Coding Horror: Maximizing The Value of Your Keystrokes

Coding Horror: Maximizing The Value of Your Keystrokes

May 03, 2007

Maximizing The Value of Your Keystrokes

I met Jon Udell this year at MIX. I was reading through his excellent blog to flesh out some of the topics we talked about, when I was struck by the powerful message of this particular entry:

When people tell me they're too busy to blog, I ask them to count up their output of keystrokes. How many of those keystrokes flow into email messages? Most. How many people receive those email messages? Few. How many people could usefully benefit from those messages, now or later? More than a few, maybe a lot more. From this perspective, blogging is a communication pattern that optimizes for the amount of awareness and influence that each keystroke can possibly yield. Some topics, of course, are necessarily private and interpersonal. But a surprising amount of business communication is potentially broader in scope. If your choice is to invest keystrokes in an email to three people, or in a blog entry that could be read by those same three people plus more — maybe many more — why not choose the latter? Why not make each keystroke work as hard as it can? hands blurred, typing on a keyboard [converting an email to a blog entry] can have powerful network effects. To exploit them, you have to realize that the delivery of a message, and the notification of delivery, do not necessarily coincide. Most of the time, in email, they do. The message is both notification and payload. But a message can also notify and point to a payload which is available to the recipient but also to other people and processes in other contexts. That arrangement costs hardly any extra keystrokes, and hardly any extra time. But it's an optimization that can radically expand influence and awareness.

I covered similar ground in When In Doubt, Make It Public, but Jon's entry is even more compelling. It's a specific example of how you can adapt your behavior to have a much broader impact. What Jon's describing happens to me all the time. I'll be in the middle of composing an email when I suddenly realize that there's no reason to silo this information in a private email exchange. I convert that email into a blog entry. Now, anyone who is interested in the topic can find it and have a public conversation with me– and everyone else– about it. The next time you find yourself typing more than a few sentences on your keyboard, stop and ask: are you maximizing the value of your keystrokes?

Coding Horror: When In Doubt, Make It Public

Coding Horror: When In Doubt, Make It Public

When In Doubt, Make It Public

Marc Hedlund offered some unique advice to web entrepreneurs last month:

One of my favorite business model suggestions for [web] entrepreneurs is to find an old UNIX command that hasn't yet been implemented on the web, and fix that.

To illustrate, Marc provides a list of UNIX commands with their corresponding web implementations:

talk, finger ICQ
ls Yahoo! directory
find, grep Google
rn Bloglines
pine Google Mail
mount Amazon S3
bash Yahoo! Pipes
wall Twitter

Jason Kottke noted that most successful "new" business models on the web aren't new at all — they're simply taking what was once private and making it public and permanent :

Blogger = public email messages. (1999) Instead of "Dear Bob, Check out this movie." it's "Dear People I May or May Not Know Who Are Interested in Film Noir, check out this movie. If you like it, maybe we can be friends." Flickr = public photo sharing. (2004) Flickr co-founder Caterina Fake said in a recent interview: "When we started the company, there were dozens of other photosharing companies such as Shutterfly, but on those sites there was no such thing as a public photograph — it didn't even exist as a concept — so the idea of something 'public' changed the whole idea of Flickr." YouTube = public home videos. (2005) Bob Saget was onto something. Twitter = public IM. (2006) I don't think it's any coincidence that one of the people responsible for Blogger is also responsible for Twitter.

But you don't have to found a new Web 2.0 company to benefit from the power of public information. Even brick and mortar companies are finally realizing that the age-old principle of "secret by default" may not be the best policy today :

Companies used to assume that details about their internal workings were valuable precisely because they were secret. If you were cagey about your plans, you had the upper hand; if you kept your next big idea to yourself, people couldn't steal it. Now, billion- dollar ideas come to CEOs who give them away; corporations that publicize their failings grow stronger. Power comes not from your Rolodex but from how many bloggers link to you – and everyone trembles before search engine rankings.

Power, it seems, comes from public information. Secrets are only a source of powerlessness. Just ask Brad Abrams, who poses this rhetorical question :

If no one knows you did X, did you really get all the benefits for doing X?

I think Brad is being a bit too cautious here. I'll go one step further. Until you've..

  • Written a blog entry about X
  • Posted Flickr photos of X
  • Uploaded a video of X to YouTube
  • Typed a Twitter message about X

.. did X really happen at all? This is not to say we should fill the world with noise on every mundane aspect of our existence. But who decides what is mundane? Who decides what is interesting? Everything's interesting to someone, even if that someone is only you and a few other people in the world. It's my firm belief that the inclusionists are winning. We live in a world of infinitely searchable micro-content, and every contribution, however small, enriches all of us. But more selfishly, if you're interested in deriving maximum benefit from your work, there's no substitute for making it public and findable. Obscurity sucks. But obscurity by choice is irrational. When in doubt, make it public.

