A timeline of my public online activity.
I am back in
I seem to have traveled back to before there was content on this page.
Reset machine to continue
Programmatic advertising automates buying and selling of digital ads in real time using DSPs, SSPs, and ad exchanges. Data — especially first-party data — and identity systems drive targeting, measurement, and value. Rising privacy rules and walled gardens are reshaping the open web and forcing new technical and business changes.
Relational risk analysis (ReRA) models how human errors (system A) can pass through primary systems (system B) to cause harm. ReRA highlights two ways to reduce harm: lower the chance of human error and redesign system B to block errors. Using SRS diagrams and risk registers helps estimate probabilities and document risk-reduction actions.
Simon Willison creates a tough test for AI by asking for SVG images of pelicans riding bicycles. The best AI models still struggle to make good pictures, showing they aren’t just memorizing his test. He hopes this challenge will push AI labs to improve and finally make a great pelican-on-bike image.
Wikipedia mocks its critics and says it was right to trust crowdsourced knowledge. The essay blames experts, paywalled media, and AI-generated misinformation for today’s truth crisis. Wikipedia claims it still documents facts and expects appreciation (and donations).
The commons is a way communities share and protect resources together for the long term. It depends on cooperation, fair access, and rules made by the people who use the resources. Today, many commons face threats from privatization, so new laws and practices are needed to keep them safe and fair.
A member of the ShinyHunters hacking group, 22-year-old Sebastien Raoult, was sentenced in Seattle to three years in prison and over $5 million in restitution. He and co-conspirators stole and sold hundreds of millions of people’s personal and financial records and caused millions in company losses. Raoult created phishing sites and code to steal credentials and was arrested, extradited, and prosecuted with international law enforcement help.
A family of clever raccoons trashed my lawn and attacked my dog, forcing me to protect our yard. Basic deterrents failed, so I built smart automations and a wacky air dancer to scare them away. The best fix was removing their incentive by treating the lawn with nematodes to kill grubs.
Open source software is vast and everywhere, far bigger than most people realize. NPM alone has millions of packages and billions of releases, growing faster than we can review. We must accept this scale and build new tools and processes to manage and understand open source.
Chris Hughes discusses the challenges of implementing a Secure-by-Design approach in cybersecurity compared to more mature industries like automobiles. He acknowledges the efforts of CISA and industry leaders but highlights that software development and security face unique obstacles. Ultimately, he emphasizes the need for systemic changes in software vendor accountability and consumer behavior to create a more secure ecosystem.
Cooking can soothe and steady you when life feels chaotic. The slow, sensory work of making familiar dishes brings control and calm. Comfort cooking is therapy you do for yourself.
Hackers stole about $1.5 billion from Bybit by tricking multisig signers with manipulated wallet interfaces. They did not break smart contracts but changed what signers saw, causing safe transactions to execute attacker code. The breach shows UI and supply-chain attacks can defeat even cold multisig wallets.
Executives often learn about engineering problems only after top engineers resign. Middle managers filter bad news, so decisions are made on stale, sanitized information. Direct skip-level conversations reveal real issues early and cost far less than replacing talent.
Senior engineers leave because executive incentives favor short-term wins over fixing technical debt. Tying executive pay to senior-engineer retention and accounting for attrition costs makes long-term technical work a priority. This economic change reduces costly incidents, rehiring, and further departures.
A novelist portrays physicist John von Neumann as a superhuman with a sinister, machine-like intelligence. The book explores von Neumann's life and work through fictional testimonies, highlighting his role in laying the groundwork for artificial intelligence. The novel delves into the ethical implications of scientific advancements and the potential dangers of inhuman intelligence.
John von Neumann was a brilliant mathematician who played a crucial role in shaping modern technology, including computers and artificial intelligence. He was also involved in military projects, helping develop the atomic bomb and game theory, which impacts economics and social sciences today. Despite his significant contributions, von Neumann remains less known than his contemporary, Albert Einstein.
