“It’s The Future” Summary: So I just need to split my simple CRUD app into 12 microservices, each with their own APIs which call each others’ APIs but handle failure resiliently, put them into Docker containers, launch a fleet of 8 machines which are Docker hosts running CoreOS, “orchestrate” them using a small Kubernetes cluster running etcd, figure out the “open questions” of networking and storage, and then I continuously deliver multiple redundant copies of each microservice to my fleet.
Fake Linus Torvalds’ Key Found in the Wild, No More Short-IDs Summary: Now, it is worthto mention this issue again, since fake keys of Linus Torvalds, Greg Kroah-Hartman,and other kernel devs are found in the wild recently. Keywords: fake, keys, attacks, wild, short Full article on lkml.org | 701 Points and 126 Comments Optimism Summary: One predictor of happiness and success is this characteristic Dr. Seligman calls optimism, which he measures by testing whether you explain good or bad events as being personal, general, and permanent, and specifically whether you are asymmetric in your explanations.
Go 1.7 is released Summary: There are several significant changes in this release: a port for Linux on IBM z Systems (s390x), compiler improvements, the addition of the context package, and support for . Keywords: compiler, release, package, standard, library Full article on blog.golang.org | 545 Points and 132 Comments This Is Your Life in Silicon Valley Summary: You are having dinner tonight with the “chief hacking officer” at the company and the “VP of awesomeness.
What Makes a McMansion Bad Architecture? Summary: The principle of similarity refers to how our eyes are easily able to group objects together that share common textures, colors, or features. Keywords: house, principle, masses, mcmansions, mass Full article on mcmansionhell.tumblr.com | 758 Points and 519 Comments An introduction to Japanese Summary: by Michiel “Pomax” Kamermans Keywords: syntax, grammar, language, michiel, pomax Full article on pomax.github.io | 363 Points and 122 Comments
I’m a Judge and I Think Criminal Court Is Horrifying Summary: The low point of the day — literally — came when a young man, obeying the court officer’s order to put his hands behind his back as he stood before the judge, did as he was told, and his pants dropped to his ankles. Keywords: judge, court, case, criminal, order Full article on themarshallproject.org | 440 Points and 210 Comments
Machine Learning and Ketosis Summary: And when we push even further, and cut carbs to really low levels, we may reach a new steady state, called ketosis, in which practically all our energy comes from fat, and that’s when we really win big in the weight-loss battle. Keywords: fat, weight, carbs, body, data Full article on github.com | 706 Points and 294 Comments Machine Learning Exercises in Python, Part 1 Summary: In contrast, we can use variants of gradient descent and other optimization methods to scale to data sets of unlimited size, so for machine learning problems this approach is more practical.
Indie Hackers: Learn how developers are making money Summary: channingallen Keywords: biggest, learnings, channingallen, desktop, app Full article on indiehackers.com | 971 Points and 184 Comments Zero-cost futures in Rust Summary: Update : to provide some extra evidence, we’ve added a comparison of minihttp against a directly-coded state machine version in Rust (see “raw mio” in the link). Keywords: futures, future, rust, library, number Full article on aturon.github.io | 930 Points and 337 Comments
Show HN: Generating fantasy maps – an interactive exploration Summary: This gives a map of water flux, which usually converges into a nice branching river structure, with lots of small streams feeding a larger central channel. Keywords: map, water, points, point, cities Full article on mewo2.com | 1004 Points and 64 Comments Everyone is quitting Summary: I read the online reviews before joining here, but I thought that I can overcome any of these situations and work anywhere for 4 years to maximize my stock payout.
Building fast.com Summary: In all cases, after initial ramp up measurements are excluded, the ‘stop’ detection module monitors how the aggregated network speed is changing and makes a decision about whether the estimate is stable or if more time is needed for the test. Keywords: test, network, speed, connections, internet Full article on techblog.netflix.com | 432 Points and 175 Comments Researchers crack open malware that hid for 5 years Summary: Infected groups include government agencies, scientific research centers, military organizations, telecommunication providers, and financial institutions in Russia, Iran, Rwanda, China, Sweden, Belgium, and possibly in Italian-speaking countries.
