jjjeffrey | 12 years ago | on: The Indie Bubble Is Popping
jjjeffrey's comments
jjjeffrey | 12 years ago | on: The Indie Bubble Is Popping
I can place the games I've highly enjoyed into two basic categories:
-Short and sweet, having one or more of 1. interesting play mechanics 2. great story/theme 3. interesting art direction.
-Solid all around, with addictive elements (e.g. leveling, collecting things) that make repetitive tasks seem fun and extend the time I play the game to beyond a few evenings.
Many indie games I've played fit into the former category, and most non-indie games fit into the latter.
I've been realizing that these "short and sweet" games that I've been getting more and more of a chance to play have provided more lasting and fulfilling experiences than longer games. The feeling I get from sinking an evening into a short and sweet game is kind of similar to reading a good book or playing a good chess match. Likewise, the feeling I get from sinking an evening into a longer game is some artificial feeling of making progress.
I'm overgeneralizing a little, but the point is I've started skipping AAA titles in favor of trying out lots of indie games. Most aren't great, but the cost of a few dollars or less and a half hour to find out isn't bad. For me, it's worth it to find the gems. And not having several-week-long addictions to games with low quality:time ratios is great too.
I really hope there's no indie bubble.
jjjeffrey | 12 years ago | on: Use a config file to SSH into a server
Some other things about ssh that everyone knew but me (until I found out):
-scp supports bash completion for files on the server if you use a key pair.
-Keychain (http://www.funtoo.org/Keychain) makes having a password on your private key less of a hassle by prompting for your password when you first log in to your local account and using that when you ssh. (ssh-agent alone is similar but requires your password for every new login session).
jjjeffrey | 12 years ago | on: GCHQ Used Fake LinkedIn Pages to Target Engineers (2013)
If I understand things correctly, it's not claimed that GHCQ made fake profiles or exploited their platform. It's possible that whoever made the statement didn't really understand MITM, but this kind of reads like another one of the usual carefully worded non-denials.
Full paragraph in the article:
When contacted, LinkedIn stated that the company takes the privacy and security of its members "very seriously" and "does not sanction the creation or use of fake LinkedIn profiles or the exploitation of its platform for the purposes alleged in this report." "To be clear," the company continued, "LinkedIn would not authorize such activity for any purpose." The company stated it "was not notified of the alleged activity."
jjjeffrey | 12 years ago | on: Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
<grsecurity> If you're running Linux 3.4 or newer and enabled CONFIG_X86_X32 , you need to disable it or update
immediately; upstream vuln CVE-2014-0038
and <grsecurity> In case there's confusion, this vuln is not about 32bit userland on 64bit (CONFIG_X86_32), but the new X32
ABI. Ubuntu enables it recently
Does the second line affect the first? EDIT: I ask because it looks like I need to fix my kernel, but I'd rather be lazy if possible.jjjeffrey | 12 years ago | on: How's my SSL?
I'm not proposing that this is a risk or that Firefox behaves this way---I have no idea. Does anyone else know?
jjjeffrey | 12 years ago | on: Simulations back up theory that Universe is a hologram
"In mathematics, Cauchy's integral formula, named after Augustin-Louis Cauchy, is a central statement in complex analysis. It expresses the fact that a holomorphic function defined on a disk is completely determined by its values on the boundary of the disk, and it provides integral formulas for all derivatives of a holomorphic function. Cauchy's formula shows that, in complex analysis, "differentiation is equivalent to integration": complex differentiation, like integration, behaves well under uniform limits – a result denied in real analysis."
Does anyone who knows this stuff better than me know if there's any meaningful connection?
jjjeffrey | 12 years ago | on: My Man Jeremy
jjjeffrey | 12 years ago | on: How Google Sold Its Engineers on Management
One of the big things I retained from my stats classes is the idea that, once you deviate from a pre-specified analysis technique, the strength of your conclusion is strongly diminished. Also, sophisticated statistical techniques are often less robust than simple ones. Maybe some other ideas apply that I can't think of off the top of my head.
On the other hand, the author may not have appreciated the statistical iffyness of that phrasing, and perhaps misrepresented the rigor of the actual analysis.
jjjeffrey | 12 years ago | on: End of Inception decoded [video]
There certainly may be more depth than I'm seeing, but there wasn't anything that made me need to wonder why anything happened the way it happened. As mentioned in the thread already, Momento's the one that isn't straightforward.
I'm not intentionally trolling---I suppose I probably am missing something. There just wasn't anything obviously confusing on the movie's surface for me.
jjjeffrey | 12 years ago | on: The Secret to Making Board Meetings Suck Less
jjjeffrey | 12 years ago | on: The Russia Left Behind
jjjeffrey | 12 years ago | on: To-Do Lists Don't Work
jjjeffrey | 12 years ago | on: Bum-a-Cigarette App Idea. Thoughts?
(Don't interpret this as me recommending smoking. Worst. Habit. Ever.)
jjjeffrey | 12 years ago | on: Chilling legal memo from Obama DOJ justifies assassination of US citizens
I believe the most effective way to solve this problem will be to approach it from many angles with the ultimate purpose of restoring accountability to the executive branch. Improving voting methodology seems to be one of many possibly useful angles. Another might be to put weight on congress to begin scaling back the powers of the executive, such as by repealing the Patriot Act, defunding the NSA, etc. Another still might be to support legislation to protect the voices of other power structures and communication enablers, such as the internet, journalism in general, and organizations like Wikileaks.
Sorry, I suppose this doesn't really bring any new insights to the table. Rather, my point is that there's this really big problem (an overly powerful branch of government) that's been brewing for a while, and it's going to take a lot more than a single fix the repair the whole machine.
Of course, any single effort is better than no effort---I absolutely do not wish to discourage!
jjjeffrey | 12 years ago | on: How airline reservations are used to target illegal searches
jjjeffrey | 12 years ago | on: Newest YouTube user to fight a takedown is copyright guru Lawrence Lessig
jjjeffrey | 12 years ago | on: Hayao Miyazaki upsets some fans and angers conservatives with his latest film
jjjeffrey | 12 years ago | on: Simulating 1 second of real brain activity takes 40 minutes and 83K processors
jjjeffrey | 12 years ago | on: Members of Congress denied access to basic information about NSA
If people couldn't vote for lower offices simply because they showed up for presidential votes, but rather had to show up to vote on another date for other elections, then only people who actually cared about lower offices would vote for those. I think that might make it a lot harder to keep incumbents in power.