Peter says…
Happy Birthday Uncle Robert!
The Original Family Social Network
Happy Birthday Uncle Robert!
Did you know the moonwalk was invented on your birthday?! Or wait was it something to do…
When we were in Brooklyn a few weeks ago, we noticed that the most interesting…
We finished our week in Brooklyn visiting more wonderful friends that we don’t get to…
We are on our annual summer visit to Brooklyn this week, and as is the…
The meeting of the cousins is now called to order… so happy to have so…
Happy Father’s Day, Pops!
From CBC’s Spark radio show: There are lots of reasons you can find yourself offline: a natural disaster, government censorship, or simply a flaky ISP. Nathan Freitas researches alternative network technologies, and he knows first-hand what it’s like to not have internet access — he was in New York City during 911 and for the major […]
(Originally, posted on Medium and Fold, but here since this is my *real* blog after all, and if the Internet went down, I still will have my local blog archive, and can run a teeny tiny WordPress server on my own computer, local network and/or $9 computer). This last Friday and Saturday, a group of tool […]
Here’s a picture of Eliza and her beloved teacher, Mary, at school this morning. Happy…
Here’s my top 10 reasons why Rhinobird.tv eats Meerkat for lunch… (not to mention clouds up Periscope too…) Read on, or watch the archive of my live reading of this here: https://beta.rhinobird.tv/stream/551572394e6fa46608b9307f/ or download the WEBM here: https://s3.amazonaws.com/media-rhinobird.tv/709798245457932400.webm Here’s my top 10 reasons about why Rhinobird eats Meerkat for lunch… (not to mention clouds up Periscope too…) Read […]
While May First/People Link has always advocated the use of Free and Open Source Software, we aren’t…
First Look has broken news about a CIA program to target Apple’s XCode toolchain, that is required to develop native MacOS and iOS apps: https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/ The result of the attack, if successful, is that the compiled binary you send to your end-users contains a backdoor, without the original source code or encryption you might use ever needing […]
Ooooopppsss! As several members have emailed me pointing out, we left an important part of a word…
Hey everyone! Well…we did it! Not that we’re finished struggling. We’re just starting in fact but at…