Moving 12 years of email from GMail to FastMail Summary: Initially this was workable, until the Nth time that I had to interrupt my real job (which has nothing to do with mail servers) to apply a security patch or get the VPS booting again after a botched kernel upgrade. Keywords: fastmail, email, gmail, emails, mail Full article on cpbotha.net | 649 Points and 365 Comments I Don’t Care How Well You Code, Understand Your Compensation Summary: These intellectuals — much smarter than me — imagine block chain technology for cryptocurrencies and how to cure diseases, but don’t put in the effort to comprehend ownership percentages or what a ratchet means in a down round.
Apple should stop selling four-year-old computers Summary: Microsoft has added to the number of chat bots available for users of Skype, introducing automated AI assistants for vacation price comparison sites Skyscanner and Hipmunk, ticket store Stubhub,… Keywords: apple, mac, pro, macbook, days Full article on theverge.com | 479 Points and 437 Comments Street food chef’s stall becomes world’s first to earn Michelin star Summary: Malaysian-born Chan Hon Meng, who is also the chef at Hong Kong Soya Sauce Chicken Rice and Noodle in Singapore, said he was dumbfounded when he got a call from the famous restaurant reviewers inviting him to an awards ceremony.
Superblocks: how Barcelona is taking city streets back from cars Summary: Imagine confining motorized vehicle traffic to a perimeter around several interior blocks, where space would be opened up to festivals, farmers markets, bikes, families strolling, kids playing in the streets, and you, there, in your favorite chair at the sidewalk cafe, watching it all go down as you sip an espresso. Keywords: cities, city, barcelona, streets, cars Full article on vox.
Hello from Orkut Summary: It’s also why I created the world’s first social network when I was a grad student at Stanford, and it’s why I have dedicated my life to helping people connect with each other. Keywords: world, people, orkut, friends, social Full article on orkut.com | 643 Points and 323 Comments Let’s Encrypt root certificate trusted by Mozilla Summary: click on “Search Bugs” above. Keywords: root, resolved, add, isrg, certificate
How to listen when you disagree Summary: Most protesters at the Republican National Convention in Cleveland were yelling about Donald Trump—for or against—all part of this beautiful circus of free speech. Keywords: story, people, listen, disagree, love Full article on urbanconfessional.org | 483 Points and 181 Comments Some news from LWN Summary: But we suspect that the intricacies of Béziers, brush strokes, and kerning are going to take a lot of time and attention, meaning that we will be needing somebody to help fill his shoes.
What Apple should tell you when you lose your iPhone Summary: In retrospect I’m pretty proud of myself for catching the scam just before I made irreparable damage and gave my password to the same asshole who’s holding my stolen phone. Keywords: phone, email, apple, iphone, address Full article on medium.com | 625 Points and 212 Comments Crystal: Fast as C, Slick as Ruby Summary: CSV, YAML, JSON, HTTP, and even WebSocket are bundled with Crystal itself, making it super simple to start building something.
Massachusetts Bans Employers from Asking Applicants About Previous Pay Summary: “Companies that want to do the right thing are seeing that these new laws really pose no threat,” said Vicki Shabo, vice president of the National Partnership for Women & Families, which tracks the fair pay bills introduced in state legislatures. Keywords: pay, women, law, massachusetts, workers Full article on nytimes.com | 1195 Points and 760 Comments Show HN: Noms – A new decentralized database based on ideas from Git Summary: It seemed like a database that combined the decentralization, versioning, and synchronization of Git with strong typing and the feel of functional programming would make it much easier to store, move, and track all kinds of changing data.
Why we lost Uber as a user Summary: Next : From: Chapman Flack Date: 2016-07-26 21:42:43 Subject : Re: AdvanceXLInsertBuffer vs. WAL segment compressibility Previous : From : Josh Berkus Date : 2016-07-26 20:53:41 Subject : Re: Why we lost Uber as a user Keywords: dot, alfred, gmail, josh, bruce Full article on postgresql.org | 1234 Points and 285 Comments Seymour Papert has died Summary: “With a mind of extraordinary range and creativity, Seymour Papert helped revolutionize at least three fields, from the study of how children make sense of the world, to the development of artificial intelligence, to the rich intersection of technology and learning,” says MIT President L.
