An in-depth look at the relationship between Donald Trump and Vladimir Putin. This bit has been making the rounds on Twitter:
In 2008, according to “Dark Territory,” a history of cyberwar by Fred Kaplan, Russian hackers accomplished a feat that Pentagon officials considered almost impossible: breaching a classified network that wasn’t even connected to the public Internet. Apparently, Russian spies had supplied cheap thumb drives, stocked with viruses, to retail kiosks near NATO headquarters in Kabul, betting, correctly, that a U.S. serviceman or woman would buy one and insert it into a secure computer. In the past decade, cyber tactics have become an essential component of Russia’s efforts to exert influence over its neighbors.
A proposed style guide for Python, not quite as specific as PEP8, but dealing with some things that PEP8 doesn’t.
I agree with most of this, but this one in particular stood out to me because it echoes what I said in my first impressions of Clojure:
No one wins any points for shortening “response” to “rsp”.
(Via Python Bytes, episode #14)
Because I’m the world’s worst instagrammer, this is my illustration of a lovely holiday in Thailand: the gathering of a legion of birds in wires, creating an absolute cacophony. (The sound doesn’t come through so well with the traffic noise, but it was deafening.)
It really was a lovely trip, though.