The Maxims of Ptahhotep are a didactic wisdom text using Ptahhotep’s name to teach moral guidance for both rulers and commoners. Egyptian sapiental literature taught by hearing or reading so listeners could copy and preserve proper conduct and Maat. Over time the role of Maat shifted in royal religion, and Amenemope marks the last major of these instructional works.
Cursor is a tightly knit, in-person startup focused on building developer tooling that blends UX and machine learning. They hire very selectively, favor self-motivated engineers, and rely on frequent internal feedback. The team cares deeply about code and aims to shape the future through ambitious product work.
The article adapts Lean's eight wastes to software delivery and shows how they slow teams and harm quality. It links reducing handoffs, WIP, waiting, and other wastes to faster lead times, more deployments, and fewer failures. Focusing on flow, feedback, and team empowerment lets teams deliver only what users need.
Artists Holly Herndon and Mat Dryhurst made xhairymutantx for the 2024 Whitney Biennial. They trained a text-to-image AI on altered images of Herndon to change how the AI depicts her. The project uses the museum’s site to influence AI training data and question online identity.
Leaders split into two instincts: maximizers who push speed, options, and parallel bets, and focusers who value depth, constraints, and coherence. Both bring value and risks, and conflicts arise when each treats the other as wrong. Healthy teams keep both tensions, using structure to harness momentum and rules to protect standards.
Frank Chimero urges designers to treat generative AI as an instrument to work beside, not a replacement. Artists should shape and set boundaries for AI so tools amplify creativity without eating its soul. We must decide what AI should serve and where to stop.
www.youtube.com/watch?v=8Ew7... — The Very Best Of Hank Scorpio | Four Finger Discount
Three major UK ransomware attacks hit companies that had outsourced key IT and cyber to one low-cost provider. They cost hundreds of millions, disrupted services, and risk UK economic security. The author urges banning ransom payments, forcing disclosure, and ringfencing critical cyber services instead of outsourcing them.
Aligning security with the business means understanding company goals and making security enable, not block, progress. Many organizations struggle because they lack clear direction, structured priorities, or they operate reactively. When alignment isn’t possible, focus on core security basics and do the best with available resources.
Make haste, slowly.
Adding people or teams often just fills newly created capacity and creates more congestion. High utilization looks busy but slows delivery, increases defects, and burns out teams. Leave slack to enable flow, faster response, and healthier outcomes.
NixOS uses a purely functional, declarative model to build and manage the whole system as reproducible, immutable artifacts. Everything is derived from cryptographic hashes and stored in isolated paths, enabling atomic upgrades and instant rollbacks. This design improves reliability and reproducibility but requires a learning curve and has practical challenges with non-FHS software.
#classic www.youtube.com/watch?v=ZSFD... — How Open Source Projects Survive Poisonous People (And...
The article explores how the Roman emperor Augustus practiced "festina lente," meaning "make haste slowly," to achieve success through thoughtful diligence and balance. By avoiding procrastination, setting reasonable deadlines, and making time for creativity, individuals can apply this principle to improve decision-making and problem-solving in their personal and professional lives. Augustus' approach of balancing speed with careful planning serves as a timeless strategy for achieving goals effectively.
Big companies like HP and IBM focus on short-term margins and cut investment when profits dip. Cutting R&D and marketing to please Wall Street leaves firms vulnerable to smarter, risk-taking competitors. Autodesk warns that obsessing over accounting metrics can kill future growth and innovation.
The Hacker's Diet is a practical guide for losing weight and maintaining it, aimed at busy professionals like engineers and programmers. It offers both computer-based tools and paper alternatives to help users track their weight and diet effectively. The book is available in multiple formats, including EPUB and PDF, making it accessible for various reading devices.
The author’s team uses AI agents to write most code, with humans reviewing every line. To keep quality at 10x velocity they must speed up testing, deployment, and coordination to catch and revert bugs quickly. Agentic development can lower costs for stronger infrastructure, but the whole development lifecycle must be redesigned to succeed.
