Jack Bates (@jablko) 's Twitter Profile
Jack Bates

@jablko

ID: 14900244

linkhttp://jdbates.blogspot.com/ calendar_today25-05-2008 17:18:48

901 Tweet

99 Followers

905 Following

Jeff Dean (@jeffdean) 's Twitter Profile Photo

In April, '17, James Somers of The New Yorker reached out & said he wanted to do a small profile of me & my longtime colleague Sanjay Ghemawat, watch us work for a few hours, maybe dinner, etc. It came out today. I think it captures our working style really well. newyorker.com/magazine/2018/…

Bartosz Milewski (@bartoszmilewski) 's Twitter Profile Photo

Today I was working with David Spivak and Brendan Fong on our new course, Programming with Categories. It will take place in January at MIT as part of IAP. We'll introduce categorical concepts and teach elements of Haskell to illustrate them. Yes, all 18 lectures will be recorded

瞬く🐈 Skebご依頼募集中🍎 (@bokoyai) 's Twitter Profile Photo

よく描く所なのに結構面倒な構造をしている大胸筋と肩の三角筋について簡単にまとめてみました。大胸筋と三角筋は仲良しで一緒に動くけど構造がわかりづらい。完璧とは言えませんが大体の構造を理解する上での参考にしていただければと思います。

よく描く所なのに結構面倒な構造をしている大胸筋と肩の三角筋について簡単にまとめてみました。大胸筋と三角筋は仲良しで一緒に動くけど構造がわかりづらい。完璧とは言えませんが大体の構造を理解する上での参考にしていただければと思います。
Jack Bates (@jablko) 's Twitter Profile Photo

I reimplemented this mashup of searching for The Debian Project packages and popularity contest results with join vs. grep and paste github.com/jablko/popcon/… Command Line Magic

David Toovey (@davidtoovey) 's Twitter Profile Photo

While you're staying home, explore Nyungwe National Park with guide and birder Claver Ntoyinkima. With almost 300 bird species and 1,000 plant species, discover what makes the park one of the most magnificent forests in the world. youtu.be/IfBH2tjcqkc

Jack Bates (@jablko) 's Twitter Profile Photo

Today I was surprised that perl -MData::Dumper -e 'print(Dumper([() && die]))' -> [undef] vs. [] b/c LHS is scalar perldoc.perl.org/perlop#C-style…

Jack Bates (@jablko) 's Twitter Profile Photo

I sure wish GitHub had a directory-level watch feature. This Stack Overflow question is the closest resource I found and I can't tell if any of the answers apply to social activity (PRs) or not stackoverflow.com/questions/9732…

Jack Bates (@jablko) 's Twitter Profile Photo

In the formula for ransomware journalism (targets, culprits, outrage) the weaknesses exploited are loudly absent? Are they technical, social engineering, ? Who is responsible for the vulnerability vs. the attack? If not in the media, where is this discussion happening? CBC News

Jack Bates (@jablko) 's Twitter Profile Photo

A: "There is ε risk of -∞ reward, for some nonzero ε" B: "I laugh in the face of your puny ε" Talking past each other

Jack Bates (@jablko) 's Twitter Profile Photo

archive.org/details/amazon… <- This was my favorite TV growing up! ❤️❤️❤️ Taped off PBS and watched I don't know how many times. Imagination still kindled by paddling through the canopy. Thanks National Geographic, Internet Archive, Michael Goulding, and William Shatner!