Monthly Archives: March 2016

Dotfile Management

Haoyang Xu has a really nice idea for managing your dotfiles. The idea is a generalization of using Org mode to configure Emacs, a strategy that many people have written about (here's a pointer to a video about it). Using … Continue reading

Posted in General | Tagged , | Leave a comment

The FBI Begs Off

This is what you do when you think you're going to lose and set the wrong precedent.

Posted in General | Tagged , | Leave a comment

Ensime Hacks

Over at Ensime they have a page dedicated to Emacs Hacks. Although it's written from the point of view of a Scala developer, the hacks are useful for any Emacs user. There three sections, one each for General hacks Scala … Continue reading

Posted in General | Tagged | Leave a comment

Matt Blaze on Adtech

Countless pixels have died in the battle over adtech. I've long held the view that I'm happy to view the ads but I object strongly to being tracked and having arbitrary scripts run on my machine. Some time ago, I … Continue reading

Posted in General | Tagged , | Leave a comment

Literate Programming With Org Babel

Howard Abrams recently gave a talk at the PDX Emacs Hangout in Portland. So far, there is no video of the talk but Abrams did write up his notes1. The talk was intended to be a workshop so you should … Continue reading

Posted in General | Tagged , | Leave a comment

Magit Video on Rebasing

Charl Botha has posted an excellent video on advanced rebasing with Magit. It serves as a great followup to Howard Abrams' Magit tutorial video. Abrams covered rebasing too but Botha shows how to perform more complicated tasks. First he shows … Continue reading

Posted in General | Tagged , | Leave a comment

Org Mode and Software Engineering

Rohan Kshirsagar has a nice post on integrating Emacs Org Mode into the software engineering process. That's a big subject area, of course, but Kshirsagar focuses on using Org to take notes as things occur to you and perhaps turn … Continue reading

Posted in General | Tagged , | Leave a comment

What Happens When You Give Law Enforcement a Backdoor Key?

This: The hackers who accessed celeb iCloud accounts in 2014 used a forensic tool designed for cops to download the data. https://t.co/grEzwuSaGJ — Christopher Soghoian (@csoghoian) March 13, 2016

Posted in General | Tagged , | Leave a comment

John Oliver on Encryption

The other day I saw a hilarious John Oliver video on encryption. He explains, as only Oliver can, why despite outward appearances the encryption question is not simple and one's immediate reaction of “Of course Apple should help the government … Continue reading

Posted in General | Tagged , | Leave a comment

A One-liner Fuzzy Isearch

If you're looking for a quick and easy fuzzy isearch, here's a way to get it with a single line of Elisp. Also check the comments for some riffs on the same idea.

Posted in General | Tagged | Leave a comment