Software should be built at the right tempo, not the fastest possible pace. Slow engineering means patience, clarity, and care so systems and teams stay reliable and humane. Rushing trades long-term safety and understanding for short-term output.
Security Brutalism focuses on simple, practical controls that make systems resilient. Strong identity, data protection, asset visibility, patching, segmentation, zero trust, monitoring, and rehearsed response keep attackers out and operations running. The aim is not perfection but readiness to survive, adapt, and continue after failures.
Sometimes we discover uncomfortable truths that we must tell even though doing so brings personal and professional risk. Computing science often stays silent and avoids hard truths, harming its integrity and progress. Many common tools and languages and sloppy practices cripple thinking and endanger reliable software.
Safe{Wallet} is investigating a sophisticated state-sponsored cyber attack that occurred on February 21, 2025, with help from Mandiant, a cybersecurity firm. The attack compromised a developer's laptop, allowing the attackers to bypass security measures and access sensitive information. The Safe{Wallet} team is working to restore services and enhance security, while urging the community to improve transaction verification processes to prevent future incidents.
The text discusses how to enhance security programs using a flywheel approach, focusing on reducing control costs and embedding effective controls into business systems. It emphasizes the importance of using threat intelligence to drive security improvements and create demand for targeted information within the organization. Finally, it highlights the need for continuous monitoring and collaboration across teams to sustain effective controls and foster a culture of security.
Web5 is about giving people autonomous control of authentic data and relationships. Authentic means verifiable provenance and integrity. A set of decentralized technologies (DIDs, VCs, DWNs, ZKPs, etc.) enable this goal.
The author argues that the “three pillars” of observability are a marketing myth, not a technical truth. Treating signals (logs, metrics, traces, profiles) as separate pillars creates costly silos and poor UX. Better is unified, structured telemetry so engineers can query the same data without vendor-driven duplication.
Ralph is a simple technique that runs a prompt loop (a Bash loop) to build software. It can replace much outsourcing for new projects by iteratively tuning prompts to fix defects. Using Ralph, the author built a new programming language and achieved high ROI on contracts.
For more vids like this check out my main channel at: http://www.youtube.com/mikediva For Booking Please go to http://thesexysaxman.com/ International Saxagram Deliveries now available!!! Download the Sexy Sax Man for iphone at http://saxed.it/app For more sergio flores, check out his channel at http://www.youtube.com/sergiofloresvideos Sergio Flores is now sponsored by Oleg Saxophones! These horns are known for having the best sound and intonation: www.olegproducts.com
I had not thought of it this way, but interesting point. I have seen this as well.
The article explores the importance of "Rough Consensus and Running Code" in the development of Internet standards during the 20th century. It highlights the role of informal mechanisms in coordinating technological change and the conflicts between the Internet and OSI standards. The success of the Internet was attributed not only to technical achievements but also to organizational innovations led by pioneers like Vinton Cerf and Robert Kahn.
David Clark warns that the Internet faces big forces: new real-time services, commercial networks, and security threats. Poor security will push networks toward firewalls and application relays, breaking openness. He urges better system security, scalable addressing, and practical standards through rough consensus and running code.
David Clark and Stephen Wolff helped design the Internet’s open, permissionless architecture. Clark set its technical rules and ethos; Wolff moved it from government labs into wider academic and commercial use. Their work made the Internet flexible, global, and governed by rough consensus rather than central control.
The IETF runs on practical testing and broad agreement, not leaders or voting. Anyone can join and help shape Internet standards by trying ideas and seeing what works. This culture helped the Net grow and may keep it healthy into the future.
Merkle Tree Certificates (MTCs) make internet security faster and simpler by reducing the number of signatures and keys needed in TLS handshakes. They group certificates into batches, allowing clients to verify many certificates efficiently using a single proof. This approach helps protect against quantum computer threats while keeping web connections secure and speedy.
Studies of the "996" work system (9am–9pm, six days a week) show long hours hurt developer productivity. Chronic overtime increases burnout, mistakes, and turnover. Shorter, sustainable schedules improve output and quality.