Uber to Sell China Business to Rival Didi After Losing Billions Full article on bloomberg.com | 396 Points and 186 Comments Ten Rules for Negotiating a Job Offer Summary: Get everything in writing Always keep the door open Information is power Always be positive Don’t be the decision maker Have alternatives Proclaim reasons for everything Be motivated by more than just money Understand what they value Be winnable Keywords: offer, company, companies, negotiation, offers
Breakthrough solar cell captures CO2 and sunlight, produces burnable fuel Summary: Co-authors with Asadi and Salehi-Khojin are Kibum Kim, Aditya Venkata Addepalli, Pedram Abbasi, Poya Yasaei, Amirhossein Behranginia, Bijandra Kumar and Jeremiah Abiade of UIC’s mechanical and industrial engineering department, who performed the electrochemical experiments and prepared the catalyst under NSF contract CBET-1512647; Robert F. Klie and Patrick Phillips of UIC’s physics department, who performed electron microscopy and spectroscopy experiments; Larry A.
We Should Not Accept Scientific Results That Have Not Been Repeated Summary: The rest of society sees this sphere a bit differently: Scientists are portrayed as selfless individuals who are solely motivated by curiosity and a hunger for knowledge. Keywords: scientists, scientific, science, quality, papers Full article on nautil.us | 910 Points and 275 Comments Israel Proves the Desalination Era Is Here Summary: A decade-long drought had scorched the Fertile Crescent, and Israel’s largest source of freshwater, the Sea of Galilee, had dropped to within inches of the “black line” at which irreversible salt infiltration would flood the lake and ruin it forever.
Docker for Mac and Windows Is Now Generally Available and Ready for Production Summary: We want to give a big thank-you to the tens of thousands of developers and system administrators who helped us find bugs and came up with ideas for tweaks and improvements. Keywords: docker, beta, stable, mac, windows Full article on blog.docker.com | 599 Points and 162 Comments The End of Gmane? Summary: The past few weeks, the Gmane machines (and more importantly, the company I work for, who are graciously hosting the servers) have been the target of a number of distributed denial of service attacks.
LastPass autofill exploit Summary: First, the code parsed the URL to figure out which domain the browser was currently at, then it filled any login forms with the stored credentials. Keywords: lastpass, url, code, bug, bad Full article on labs.detectify.com | 1008 Points and 420 Comments ALS Ice Bucket Challenge Donations Lead to Significant Gene Discovery Summary: John Landers and Catherine Lutz, Jackson Laboratories, to develop novel mouse models to better understand the consequences of the loss of the protein’s function for the ALS disease process.
Show HN: Web Design in 4 minutes Summary: Graphics and icons can be used either as ornaments to support your content, or actively take part in the message you want to convey. Keywords: text, content, page, font, css Full article on jgthms.com | 1624 Points and 152 Comments Why Uber Engineering Switched from Postgres to MySQL Summary: In this article, we’ll explore some of the drawbacks we found with Postgres and explain the decision to build Schemaless and other backend services on top of MySQL.
UK surveillance bill includes powers to limit end-to-end encryption Summary: During the debate, Howe was specifically pressed to specify whether Technical Capability Notices would allow for the government to require companies not to use end-to-end encryption on future services in order to afford state agents access to decrypted communications data if/when served a warrant. Keywords: bill, encryption, howe, government, communications Full article on techcrunch.com | 365 Points and 225 Comments
Don’t add your 2 cents Summary: “ My two cents ” is American slang for adding a small opinion or suggestion to someone else’s thing. Keywords: boss, opinion, cents, change, person Full article on sivers.org | 719 Points and 237 Comments The Raspberry Pi Has Revolutionized Emulation Summary: Viewing angle and speed of refresh are rather critical for arcade machines, and both are largely solved problems for LCDs at this point, which are light, easy to work with, and sip power for $100 or less.
The Uber Engineering Tech Stack, Part I: The Foundation Summary: Alternative protocols to HTTP (like SPDY, HTTP/2, and TChannel) along with interface definition languages like Thrift and Protobuf will help evolve our system in terms of speed and reliability. Keywords: data, uber, services, engineering, tools Full article on eng.uber.com | 386 Points and 180 Comments How we broke PHP, hacked Pornhub and earned $20k Summary: Standard exploitation techniques require so called Property-Oriented-Programming (POP) that involve abusing already existing classes with specifically defined “magic methods” in order to trigger unwanted and malicious code paths.
Create React Apps with No Configuration Summary: Ultimately, the problem is that by choosing React (and inherently JSX), you’ve unwittingly opted into a confusing nest of build tools, boilerplate, linters, & time-sinks to deal with before you ever get to create anything. Keywords: react, build, app, tools, create Full article on facebook.github.io | 777 Points and 241 Comments Wire open-sourced Summary: Encoder and decoder implementations for the Concise Binary Object Representation (CBOR, RFC 7049).