How To Make a Plastic Bag Keeper


How To Make a Plastic Bag Keeper » Curbly | DIY Design Community « Keywords: Reduce, Reuse, recycle, plastic

How To Make a Plastic Bag Keeper

In an effort to reduce and reuse plastic bags, how about making a plastic bag keeper? Chances are you already have everything you need to make one for free. Or you can buy one at The Container Store for 4.99 plus 6.50 s & h. Your choice.The Props A 2 quart plastic bottle (I used a Juicy Juice bottle, which worked particularly well.)Box cutter and/or scissorsSharpieDurable tape Excess plastic bagsThe Procedure Mark your bottle on top and bottom as shown. Use box cutter to punch hole in marked areas and then switch to the scissors to cut out openings. (Using a scissors will greatly reduce the odds of cutting off one of your fingers.)Apply tape around openings, if plastic edges are sharp. Punch or drill a hole in the bottle's cap and add twine to hang, if desired. As you get them, shove bags in the top hole; as you need them, pull them out of the bottom hole. (I fit 15 medium-sized bags in my bottle.) Having the plastic bags at hand–my keeper will be hanging by my back door–should encourage reusing them. Plus, they look a lot neater packed in that bottle.


  backtick, the grave accent ( ` ) is a diacritic mark [wikipeida]。
  如果使用backtick,那么在unix shell中,可以方便地用’cat ini_file.ini’把配置文件中的内容取出,对于配置文件只有一行的情况。如果配置文件有多行,也可以使用shell工具取出某行的数据。
  放弃backtick方案。 仍使用GUI部分从配置文件读入参数,再作为批处理的命令行参数。配置文件准备使用多个,每个参数一个文件,方便使用fstream读入,避免使用windows api。
  需要重写所用已用批处理实现的场景 ;

  >test.exe -para `cat device_name.txt`
  >test.exe -para .EmeterDevice0

sh-2.04$ exit


echo ok



郭安定:Excel 实用基础教程
技巧和值得关注的知识点:附加到开始菜单安全模式启动excel打开:只读打开,打开并修复名称框用于选择单元格增加缩进量滚动条高度:标签字号新工作簿中工作表数量工作表标签颜色工作表快速切换:鼠标右键强制换行ALT + Enter有步长的自动填充:选定两个单元格,或步长值(edit->fill->series)整列移动:选定列->shift+移动选到最右:ctrl+shift+右选定范围显示比例:view->zoom->fit selection冻结窗格:window->freeze window转置:选择性粘贴自定义格式:分类->自定义->类型(域)
自定义格式:0 “辆”工作组:ctrl/shift,使用相同的head样式斜线:Alt+鼠标,或者单元格格式
选中引用->用F4名称框,以提高公式的可读性快速调试公式:F9参数过多的处理:用双括号粘贴链接:内部引用,远程引用,外部引用,立体引用追踪引用:来龙,去脉页眉、页脚顶端标题行、左端标题列 重复:页面设置->工作表ctrl+shift+*:选定大纲级别:alt+shift+右