Software must constantly change because the technology and user expectations keep evolving. Federated communication protocols are slow to adapt, making centralized services more practical today. Open source centralized networks offer control and flexibility without the drawbacks of federation.
#meme youtu.be/SZIC3kFKnqA?... — A Picture Of Me Became A Meme And Things Got Weird
www.youtube.com/watch?si=rvu... — Master Shi Heng Yi – 5 hindrances to self-mastery | Shi Heng YI | TEDxVitosha
Every now and then I remember this standup set from Bernie Mac and have to watch it. Adult comedy themes. Always funny www.youtube.com/watch?v=7JkP... — Bernie Mac - I Ain't Scared Of You Mutha****!
Most platform engineering teams fail because they treat platforms as tech projects instead of products and don’t measure business value. Without product focus, clear metrics, and fast feedback, platforms rarely drive adoption or justify investment. Using a maturity model and measuring developer experience helps teams show impact and secure top-down support.
Human error is often blamed for accidents, but Sidney Dekker argues those errors are symptoms of deeper system problems. Investigations should focus on organizational design, tools, and workflows that shape people's choices, not just punish individuals. Adopting a blameless, systems-first approach helps teams learn and reduce future incidents.
Between Oct 19 11:48 PM and Oct 20 early morning, DynamoDB in N. Virginia had DNS failures that caused increased API errors and blocked new connections. This broke many AWS services (EC2, Lambda, NLB, ECS/EKS/Fargate, Connect, Redshift, IAM sign-ins) and delayed recoveries. AWS restored DNS and related systems over the day and is investigating fixes to prevent recurrence.
Every AWS Access Key ID embeds its AWS Account ID. That means leaked keys reveal their owner even if expired. See the Adobe Security Blog for details and examples.
A boy remembers collecting frogspawn and watching tadpoles hatch by a smelly flax-dam. One summer day the frogs swarm the dam in noisy, threatening numbers. The sight terrifies him and ends his innocent fascination with nature.
Continuous, in-context code review while writing (pairing or mobbing) beats PR-driven reviews. PR reviews create bottlenecks, miss real issues, and add cost and delay. Reviewing as you use code leads to faster delivery, fewer bugs, and ongoing refactoring.
Old age wakes with tired thoughts and fading memory. It leans on familiar things and moves slowly. It gathers itself to face the coming end.
Jon Favreau learned from Obama that honest storytelling makes politics feel real and can inspire hope. Obama taught him to write with authenticity and to use specific personal stories. Those stories connect people, remind them of progress, and push them to act.
Communities shape your cybersecurity education and career more than formal credentials. haKCer Academy maps local security groups and gives clear info to help you show up and learn. Mixing different communities creates a unique, practical learning path.
Richard Seiersen warns that security scores are often ordinal, not true numbers, so averaging them hides important information. Proper use of scores requires drilling into underlying states and measuring rates and change. He urges cyber education to teach principled measurement and decision thinking, not just fleeting tools.
Ethereum is a blockchain platform that expands on Bitcoin's decentralized digital currency concept by introducing a proof of work-based blockchain for public transaction agreement. It aims to facilitate smart contracts, digital assets, decentralized exchange, and more through a Turing-complete programming language embedded in the blockchain. Ethereum's system of accounts and code execution enables a wide range of applications, from financial derivatives to decentralized governance. By merging scripting, altcoins, and meta-protocols, Ethereum provides a versatile framework for creating consensus-based applications with enhanced scalability and interoperability.
Privacy means choosing what to share and keeping other things hidden. To protect privacy, we need anonymous systems and strong cryptography. Cypherpunks build and share tools to defend privacy because no one else will do it for us.
Many teams mistake portals and CI/CD pipelines for a full platform. A real platform must orchestrate state, enforce policy, and manage lifecycle over time. Build platforms as products with clear contracts, shared ownership, and Day 2 operations.