Why I’m Suing the US Government Summary: Section 1201 built an extra barrier around copyrightable works, restricting our prior ability to explore and create. Keywords: section, government, order, filed, digital Full article on bunniestudios.com | 1855 Points and 305 Comments A practical security guide for web developers Summary: 5.1 Token based Authorization 5.2 OAuth & OAuth2 5.3 JWT Data Validation and Sanitation: Never trust user input 6.1 Validating and Sanitizing Inputs 6.
Master Plan, Part Deux Summary: Create stunning solar roofs with seamlessly integrated battery storage Expand the electric vehicle product line to address all major segments Develop a self-driving capability that is 10X safer than manual via massive fleet learning Enable your car to make money for you when you aren’t using it Keywords: tesla, car, plan, future, autopilot Full article on tesla.com | 1851 Points and 677 Comments Stack Overflow Outage Postmortem Summary: The malformed post contained roughly 20,000 consecutive characters of whitespace on a comment line that started with – play happy sound for player to enjoy .
When a crow dies, the other crows investigate the cause of death (2015) Summary: Calling to each other, gathering around, and paying special attention toa fallen comrade is common among the highly intelligent corvids, a group of birds that includes crows, jays, magpies, and ravens , says Kaeli Swift , a Ph.D student in environmental science at the University of Washington. Keywords: crows, birds, people, dead, swift Full article on news.
Serverless Architectures Summary: These previous two points imply a very important third - some logic that was in the Pet Store server is now within the client, e.g. keeping track of a user session, understanding the UX structure of the application (e.g. page navigation), reading from a database and translating that into a usable view, etc. Keywords: faas, serverless, application, functions, aws Full article on martinfowler.com | 477 Points and 202 Comments
Donkey – A computer game included with early versions of PC DOS Summary: 940REM The IBM Personal Computer Donkey950REM Version 1.10 ©Copyright IBM Corp 1981, 1982960REM Licensed Material - Program Property of IBM975DEFSEG:POKE106,0980SAMPLES$=“NO”990GOTO10101000SAMPLES$=“YES”1010KEYOFF:SCREEN0,1:COLOR15,0,0:WIDTH40:CLS:LOCATE5,19:PRINT”IBM”1020LOCATE7,12,0:PRINT”Personal Computer”1030COLOR10,0:LOCATE10,9,0:PRINTCHR$(213)+STRING$(21,205)+CHR$(184)1040LOCATE11,9,0:PRINTCHR$(179)+” DONKEY “+CHR$(179)1050LOCATE12,9,0:PRINTCHR$(179)+STRING$(21,32)+CHR$(179)1060LOCATE13,9,0:PRINTCHR$(179)+” Version 1.1O “+CHR$(179)1070LOCATE14,9,0:PRINTCHR$(212)+STRING$(21,205)+CHR$(190)1080COLOR15,0:LOCATE17,4,0:PRINT”© Copyright IBM Corp 1981, 1982”1090COLOR14,0:LOCATE23,7,0:PRINT”Press space bar to continue”1100IFINKEY$<>““THENGOTO11001110CMD$=INKEY$1120IFCMD$=”“THENGOTO11101130IFCMD$=CHR$(27)THENGOTO12981140IFCMD$=” “THENGOTO11601150GOTO11101160DEFSEG=01170IF(PEEK(&H410)AND&H30)<>&H30THENDEFSEG:GOTO12911180WIDTH80:CLS:LOCATE3,11190PRINT”HOLD IT! Keywords: print, printchr, cy, put, ibm Full article on github.com | 468 Points and 173 Comments SoftBank Group Nears Deal to Buy ARM Holdings Summary: Last month, SoftBank agreed to sell its majority stake in Supercell , the developer of “Clash of Clans” and other mobile games, to Tencent Holdings for about $8.
How I Could Steal Money from Instagram, Google and Microsoft Summary: However, an attacker could easily manage and maintain around 100 premium numbers and Google accounts linked to them, multiplying the magnitude of the impact with a factor 100 to 1.200 EUR/day = 36.000 EUR/month = 432.000 EUR/year. Keywords: number, premium, google, microsoft, call Full article on arneswinnen.net | 384 Points and 65 Comments Destroy All Ifs – A Perspective from Functional Programming Summary: Now granted, IO in Haskell is not a strong example of an abstraction that has superior reasoning properties, but the fundamental principle is sound: in pure functional programming languages, the control is inverted to the caller.
