Show more

Swiss Maps Are Full of Hidden Secrets
Possibly the oldest topographical Easter egg, and the current record holder for the longest-lasting one, is the Naked Lady of Künten.
atlasobscura.com/articles/swis

Overheard: When my dad asked me what day it is, I told him March 1st, but then he just stomped around the room and asked again.

"Perhaps the real difference is that a song lyric has neither the narrative responsibilities of drama or prose, nor poetry’s duty to precision." theguardian.com/books/2024/mar

A moment of zen: Gazing out on Maine's Penobscot Bay on a March morning.
vimeo.com/918701694/72f5d02ae9

"Yet many of those involved in twin studies have been resistant to these influences, betraying the influence of a deeply rooted magical thinking around twins that has cast its long shadow over our understanding of the line between selfhood and otherness." aeon.co/essays/what-do-twin-st

Browse through thousands of old websites in our gallery and discover forgotten trends in web design. webdesignmuseum.org/all-websit

A warning for my friends in San Francisco: "At 12pm Wednesday, March 20, we're all going to meet at Yerba Buena, and we're all going to scream." partiful.com/e/0gSaxHFjDBNRDZ2

Dr. Seuss spent nine months composing The Cat in the Hat. It uses just 220 different words and is 1,702 words long. He was a meticulous reviser, and he once said: "Writing for children is murder. A chapter has to be boiled down to a paragraph. Every word has to count."

thewritersalmanac.substack.com

Space Colony Art from the 1970s
The cylinder becomes a kind of Eden regained in these space fantasies, an Arcadia retrofitted with solar panels and cosmic-ray shields. publicdomainreview.org/collect

Don't anthropomorphize computers. They hate that.

Apparently, hijacking these devices is as easy as downloading Aiwit and putting the doorbell in pairing mode. This allows an attacker to take over the device, view footage, and lock out the owner. gizmodo.com/a-child-could-hack

Apparently, hijacking these devices is as easy as downloading Aiwit and putting the doorbell in pairing mode. This allows an attacker to take over the device, view footage, and lock out the owner. gizmodo.com/a-child-could-hack

Communications of the ACM (CACM) is now a fully Open Access publication. This means that more than six decades of CACM’s renowned research articles, seminal papers, technical reports, commentaries, real-world practice, and news articles are now open to everyone, regardless of whether they are members of ACM or subscribe to the ACM Digital Library. cacm.acm.org/news/cacm-is-now-

The Uncomfortable is a collection of deliberately inconvenient everyday objects by Athens-based architect Katerina Kamprani. theuncomfortable.com

The 40 Best Questions to Ask in an Interview

I like "How does the team deal with two urgent projects with conflicting deadlines?"
review.firstround.com/the-40-b

Your association set up a certification program to establish the standard of knowledge, skills, and abilities required of professionals in your industry. But maybe it's not going so well. Here's the reasons why.

(My fingerprints are on this.) holmescorp.com/blog/articles/w

Show more

estherschindler

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.