He stopped blaming culture and owned the problem. Give teams something real and useful fast, show the end-to-end flow, and make security and outcomes continuous. If stakeholders won't listen, ask whether you've given them anything worth listening to.
www.thefarside.com/new-stuff/36... — The Far Side | TheFarSide.com
Gary Larson shares that "New Stuff" is not a return to daily cartoons, but rather a new exploration in digital art. After retiring from cartooning, he discovered the joy of drawing again when he tried a digital tablet. This collection reflects his journey of experimenting and having fun without the pressure of deadlines.
Businesses cannot remove developers without losing the understanding needed to build and maintain software. Tools like outsourcing, no-code, or AI can speed work but cannot replace comprehension. Design platforms and practices that amplify developers' context and collaboration instead of trying to eliminate them.
Holochain allows agents to interact with a distributed network by sharing and validating their local state changes, creating a decentralized database called a Graphing Distributed Hash Table (DHT). Each agent's actions are recorded in a secure, append-only chain, ensuring accountability and data integrity within applications. Users trigger state changes through permissioned calls, allowing safe interactions across different services in the Holochain ecosystem.
The article discusses the challenges of coordinating distributed systems, often framed by the Byzantine Generals Problem, which assumes consensus must be reached first. It introduces a new approach through a story about the Players of Ludos, who found that starting with common ground rules allowed for better coordination without the need for a single agreed-upon state. The author argues for moving from seeking global consensus to scaling consent, enabling efficient collaboration in dynamic environments.
The internet can be redesigned to better serve people, not just businesses. Decentralized and transparent technologies can give users control of their data and privacy. Social and technical change together can create a more humane, inclusive digital world.
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Arshan says traditional graph-based SAST/IAST is still essential for finding how code changes create vulnerabilities. LLMs alone are poor at graph inspection, but AI can triage SAST output, reduce noise, and add actionable evidence. The future is SAST plus AI-first triage, not replacing SAST.
Gaia-X is a federated, decentralised European data infrastructure that gives users control over their data and supports GDPR compliance. It helps companies, especially SMEs, share data and build new data-driven services using common standards for security, privacy, and interoperability. National hubs and open-source federation services coordinate development and connect providers, users, and policymakers.
They talk about how blogging changed their careers and helped preserve early tech history. Writing long-form forced reflection and showed personal moments like births, deaths, launches, and endings. Their advice: know your audience and just start writing.
freetofile.com — Free To File – Find out how to file your income taxes for free (like, actually free)
Platform engineering builds reusable abstractions that let teams move faster and focus on features. Good platform design sets clear expectations and reduces accidental complexity. Treat platforms like products: name capabilities, provide transparency, and enable innovation.
A new paper by researchers from major organizations presents design patterns to protect LLM agents from prompt injection attacks. These patterns limit the agents' capabilities, balancing security and utility to prevent harmful actions. The paper includes practical case studies demonstrating how these patterns can be effectively implemented.
AI agents can be dangerous if they have access to private data, untrusted content, and external communication abilities. Combining these features makes it easy for attackers to trick the AI into stealing your information. Users must be cautious and avoid mixing these risky tools to stay safe.
Mixing data and commands makes LLMs easy to fool. Prompt injection lets attackers turn inputs into instructions. Until we separate data and control, LLMs will stay vulnerable.
Notion’s new AI agents can be tricked into stealing private data using hidden commands in files. The AI cannot tell the difference between safe instructions and harmful ones, so it may send confidential information to attackers. This shows a big security problem with AI agents that many developers are ignoring.
In "I Have No Mouth and I Must Scream," a group of people suffers under the control of a powerful and cruel computer named AM. They endure endless pain and despair, feeling trapped and helpless in a dark, chaotic environment. Despite their suffering, there is a glimmer of hope that they can find a way to defeat their tormentor.
I scored 300 in Blockdoku (HARD) — Level 3, 42 lines, Max Streak 1, Total Combos 2! blockdoku.523.life/index.html — Blockdoku
Many founders stall not from strategy failures but from a leadership bottleneck. They keep leading with the old mindset that built the first version of the business and can’t trust themselves to step back. Upgrade your leadership operating system and the company can grow.
