This Video Shows Hand Exercises for Gamers and Heavy Computer Users

If you spend long hours attached to your keyboard and mouse—whether for gaming or work—try these stretching exercises. They’ll not only make your hands and wrists feel better, you might get faster and more efficient when gaming.

Dr. Levi Harrison offers several tips and simple exercises in the video above, including whole hand exercises and special thumb exercises.

(By the way, if you’re concerned about repetitive stress injury or carpal tunnel syndrome, there are other exercises you can do.)

Hand + Wrist Exercises for Gamers | YouTube


via Lifehacker
This Video Shows Hand Exercises for Gamers and Heavy Computer Users

Enable TRIM for Third-Party SSDs in OS X with a Terminal Command

Enable TRIM for Third-Party SSDs in OS X with a Terminal Command

For whatever reason, Apple hasn’t allowed you to enable TRIM (one of the best ways to maximize the life of your solid state drive) on third-part SSD drives. Now, you finally can, no third-party app required.

Apple pushed out a minor update to OS X today that fixed some bugs and also adds the ability to enable TRIM. Once you update, all you need to do to enable TRIM is open up Terminal (Applications > Utilities) and type in this command:

sudo trimforce enable

You’ll get some warnings, so make sure your SSD is capable of using TRIM before you run it. Otherwise, you can just go through and say yes to the options.

Latest OS X update allows you to enable TRIM for third-party SSDs | Ars Technica


via Lifehacker
Enable TRIM for Third-Party SSDs in OS X with a Terminal Command

How to hide the Apple Music subscription service & get back Playlists parent menu in iOS 8.4


Though heavily hyped, Apple Music subscriptions may not be for everyone. Those who want to remove the streaming service from their iOS 8.4 Music app, and gain back easy access to custom playlists in the process, can easily do so –?here’s how.
via AppleInsider – Frontpage News
How to hide the Apple Music subscription service & get back Playlists parent menu in iOS 8.4

Warning: The language is spicy in this one

So this story goes back to the start of my career in web design, before I knew the difference between a good client and a bad client.

So it all started with getting a new job. The company itself was well reviewed, they worked with some pretty major clientele and everything seemed good. The main boss had an interesting past in web design, starting in the porn industry and moving later into mainstream design.

His first task was asking me to create a new web design for their site, so off to work I went designing what I thought at the time was a good design.

The later that day, I send him the design and he replied shortly after.

Client: Hmm… I don’t fucking like this at all. tell you what, look at site X. I like X, use it for inspiration.

So later that day I got to work, building a new site using the elements of that design, style, font etc. I use enough design so it looked visually similar but also completely unique.

Client: I still don’t fucking like this. I like X, make it look like X.

The next day I went in confused, still not sure what he wanted. I got to work and this time, I made the design very close, used a very similar design, but I tried to make it different enough to avoid plagiarism. 

Client: Look, I want fucking X. All you need to do is go onto their site, nick all their fucking code and all the fucking images, and put the logo on it. Like you see that image here on X? I got a folder on the server full of this shit! I just fucking nick all the designs and code, pop a logo over the other logos, and resell it. Everyone does it!

No surprise, I quit immediately after.

via Clients From Hell
Warning: The language is spicy in this one

Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case?

 

supreme-290

By Ripcord

Today’s ruling by SCOTUS on same sex marriage has the left jumping for joy and many on the right disparaging the Court. People of the gun should take solace in today’s ruling. Today, all 50 states must … Read More

The post Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case? appeared first on The Truth About Guns.

via The Truth About Guns
Did Liberal SCOTUS Justices Just Box Themselves Into Taking a Gun Case?

Guns for Beginners: NEVER Shoot to Kill

target

The correct expression is “shoot to stop the threat.” That’s what you’re trying to do when you perforate a perp. You are NOT trying to commit homicide, however justifiable that goal may be. Even if you’re aiming at the bad … Read More

The post Guns for Beginners: NEVER Shoot to Kill appeared first on The Truth About Guns.

via The Truth About Guns
Guns for Beginners: NEVER Shoot to Kill

Leaked Damage Assessment Shows Government Mostly Interested In Investigating Leakers, Withholding Information From Public

The Intercept has just released an interesting document from its Snowden stash: an unredacted damage assessment of the New York Times’ 2005 exposure of the NSA’s warrantless wiretapping program — a program that saw the agency monitoring the emails and phone calls of US citizens.

It’s not that the government hasn’t made damage assessments public before. It just does it very, very rarely and mostly for self-serving reasons. The most recent publications of damage assessments were in response to the Snowden leaks. The released assessments were heavily-redacted and made plenty of unfounded assertions about the damage done to the national security infrastructure by the leaks.

