Fremdschämen is a German word which means vicarious embarrassment on behalf of others.
For examples, refer to almost anything that Ricky Gervais has made.
Fremdschämen is a German word which means vicarious embarrassment on behalf of others.
For examples, refer to almost anything that Ricky Gervais has made.
Dempster Highway to the Arctic, Vancouver to Inuvik is an interesting photo journal by David Cambon.
I just read a fascinating story about investigating a bad batch of Kingston MicroSD cards. Some of the things I learned:
I’m certainly wouldn’t say that Kingston SD cards are bad, but I will point out that I don’t see any reason to move away from my quite affordable Sandisk, Lexar, and A-DATA cards.
I wanted to change the behavior of the Microsoft IME bar using AutoHotkeys, a utility which can be used to create macros, remap keys, or do any of a variety of other related tasks.
This led me to ime_func.ahk, which appears to be an AutoHotkeys script which uses DllCall to access Imm32.dll, the Input Method Manager library. I believe that this script was intended to manipulate the state of the IME language bar.
As near as I can tell, this AutoHotkeys script targets an older implementation of the IMM library. Some of the methods used are now only listed for Windows Mobile platforms.
I began experimenting with ImmGetContext and ImmGetConversionStatus. ImmGetContext always returned a hIMC value of NULL.
On the Developing IME-Aware Multiple-thread Applications MSDN page, the following is stated (bold highlight added):
The IMM includes thread identification checking that determines if a calling thread is the creator of a specified input method context handle (HIMC type) or window handle (HWND type). If the thread is not the creator of the handle, the called IMM function fails and a subsequent call to GetLastError returns ERROR_INVALID_ACCESS.
Additionally:
A thread should not access the input context created by another thread. A thread should not associate an input context with a window created by another thread, and vice versa.
So, it appears that cross-process IME manipulation is forbidden.
Publishing GPG/PGP keys to public keyservers has one glaring fault: once you commit something, you can never remove it. I made the mistake of adding my email address at an employer’s domain. Now it is permanently tied to my public key and email address.
Assuming that you own a domain, publishing keys in your DNS record gives you complete control over their content. Of course, there is nothing stopping someone from retrieving your public key from your DNS record and uploading it to a public keyserver!
Dan Mahoney wrote an excellent guide on publishing PGP keys in DNS TXT records.
This guide to GoDaddy DNS record configuration made it relatively easy to modify my TXT record.
I was having trouble using the GnuPG plugin for vim under Cygwin. The GnuPG plugin allows seamlessly integrated decryption, editing, and re-encryption of GPG-encrypted content within vim. However, on my Windows 7 box, it just showed gibberish. Attempting to edit my encrypted password file resulted in a rather vague error message:
$ vim Documents/passwords.gpg "Documents/passwords.gpg" [Incomplete last line][converted] 7 lines, 2547 characters Press ENTER or type command to continue
Pressing enter simply resulted in gibberish, likely the raw data of the encrypted file.
The solution was to turn on vim’s filetype plugin processing:
:filetype plugin on
To make this setting persistent, add it to your ~/.vimrc file.
Here is a Windows command shell script I wrote to convert MP3 files to AAC for my Softbank 821SC phone. The script uses FFmpeg, which I downloaded from here.
@echo off REM --------------------------------------------------------------------------- REM Set the following variable to the ffmpeg.exe path on your system. REM --------------------------------------------------------------------------- set FFMPEG_PATH="c:\tools\FFmpeg\ffmpeg.exe" REM make sure the user provided an argument. if NOT "%~1" == "" goto ARGS_OK REM bad arguments, print error and exit. echo. echo Usage examples: echo mp3toaac.bat file_to_convert.mp3 echo mp3toaac.bat *.mp3 echo mp3toaac.bat some_directory\*.mp3 exit /b 1 :ARGS_OK REM use for/in so that we can accept individual files or wildcards. for %%i in ("%~1") do %FFMPEG_PATH% -i "%%~i" "%%~ni.aac" echo. echo Done. exit /b 0
Interesting elements of this batch file:
I have an A-DATA 8GB MicroSDHC card from NewEgg.com. On the back appears:
9A0275
MMAGR08GUDCA-DB
S FLH3E6X3 941
If you search for MMAGR08GUDCA-DB, you’ll find posts listing this same product identification number for Transcend cards.
Corporate profiles list different CEOs (Peter Shu for Transcend, Simon Chen for A-DATA). The product details, however, seem to indicate that they’re the same company, or at least share suppliers.
This is relevant only because A-DATA cards sell for slightly less than Transcend cards ($17.49 vs. $20.99). Additionally, if you don’t need the SD adapter, you can get the bare A-DATA MicroSDHC 8GB card for a few cents less ($16.99).
At sometime around 10:40am on December 11th, 2009, both Coding Horror and the Stack Overflow Blog disappeared when their host, CrystalTech, lost the VM on which they run. Coding Horror was immediately replaced with this:
Coding Horror experienced 100% data loss at our hosting provider, CrystalTech.
I have some backups and I’ll try to get it up and running ASAP!
According to his Tweets, however, Atwood soon discovered that all backups were on the very virtual machine which was lost.
This is all rather ironic, since Jeff himself blogged about how important backups are. The record of this is currently only available via Google Cache. Within the blog post, he did mention the potential of Google Cache as a backup system, so perhaps this is just his admission that second-rate backups are good enough for him:
while Google may be a great service, it’s only a so-so backup mechanism.
This, of course, has the Internet falling over in alternating fits of schadenfreude and irony.
I’ve begun to gather information on rock climbing gyms in Japan and put them into Google Maps. This map is centered on Tokyo, but I’ll add gyms anywhere in Japan as I come across them.
My goal is to provide, for each gym:
View Indoor Climbing Gyms/Walls in Japan in a larger map
The map currently includes the following gyms:
Central Fitness Club Nishidai
3-7-10 Hasune Itabashi-ku, TōkyōFukagawa Sport Center
1-2-18 Etchūjima Kōtō-ku, TōkyōNippin Main Branch
3-11-1 Soto-kanda Chiyoda-ku, TōkyōRondo Fitness Club
1-28, Sakae-chō Higashi-murayama-shiT-Wall Kinshi-chō Branch
2-10-12 Mouri Kōtō-ku, TōkyōT-Wall Edogawabashi Tokyo
2-5-23 Suidō Bunkyō-ku, TōkyōTama Sport Hall
5 Azuma-chō Akishima-shi, TōkyōClimbing Gym Runout
Tokyo Building, 2-10-19 Nishi-koigakubo Kokubunji-shi, TōkyōB-Pump 2 Kanagawa, Yokohama
1-8-2 Hiranuma Nishi Yokohama KanagawaB-Pump Tokyo
1-24-10 Kamiogi Sugunami-Ku TōkyōPump 2 Kawasaki
Tama Ward, Kawasaki City, Kanagawa PrefecturePump Ōsaka
Nishiyodogawa Ward, Ōsaka City, Ōsaka Prefecture7a
NS Building B1, 3-17-11 Sanda-machi Hachioji-shi, TōkyōJ-Wall in Kanagawa
KanagawaCentral Fitness Club Mizunokuchi
2-10-22 Mizonokuchi, Takatsu, Kawasaki, Kanagawa