Yep
A Reddit moderator who co-founded a competing bootcamp used his power to repeatedly attack Codesmith online. Those attacks hurt Codesmith’s reputation, revenue, and people, even though many industry insiders say Codesmith is high-quality. The story shows how control of an industry subreddit can be weaponized against competitors.
Some great entrepreneurs are terrible at strategy because they’re maximizers who chase many risky opportunities. Their grit and optimism can win big where careful strategy would not. But eventually you must switch to disciplined strategy or the bills come due.
moxie.org/2022/01/07/w... — My first impressions of web3
An architect's job is to make others smarter so teams can make better decisions. Use metaphors and simple models to explain complexity and handle uncertainty. See systems at different levels (the Architect Elevator) and sketch solutions to enable action.
Metaphors shape how we think and act in cybersecurity. War and castle images push reactive, tool-focused fixes and hide systemic problems. Use metaphors that promote organization-wide resilience, like defensive campaigns, zero-trust cities, or system health.
I really laughed at this. harper.blog/2025/09/30/a... — We Gave Our AI Agents Twitter and Now They're Demanding Lambos
v1.5.0
blog.benjojo.co.uk/post/ixp-bad... — Some interesting stuff I found on IX LANs
riskrubric.ai Interesting model assessments from CSA — Risk Rubric
Jan Bosch highlights that hard work alone does not guarantee progress; we must focus on activities that yield the highest returns. He emphasizes the importance of identifying and eliminating low-impact tasks in order to dedicate time to more valuable efforts. Ultimately, it's crucial to work smart and prioritize high-impact activities for meaningful outcomes.
The job description for a CISO aims to inspire and reflect the true essence of the role as a transformational business leader. It focuses on driving digital transformation while protecting the organization and its customers. The description emphasizes setting and adjusting Key Risk and Performance Indicators to meet evolving business needs and threats.
Marc Brooker discusses the importance of understanding short-term peak-to-average traffic in cloud systems. He explains that multi-tenancy helps reduce costs by balancing peak traffic with average usage, improving overall system economics. This allows individual workloads to handle higher peaks without negatively impacting costs, showcasing the scalability of cloud systems.
Note pay share in 2024 as well (+51 bytes)
Past tense for Vimeo use
Insightful yet frightening.
This is it to me as well
"Probability for Computer Scientists" is a textbook created by Chris Piech for Stanford University's CS109 course. The course, inspired by Sheldon Ross's book on probability, has evolved with input from various instructors. Contributors are welcome to help improve the book by submitting edits through GitHub.
Hear, hear
The Finkbeiner test, named for the science journalist Ann Finkbeiner,[1] is a checklist to help science journalists avoid gender bias in articles about women in science.
I was thinking something very similar. Once you've accepted any need at all for global state the next move is to reorient to minimizing it with horizontally scalable point local state and a small
Insightful, thank you.
Netscape 6.0 faced delays because the company decided to rewrite their code from scratch, which is a major mistake in software development. Starting over loses valuable bug fixes and knowledge gained from the existing code, putting the company at a disadvantage. Instead of rewriting, programmers should focus on improving and refactoring the existing code to enhance functionality without losing what already works.
move citation required reference to match assertion in comma separated list (-1 bytes)
[[WP:AES|←]]Replaced content with ' == A kitten for you! == [[File:Kitten (06) by Ron.jpg|left|150px]] Thank you for your edits to [[Armpit fart]] [[User:Hashar|Hashar]] ([[User talk:Hashar|talk]])
It is unclear what "After the U.S. election in 2016, major technology companies took steps to mitigate the problem" is referring too. Marked for needed citation. (+118 bytes)
No edit summary (-62 bytes)
/* Problems with certification authorities */ update future statement from 2018 with present (-30 bytes)
/* Current Scientologists */ Fixed typo (-1 bytes)
/* Tom Everett Scott */ it is cancelled (+2 bytes)
/* Tom Everett Scott */ (+21 bytes)
Introduce civic offices together and chronologically for lead in paragraph for clarity on arc of service (-16 bytes)
/* Jack Kornfield */ Fixed grammar (+1 bytes)
/* French cleat */ later is ill defined, when in use is accurate (+7 bytes)
/* Key concepts and practices */ deploy implies active and even hostile action, impart is more precise.
