a companion discussion area for blog.codinghorror.com
Welcome to Coding Horror discussion! [uncategorized] (3)
Password in the context of MFA [uncategorized] (1)
Remote Desktop Tips and Tricks ( 2 3 4 5 6 ) [blog] (112)
Help Name Our Website ( 5 6 7 8 9 10 11 12 13 14 15 16 ) [blog] (318)
Your Desktop Is Not a Destination ( 2 3 4 5 6 7 8 ) [blog] (141)
It's Clay Shirky's Internet, We Just Live In It ( 2 3 4 ) [blog] (65)
Revisiting the Black Sunday Hack ( 2 3 4 ) [blog] (60)
What does Stack Overflow want to be when it grows up? ( 2 ) [blog] (33)
Reading with Edward Tufte [blog] (15)
Rediscovering Arcade Nostalgia ( 2 3 4 ) [blog] (77)
Revisiting Programming Fonts ( 2 3 4 5 6 7 8 9 10 ) [blog] (185)
Touch Laptops ( 2 ) [blog] (34)
There is no longer any such thing as Computer Security ( 2 ) [blog] (38)
Meetings: Where Work Goes to Die ( 2 3 ) [blog] (59)
Keeping Up and "Just In Time" Learning ( 2 ) [blog] (24)
What If We Could Weaponize Empathy? ( 2 ) [blog] (37)
Please Don't Learn to Code ( 2 3 4 5 6 7 8 9 10 11 12 13 ) [blog] (258)
The God Login ( 2 3 4 5 6 ) [blog] (108)
COBOL: Everywhere and Nowhere ( 2 3 4 5 6 7 8 9 10 11 12 ) [blog] (239)
The Five Browser Shortcuts Everyone Should Know ( 2 3 4 5 6 7 8 ) [blog] (148)
All Abstractions Are Failed Abstractions ( 2 3 4 5 6 7 8 9 ) [blog] (163)
The CODE Keyboard ( 2 3 4 5 6 7 8 9 10 11 ) [blog] (200)
Power, Surge Protection, PCs, and You ( 2 ) [blog] (33)
Thunderbolting Your Video Card ( 2 ) [blog] (30)
Modern Logo ( 2 3 ) [blog] (44)
Protecting Your Cookies: HttpOnly ( 2 3 4 5 6 7 ) [blog] (136)
Your Own Personal WiFi Storage ( 2 ) [blog] (37)
Laptop Alternatives ( 2 ) [blog] (36)
Password Rules Are Bullshit ( 2 3 4 5 6 7 8 9 10 11 ) [blog] (205)
Microsoft naming: who stole the soul? [blog] (10)