technology

Angry cat with a network cable criticizing the NSAI just listened to a Cory Doctorow lecture he gave at the Central European University in Budapest.

The lecture recounts the same themes and ideas he talked about in numerous other lectures and wrote about in his book “Information Doesn’t Want to Be Free“. The difference about this lecture is that it was targeted at a somewhat less-technically oriented audience, and therefore includes basic high-level explanations as to why there are no such things as “golden keys” to cryptography.

I recommend sharing this with less technically inclined friends and family who care about freedom, surveillance and related policy.

Also, this cat.

The internet of pwned things

Toaster.“The internet of things” gets all the press now days. If to believe the excited journalists, this is the harbinger of utopia, no less. Even Canonical is looking for some action in this space.

Canonical`s efforts are respectable. But it won`t help. Judging from past experience, it is very likely that we will have an internet of things that will be running obsolete, un-patched, non-repairable, DRM-laden software. It is the natural tendency of vendors that sell things, to prefer selling shiny new things to maintaining old ones. Just take a look at the mobile phone world.

Those buggy things will no doubt be used government agencies, hackers, and marketing companies to erode what little privacy we have left. Will we even be able to take things offline?

The EFF are making a preemptive effort to make things better in this area. I hope they succeed, but I have little faith they will.

My pet peeve with YAML

YAMLYAML is a popular data encoding language. Its data model is similar to JSON‘s data model where data is described in terms of strings, numbers, arrays and hash-maps. In fact, YAML is a super-set of JSON that includes indention-based syntax to make it easier for humans to read and write it.

YAML is very popular. Libraries for reading and writing it had been written for most, if not all, programming languages. It is used as the basis for the configuration DSL of many tools including Ansible, Puppet’s Hiera, and Jenkins Job Builder.

The use YAML as the basis for DSLs in which complex and extensive configuration is written by hand, eventually exposes one to the language’s shortcomings.

Continue reading