Hackerific

last update:

Winter wailing

Changes to Apple Music have had more of an adverse affect on my discovery process than I hoped, and so this post has been a long time coming. In writing this, I’ve delved through my own discoveries as well as a some of my favourite musical blogs, Dark Hemyspheres, Doom charts and Stoned Meadow of Doom. The result is a mix of albums which came out in December 2017 and January 2017.

Autumn music

October and November were a bit of a blur, and I ended up sitting on a draft post for most of November before suddenly, BANG, it was December! Doh. Anyway, things have slowed down a little in the music world, but there”s still literally more amazing music release each month than a standard pair of human ears can cope with. Rather than rattle on for ages, here are a few of my top picks.

Programming ligatures are font glyphs designed to improve the readability of code. If you spend a lot of time staring at a terminals or text editors you might* find that ligatures can hugely decrease the time it takes you to read, understand and locate code, which if you’re doing any kind of maintenance work is awesome. (*I say “might” above because I’m not aware of evidence, but I’m also not aware of any studies.

This month saw the release of macOS Sierra, the one with the name change. Along with that came some pretty hefty changes to iTunes Music. Some of these changes are cute, like curated playlists, but others, like the removal of most lists of new music, are not so nice. I’m still trying to work out the best way to discover new music, now that I can’t view lists of all new albums, but I’m sure I’ll think of something.

Not long ago, I joined the O’Reilly Security Newsletter (which I highly recommend by the way), and was given the choice of one of several free eBooks. I went for Network Security Assessment (3rd edition) and wasn’t disappointed. This book is a short review, listing some of the things I enjoyed about it. Despite being unfinished, this is a mature and captivating book about examining networks for vulnerabilities. I work daily on the concepts covered in this book and I can imaging that when it’s finished it will be a go-to book on my shelf (yeah, I’ll probably buy a physical copy).