HyperTerm – JS/HTML/CSS Terminal Full article on hyperterm.org | 630 Points and 255 Comments Google deletes artist’s blog, a decade of his work Summary: Cooper used the blog to post his fiction, research, and visual art, and as Artforum explains , it was also “a platform through which he engaged almost daily with a community of followers and fellow artists.” Keywords: blog, cooper, google, page, email Full article on fusion.
Lepton image compression: saving 22% losslessly from images at 15MB/s Summary: Instead of writing bits as zeros and ones, Lepton encodes the data using the VP8 arithmetic coder , which can be very efficient, if supplied with carefully chosen context information from previous sections of the image. Keywords: lepton, dc, coefficients, block, file Full article on blogs.dropbox.com | 582 Points and 190 Comments Nintendo re-releases NES as mini console Summary: The Retron 5 and Retro Freak are perhaps the two most notable examples, but it would seem that Nintendo itself has finally woken up to the potential of reselling its classic systems in new guises.
The Fight for the “Right to Repair” Summary: But John Deere still owns the software that runs the tractor , and trying to fix it without going to an authorized repair center could put the farmer afoul of copyright laws. Keywords: repair, electronics, problem, companies, manufacturers Full article on smithsonianmag.com | 704 Points and 318 Comments A Single Div Summary: Tweet Keywords: single, div, tweet Full article on a.singlediv.com | 535 Points and 106 Comments
Shipping Rust code in Firefox Summary: Ralph Giles and Matthew Gregan implemented the component, and Nathan Froyd, Nick Nethercote, Ted Mielczarek, Gregory Szorc, and Alex Crichton have been instrumental in integrating Rust into the Firefox build and tooling system and ensuring it can ship on all of our platforms. Keywords: rust, mozilla, firefox, code, media Full article on hacks.mozilla.org | 748 Points and 189 Comments Marp: Markdown Presentation Writer Summary: Marp also supports $width and $height directives to set a custom size.
Sega Saturn CD Cracked after 20 Years Full article on youtube.com | 1126 Points and 223 Comments Pokemon Go is a huge security risk Summary: This “Full account access” privilege should only be granted to applications you fully trust, and which are installed on your personal computer, phone, or tablet. Keywords: account, access, google, niantic, pokemon Full article on adamreeve.tumblr.com | 780 Points and 251 Comments Announcing TypeScript 2.0 Beta Summary: Notice that after the assignment within the if block, TypeScript understood that it had to be dealing with an array of string s.
Writing an editor in less than 1000 lines of code, just for fun Summary: blog comments powered by Keywords: writing, editor, lines, code, fun Full article on antirez.com | 535 Points and 139 Comments How we’re scammed into eating phony food Summary: The luxurious Japanese meat can be found at only three restaurants in the country, including 212 Steakhouse in Midtown.Shutterstock“Once someone tries a real extra-virgin — an adult or child, anybody with taste buds — they’ll never go back to the fake kind,” artisanal farmer Grazia DeCarlo has said.
Coursera courses preserved by Archive Team Summary: Archive Team: The Coursera Curse Keywords: archive, team, coursera, curse, web Full article on archive.org | 513 Points and 75 Comments Has Physics Gotten Something Really Important Really Wrong? Summary: Two of the workshop organizers, physicist Lee Smolin and philosopher Roberto Unger, published a book last year called “ The Singular Universe and The Reality of Time “. Keywords: physics, unger, universe, time, science
Facebook Messenger begins testing end-to-end encryption using Signal Protocol Summary: To amplify the impact and scope of private communication, we also collaborate with other popular messaging apps like WhatsApp , Google Allo , and now Facebook Messenger to help integrate Signal Protocol into those products. Keywords: signal, protocol, end, messenger, encryption Full article on whispersystems.org | 633 Points and 116 Comments Corrode: C to Rust translator written in Haskell Summary: Generating large numbers of random C programs using csmith and then proving the translation results equivalent for each one should give pretty good confidence in the implementation.