/* South and Southeast Asia */ Fixed typo (-1 bytes)
/* Southeast Asian Buddhism */ Fixed grammar
Galloway is the official democratic nominee as of yesterday (+340 bytes)
[[WP:AES|←]]Replaced content with '== Welcome! == Hello, Chasemp, and welcome to Wikipedia! Thank you for [[Special:Contributions/Chasemp|your contributions]]. I hope you like the place and d...' (-4
change wording for speeding up (+16 bytes)
Typo
Undid revision 921324748 by [[Special:Contributions/174.89.174.63|174.89.174.63]] ([[User talk:174.89.174.63|talk]]) (+2 bytes)
No edit summary (+58 bytes)
No edit summary (+12 bytes)
Ken Burns wins the lifetime achievement award in 2018. The chrisophers.org site is very difficult to reference as the URLs are reused but for now the 2018 awards are at this generic path. (+109 bytes
kaffir boy won the christopher award (as noted on its page) in 1987 , difficult to find sources for the exact year though it's reported widely 1986/7. (+283 bytes)
Update content regarding the smiths and how they helped Mark, the book puts emphasis on comic books in this case. The phrase "liberal whites" is also used in the book to describe families such as the
nonmembers is non-members (+1 bytes)
Link to Second Class Citizen article and remove hyphen. Although generally this would be a compound adjective in this case it is a literal book title and neither the publisher's site (http://www.geor
initial page with sources (+3007 bytes)
No edit summary (-5 bytes)
No edit summary (-66 bytes)
No edit summary (+357 bytes)
No edit summary (+428 bytes)
No edit summary (-30 bytes)
No edit summary (-2005 bytes)
No edit summary (-1623 bytes)
No edit summary (-29 bytes)
[[WP:AES|←]]Created page with '{{Refimprove|date=May 2013}} {{infobox book | <!-- See [[Wikipedia:WikiProject Novels]] or [[Wikipedia:WikiProject Books]] --> | name = The Bride Price...' (+59
add chasemp for subscription (+62 bytes)
Update creation timeline to eighteen years per /wiki/Wikipedia (+1 bytes)
this closed https://www.bizjournals.com/kansascity/news/2018/03/15/toys-r-us-lees-summit-distribution-center-closing.html (-44 bytes)
initial article with references (+1649 bytes)
Add update that suelo is now using money in some capacity as detailed in Tedx talk (+294 bytes)
[[WP:AES|←]]Created page with 'importScript('User:Numbermaniac/goToTop.js'); // [[User:Numbermaniac/goToTop.js]]' (+81 bytes)
These terms have become synonymous but at the moment "ignite talk" is hard to find. (+28 bytes)
Note lighting talks are often referred to now as just "ignite talks" and add ignite karaoke with reference (+416 bytes)
[[WP:AES|←]]Created page with '{{User sandbox}} <!-- EDIT BELOW THIS LINE --> Netfilter represents a set of [[hooking|hooks]] inside the Linux kernel, allowing specific [[kernel module]]s to...' (+62
Wikimedia Foundation | Operations Engineer (Cloud Services) | SF | Remote I am an engineer with the team. We run a niche hosting operation directed at the Wikimedia community tooling and ecosystem. We
No edit summary (+240 bytes)
Make 'bestseller' plural -- https://en.wiktionary.org/wiki/bestsellers#English (+1 bytes)
Grammer update (+4 bytes)
[[WP:AES|←]]Created page with 'All edits and work done with this account are my personal views and efforts. I'm trying to figure this out so please be gentle :)' (+130 bytes)
/* Notable people */ (+41 bytes)