This 2005 damage assessment was never released. It was purely an internal document. Thanks to it being part of Snowden’s package of leaked documents, it can be read without the sort of excessive redaction the government deploys when discussing even the most inane (or obvious) aspects of national security.

Such was the internal distress at the possible exposure of this surveillance program that the government managed to delay its publication for a year. Despite its successful pushback, the assessment here is no different that the assessment of the Snowden leaks. In other words, mostly speculation backed by very little support.

The memo gives a general explanation of what terrorists might do in reaction to the information revealed. It was “likely” that terrorists would stop using phones in favor of mail or courier, and use encryption and code words. They could also plant false information, knowing the U.S. government was listening. But the leaked program had not “been noted in adversary communications,” according to the memo. It gave no specific examples of investigations or targets that had or might be impacted by the revelations.

Once you get past the obvious suggestion that terrorists will adapt communication methods in light of presumably-unknown information, you get to more detailed discussion of the NYT article itself. The assessment breaks down every statement of fact in the article and provides its corresponding level of classification.

(TS//SI//STLW//NF//OC) "President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity."

(TS//SI//STL WIINF//OC) (NSA) "monitored the international telephone calls (communications to the U.S.) and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years … to track possible "dirty numbers" linked to Al Qaeda…"

(TS//SI//STLW//NF//OC) "NSA eavesdrops (under this program) without warrants on up to 500 people in the United States at any given time." … the number monitored … may have reached … the thousands"

(S//SI) "Overseas, about 5,000 to 7,000 people suspected of terrorist ties are monitored (by NSA) at one time."

Oddly, the government considers the most obvious possible outcome of the exposure of this program (that terrorists would alter communications in light of this info) to be "classified."

(C) (The article) would alert would-be terrorists (inside the United States) that they might be under scrutiny.

If there was a battle for American hearts and minds to be fought in the wake of this publication, you’d think the agency would want this conclusion made public (preferably with some supporting evidence), rather than bury it with other classified documents.

Nearly a decade down the road, the government has yet to offer any solid proof that the New York Times’ article resulted in compromised capabilities or surveillance programs.

“To this day we’ve never seen any evidence — despite all the claims they made to keep us from publishing — that it did any tangible damage to national security. This is further confirmation of that,” [New York Times writer Eric] Lichtblau told The Intercept.

In fact, the only clear response to the publication of this leaked info didn’t take the form of altered collection techniques or additional terrorist attacks. It took the form of a full-blown DOJ investigation, involving 25 FBI agents and five prosecutors. This too, resulted in a whole lot of nothing.

The leak and the response to it indicates the government was more worried about US citizens, rather than its foreign adversaries, finding out about what it was up to.

Permalink | Comments | Email This Story




via Techdirt.
Leaked Damage Assessment Shows Government Mostly Interested In Investigating Leakers, Withholding Information From Public

Efficient Use of Indexes in MySQL

The slides of “Efficient Use of Indexes in MySQL” talk we delivered on SFMySQL Meetup.
This is an introductory talk for developers on MySQL indexes. In my opinion it’s quite important to understand how InnoDB organizes data. If you know how MySQL accesses data it’s easier to write optimal queries.
When working with queries I imagine secondary indexes as a table with records sorted by secondary key fields. This is a powerful concept that helps to understand MySQL logic. It’s also easy to understand complex optimizations like loose index scan.
For example, for index (last_name, rank) the secondary index table looks like:
Enjoy the slides!
The post Efficient Use of Indexes in MySQL appeared first on Backup and Data Recovery for MySQL.
via Planet MySQL
Efficient Use of Indexes in MySQL

BearCam Is Back and It’s Beary, Beary Nice

It’s officially summer, which means the salmon are running in Alaska’s Katami National Park which means the local brown bears are poking around there to eat them which means the BearCam is back up for the season. I just watched for like three minutes and I saw a bear!

See?!

BearCam Is Back and It's Beary, Beary Nice

If the hot bear action is not enough, you can switch to the underwater cam and watch for poor, unsuspecting migrating salmon. (They’re harder to see, but they’re there, see ‘em?)

BearCam Is Back and It's Beary, Beary Nice

If you see a bear you particularly want to remember, you can use the webcam’s tool to take photo. A higher quality image is immediately snapped and shared to the social media outlet of choice. Although after I took this photo of my new friend I didn’t really want to share it with anyone, since it felt like such a special moment.

BearCam Is Back and It's Beary, Beary Nice

I mean, it’s no Condor Cam, but it’ll do nicely for the summer.

[Bears]

via Gizmodo
BearCam Is Back and It’s Beary, Beary Nice