mQu | 10 years ago | on: Show HN: Browse Hacker News from the Comfort of Your Terminal
mQu's comments
mQu | 10 years ago | on: Dilbert: Startup idea
mQu | 10 years ago | on: Birth of the Moralizing Gods
However the concept of god (or God) in technology has been touched by sci-fi many times. Gibson's Sprawl trilogy, Serial Experiments Lain, GitS, Stanisław Lem's books and many more.
If as the article stipulates humans need an external factor to be kept in line with social norms than this could be the evolution of religion.
mQu | 10 years ago | on: Firefox tracking protection decreases page load time by 44%
YMMV of course but for my purposes it was not worth it.
mQu | 11 years ago | on: PleaseWait.js – Show your users a beautiful loading page while your app loads
mQu | 11 years ago | on: PleaseWait.js – Show your users a beautiful loading page while your app loads
I sure was guilty of big sites just as much as the next guy. It just saddens me that insted of promoting what we've learned it the past years and applying to current projects we're doomed to repeat bad UX from before.
mQu | 11 years ago | on: PleaseWait.js – Show your users a beautiful loading page while your app loads
mQu | 11 years ago | on: PleaseWait.js – Show your users a beautiful loading page while your app loads
I would much more appreciate that dev time would be put into a framework that allows graceful enchancement by deferring loading more heavy components and to allow user to interact with the site ASAP.
Having a skeleton project for gulp (or any other system) that shows how to properly split big, non essential, components and lazy load them would go much further to ease developing big applications and smoothen UX.
EDIT: typos.
mQu | 12 years ago | on: OAuth 2.0 and OpenID Redirect Vulnerability
mQu | 12 years ago | on: OAuth 2.0 and OpenID Redirect Vulnerability
Also both CNet and the original are so light on details it's scary. I get the feeling though that we've entered an era for "vulnerability sites" - instead of CVEs we're now getting marketing.
mQu | 12 years ago | on: Avatar: A browser OS with built-in privacy and anonymity
EDIT (from here to end): to clarify - my question is to assess security of the 'runtime' - if it's downloaded from the server what is there to stop malicious party from compromising the server and sending modified verification code?
Would it be downloaded through the bridge then (and only then) verification with block chain could be done on received updates (providing first d/l wasn't compromised). User browser would then access files exposed by the bridge.
At least this is how I imagine it but the OP overview is light on details.
But more to the point - it fits with many keyboard only work flows and/or tiling WMs (i3, awesome, etc). At least that's what it's good in it for me. One less context switch.