OIIO – Excel 实用基础班OIIO – Excel 实用基础班�0 基本准备工作
9,236,351 0-1 软件基本功能概说.wmv
7,341,511 0-2 软件环境界面说明.wmv
4,775,259 0-3 解决软件运行问题.wmv
5,922,909 0-4 挽救现有损坏文件.wmv
4,664,993 0-5 设定菜单全部显示.wmv
3,047,675 0-6 设定R1C1表示方式.wmv
8,959,511 0-7 调整单元格的字体.wmv
3,873,795 0-8 调整工作表的字体.wmv
5,409,277 0-9 设定默认工作表数.wmvOIIO – Excel 实用基础班�1 基本编辑录入
4,967,281 1-1 单元格的新增编辑.wmv
4,129,467 1-2 正确数据录入技巧.wmv
6,467,861 1-3 自动填充设定技巧.wmv
6,166,849 1-4 数据的复制与搬移.wmv
6,074,217 1-5 选定范围显示比例.wmv
16,505,291 1-6 拆分冻结编辑窗格.wmv
9,968,575 1-7 清除数据加入批注.wmv
1,712,887 1-8 行列数据快速转置.wmv
4,934,087 1-9 录入当天日期时间.wmvOIIO – Excel 实用基础班�2 格式设定技巧
13,243,047 2-1 设置单元格的格式.wmv
11,082,833 2-2 字型大小色彩样式.wmv
6,121,145 2-3 边框及斜线的设定.wmv
6,971,475 2-4 跨栏居中对齐设定.wmv
3,814,093 2-5 设定自动套用格式.wmv
3,156,947 2-6 格式复制形态设定.wmv
8,269,181 2-7 单元格的条件格式.wmv
6,882,959 2-8 工作表的相关设定.wmvOIIO – Excel 实用基础班�3 数据录入检查
4,276,719 3-1 限制数据的有效性.wmv
6,300,213 3-2 设定日期时间限制.wmv
2,859,813 3-3 设定序列下拉箭头.wmv
5,312,457 3-4 设定文本长度限制.wmv
5,874,167 3-5 设定出错提示信息.wmv
3,834,531 3-6 应用同样设置变更.wmv
4,266,383 3-7 审核出错数据录入.wmv
1,160,497 3-8 简繁文本批量转换.wmvOIIO – Excel 实用基础班�4 查找替换数据
8,945,453 4-1 查找特定数据内容.wmv
7,966,499 4-2 查找特定格式设置.wmv
8,362,175 4-3 近似文本查找替换.wmv
6,659,463 4-4 特殊定位查找功能.wmv
8,403,869 4-5 行列内容定位差异.wmvOIIO – Excel 实用基础班�5 排序筛选数据
8,707,433 5-1 简单基本排序功能.wmv
3,801,109 5-2 筛选不重复的数据.wmv
10,252,563 5-3 自定义排序的设置.wmv
7,021,579 5-4 自动筛选数据显示.wmv
5,352,201 5-5 多条件筛选的设定.wmvOIIO – Excel 实用基础班�6 计算公式设定
8,794,919 6-1 设定函数的表达式.wmv
11,127,195 6-2 插入各种函数设定.wmv
8,706,553 6-3 绝对相对位置引用.wmv
4,626,503 6-4 名称的定义与应用.wmv
1,600,345 6-5 快速公式调试提示.wmv
1,899,199 6-6 突破参数太多限制.wmv
6,651,303 6-7 参照概念基本操作.wmv
5,307,909 6-8 追踪公式从属引用.wmv
6,927,933 6-9 管理文件链接更新.wmvOIIO – Excel 实用基础班�7 图表打印功能
8,392,557 7-1 工作表的基本打印.wmv
7,508,367 7-2 切换分页预览视图.wmv
8,596,695 7-3 图形化页眉的设定.wmv
16,239,943 7-4 工作表的打印设置.wmv
2,274,525 7-5 图形数据分开打印.wmv
6,380,669 7-6 打印长条类型数据.wmv
5,816,125 7-7 避免打印特定行号.wmvOIIO – Excel 实用基础班�8 文件管理作业
9,822,423 8-1 将文件保存为模版.wmv
11,177,009 8-2 设定工作组的模版.wmv
6,048,345 8-3 下载网络免费模版.wmv
11,137,003 8-4 设定文件保护密码.wmv
4,652,177 8-5 保留文件最近备份.wmv


  词目 自怨自艾
  发音 zì yuàn zì yì
  释义 怨:怨恨,悔恨;艾:割草,比喻改正错误。原意是悔恨自己的错误,自己改正。     现在只指悔恨自己的错误。
  出处 《孟子・万章上》:”太甲悔过,自怨自艾。”
  示例 但倘有不知道自怨自艾的人,想将这位先生”送进疯人院”去,我可要拚命反对,尽力     呼冤的。(鲁迅《集外集・”音乐”》)
media,应读作 米迭,而不是 买碟。不学无术啊,一次次被发现。注:对于1,也有不同观点。
艾1 [ài ㄞˋ]
艾2 [yì ㄧˋ]
【艾怨】《孟子·万章上》:“ 太甲 顛覆 湯 之典刑, 伊尹 放之於 桐 ,三年, 太甲 悔過,自怨自艾,於 桐 處仁遷義。”言 太甲怨恨自己的错误,并加以改正。后以“艾怨”谓埋怨,悔恨。 张洁 《沉重的翅膀》十二:“ 万群 知道她应该不带任何感情色彩和 方文煊讲话,但,她由得了自己么?生硬和冰冷后面,是 方文煊 几乎可以触摸到的浓烈的艾怨。”


[电脑游戏] 美华裔高中生自制CS地图被捕

[电脑游戏] 美华裔高中生自制CS地图被捕
from 水木社区 游戏天地区十大热门话题 by lowy
发信人: lowy (礼义廉耻忍耐克己百折不屈), 信区: Game
标 题: 美华裔高中生自制CS地图被捕
发信站: 水木社区 (Fri May 4 09:47:41 2007), 站内
  德州班德堡克莱蒙特高中一名华裔高中生躲在家中,以自己的校园为蓝本自制CS地图并上传至某服务器和同学对战,结果这种"校园枪战"游戏被两名家长发现,随即向班德堡独立校区警署(FBISD)报警,警察前往这名华裔学生家中将他带走并搜查了他的卧室。  此事发生在弗州理工枪杀案之后的敏感时期,警方接报后不敢怠慢,但起初只在那名学生的卧室里发现一把锤子,据称是用来校正床铺的,因为那张床睡起来不太舒服。  终于,FBISD不负众望,在五月一日又宣布说找到了五把剑,看似好像一个冷兵器版的赵承熙就此诞生,全然不顾那些剑有可能仅是装饰用品。  最后官方将此事件定义为"三级"事态,意即导致一个涉及恐怖袭击或炸弹威胁的虚假警报。虽然警方并未就某项罪名对那名华裔学生提出指控,但他已被克莱蒙特高中除名且被转入M.R.
Wood再教育中心,不能和他的同学一起毕业了,这一切仅仅是因为一张自制的CS地图。–※ 来源:・水木社区・[FROM: 125.121.221.*]–