There's no reason you would ever need to rig up an NES to run Netflix. Which is why it's so great that these two delightfully insane Netflix engineers did it for us. Because at long last, we can finally see the House of Cards intro in all the horrific, 8-bit glory absolutely no one ever intended.

Ever wonder what exactly is inside a font? We know it contains letters — or actually, drawings of letters, but what else is in there? Well, why not crack one open and see, and while we’re there, find a way to make this world a little less buzzwordy?

This web app lets you upload a favorite MP3 and will then generate a never-ending and ever changing version of the song. Infinite Jukebox uses the Echo Nest analyzer to break the song into beats. It plays the song beat by beat, but at every beat there's a chance that it will jump to a different part of song that happens to sound very similar to the current beat. For beat similarity the uses pitch, timbre, loudness, duration and the position of the beat within a bar. There's a nifty visualization that shows all the possible transitions that can occur at any beat. Built at Music Hack Day Boston 2012.

The Lego calendar is a wall mounted time planner made entirely of Lego. Take a photo of it with a smartphone all of the events and timings will be magically synchronised to an online, digital calendar. It makes the most of the tangibility of physical objects, and the ubiquity of digital platforms.

Our USB Typewriter circuitry can transform your old manual typewriter into a retro-futuristic marvel. Use a gorgeous vintage typewriter as the computer keyboard for your Mac or PC, or type with ink-on-paper while electronically recording your keystrokes! The USB Typewriter also makes an outstanding keyboard dock for your iPad or tablet PC.

Dishwasher cooking is best for foods that need to be cooked at low temperatures, Casali says. "After some experiments, I found that it wasn't just a different way to cook — it was a really particular technique," she says. "Something I was looking for years: the way to cook at low temperature at home." § Unfortunately, Casali's book appears to be available only in Italian. But the innovative chef has put together a few how-to on Vimeo, with English subtitles, describing top recipes.

I'm bored. Let's build an entire programming environment around Brainfuck. [...] Why do any of this? Because it's fun, duh. Because re-inventing something is the best way to learn about that something. Also because I don't feel like making websites right now. Stay tuned for more updates.

The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.

Programmer and CMU PhD Tom Murphy created a function to “beat” NES games by watching the score. When the computer did things that raised the score it would learn how to reproduce them again and again, resulting, ultimately, in what amounts to a Super Mario Brothers-playing robot. The program, called a “technique for automating NES games,” can take on nearly every NES game, but it doesn’t always win. [Pretty cool. Reminds me of when I hex-edited saved games in Snake in the 1980s to simulate playing the game "perfectly".]

HTTP already has its own authentication system, and there are hundreds — perhaps thousands — of tools that know how to work with it. Wouldn’t it be great if there was a way to use that in our own scripts, but have something communicate with the services using OAuth behind the scenes? Thus, foauth.org was born.

Rather than try to build a bunch of bells and whistles and make everything really complicated, we focused on just one task: taking OAuth out of the equation when accessing your own data. So, unlike Apigee, we’re not monitoring your API usage or promising any statistics or anything like that. Our goal is to help you login with OAuth-compliant services using HTTP Basic authentication. That’s it.

1–10 (50)   Next >   Last >|