Apollo 11 Guidance Computer source code Summary: As such, PRs are welcome for any issues identified between the transcriptions in this repository and the original source scans for Luminary 099 and Comanche 055 , as well as any files I may have missed. Keywords: nov, readme, contributing, korean, original Full article on github.com | 652 Points and 145 Comments Writing a video chat application from the ground up, part 1 Summary: We found basic run of the mill compressors to be a bust, but we did build the infrastructure to have compressed macroblocks, which is a vital step forward.
See the things you’ve searched for, visited, and watched on Google services Summary: Data helps make Google services more useful for you. Keywords: ve, activity, data, helps, make Full article on myactivity.google.com | 559 Points and 276 Comments Rudolf Kálmán Has Died Summary: Amid reports of slow and often floundering Brexit negotiations, Lindsay expressed confidence in Britain’s prospects following its departure from the bloc, while also discussing the role of the Visegrád 4 in European politics as a whole.
Mental Models I Find Repeatedly Useful Summary: Mitigating (1) Unintended Consequences — “Outcomes that are not the ones foreseen and intended by a purposeful action.” (related: collateral damage — “Deaths, injuries, or other damage inflicted on an unintended target.”, Goodhart’s law — “When a measure becomes a target, it ceases to be a good measure”; Campbell’s law ; Streisand Effect — “The phenomenon whereby an attempt to hide, remove, or censor a piece of information has the unintended consequence of publicizing the information more widely, usually facilitated by the Internet”; cobra effect — “when an attempted solution to a problem actually makes the problem worse.
Bulgaria Passes a Law Requiring Open Source Summary: 50 of 2016, effective 01.07.2016) Upon preparation of technical and functional assignments for public procurement to develop, upgrade or implementation of information systems and e-services, administrative authorities must include the following requirements:1. when the subject of the contract includes the development of computer programs:a) computer programs must meet the criteria for open source software;b) all copyright and related rights on the relevant computer programs, their source code, the design of interfaces and databases which are subject to the order should arise for the principal in full, without limitations in the use, modification and distribution;c) development should be done in the repository maintained by the Agency in accordance with Art.
Brian Eno: We’ve been living happily with AI for thousands of years Summary: All that human intelligence remains alive in the form of the supercomputer of tools, theories, technologies, crafts, sciences, disciplines, customs, rituals, rules-of-thumb, arts, systems of belief, superstitions, work-arounds, and observations that we call Global Civilisation. Keywords: wo, understand, intelligence, make, works Full article on edge.org | 363 Points and 175 Comments Ruma, a Matrix homeserver written in Rust Summary: Its novel approach to memory safety and its rich type system make it an excellent choice for writing fast, secure, and reliable programs.
PostgreSQL Exercises Summary: The exercises on this site range from simple select and where clauses, through joins and case statements, and on to aggregations, window functions, and recursive queries. Keywords: exercises, site, people, learn, simple Full article on pgexercises.com | 576 Points and 70 Comments How I Cracked a Keylogger and Ended Up in Someone’s Inbox Summary: The stolen information including the desktop screenshot are sent to either to the attacker’s email address or FTP server depending on how the keylogger was configured.
Home Computers Connected to the Internet Aren’t Private, Court Rules Summary: The June 23 ruling came in one of the many cases resulting from the FBI’s infiltration of PlayPen , a hidden service on the Tor network that acted as a hub for child exploitation, and the subsequent prosecution of hundreds of individuals. Keywords: privacy, judge, computer, expectation, warrant Full article on eweek.com | 636 Points and 334 Comments
Rails 5.0: Action Cable, API mode, and more Summary: What’s really lovely about Action Cable is that you get access to your entire Active Record and PORO domain model in your WebSockets work. Keywords: rails, action, cable, api, features Full article on weblog.rubyonrails.org | 664 Points and 219 Comments Servo Nightly Builds Available Summary: Servo is a community project hosted on GitHub , and we have a curated list of good first bugs for you, whether you’re interested in writing Rust, JS, Python, or even shell scripts.
The Daredevil Camera Summary: These days a powerful enough computer to render for this thing would be about the size of one of the cells, and would come with a bonus of being able to run a plain vanilla webcam for keeping track of what is recorded in the mysterious sound blobs. Keywords: sound, time, fpga, microphones, cells Full article on ribbonfarm.com | 1302 Points and 153 Comments Investing Returns on the S&P500 Summary: A typical investor will not have the capital to employ a single lump sum as a basis for a long-term investment, and will instead rely on dollar cost averaging , where cash is deposited across multiple years (which helps to smooth out the curve as well).