Coding Horror: Maximizing The Value of Your Keystrokes

[http://www.codinghorror.com/blog/archives/000854.html]
Coding Horror: Maximizing The Value of Your Keystrokes

May 03, 2007


Maximizing The Value of Your Keystrokes

I met Jon Udell this year at MIX. I was reading through his excellent blog to flesh out some of the topics we talked about, when I was struck by the powerful message of this particular entry:

When people tell me they're too busy to blog, I ask them to count up their output of keystrokes. How many of those keystrokes flow into email messages? Most. How many people receive those email messages? Few. How many people could usefully benefit from those messages, now or later? More than a few, maybe a lot more. From this perspective, blogging is a communication pattern that optimizes for the amount of awareness and influence that each keystroke can possibly yield. Some topics, of course, are necessarily private and interpersonal. But a surprising amount of business communication is potentially broader in scope. If your choice is to invest keystrokes in an email to three people, or in a blog entry that could be read by those same three people plus more — maybe many more — why not choose the latter? Why not make each keystroke work as hard as it can? hands blurred, typing on a keyboard [converting an email to a blog entry] can have powerful network effects. To exploit them, you have to realize that the delivery of a message, and the notification of delivery, do not necessarily coincide. Most of the time, in email, they do. The message is both notification and payload. But a message can also notify and point to a payload which is available to the recipient but also to other people and processes in other contexts. That arrangement costs hardly any extra keystrokes, and hardly any extra time. But it's an optimization that can radically expand influence and awareness.

I covered similar ground in When In Doubt, Make It Public, but Jon's entry is even more compelling. It's a specific example of how you can adapt your behavior to have a much broader impact. What Jon's describing happens to me all the time. I'll be in the middle of composing an email when I suddenly realize that there's no reason to silo this information in a private email exchange. I convert that email into a blog entry. Now, anyone who is interested in the topic can find it and have a public conversation with me– and everyone else– about it. The next time you find yourself typing more than a few sentences on your keyboard, stop and ask: are you maximizing the value of your keystrokes?

Coding Horror: When In Doubt, Make It Public

[http://www.codinghorror.com/blog/archives/000840.html]
Coding Horror: When In Doubt, Make It Public


When In Doubt, Make It Public

Marc Hedlund offered some unique advice to web entrepreneurs last month:

One of my favorite business model suggestions for [web] entrepreneurs is to find an old UNIX command that hasn't yet been implemented on the web, and fix that.

To illustrate, Marc provides a list of UNIX commands with their corresponding web implementations:

talk, finger ICQ
LISTSERV DejaNews
ls Yahoo! directory
find, grep Google
rn Bloglines
pine Google Mail
mount Amazon S3
bash Yahoo! Pipes
wall Twitter

Jason Kottke noted that most successful "new" business models on the web aren't new at all — they're simply taking what was once private and making it public and permanent :

Blogger = public email messages. (1999) Instead of "Dear Bob, Check out this movie." it's "Dear People I May or May Not Know Who Are Interested in Film Noir, check out this movie. If you like it, maybe we can be friends." Flickr = public photo sharing. (2004) Flickr co-founder Caterina Fake said in a recent interview: "When we started the company, there were dozens of other photosharing companies such as Shutterfly, but on those sites there was no such thing as a public photograph — it didn't even exist as a concept — so the idea of something 'public' changed the whole idea of Flickr." YouTube = public home videos. (2005) Bob Saget was onto something. Twitter = public IM. (2006) I don't think it's any coincidence that one of the people responsible for Blogger is also responsible for Twitter.

But you don't have to found a new Web 2.0 company to benefit from the power of public information. Even brick and mortar companies are finally realizing that the age-old principle of "secret by default" may not be the best policy today :

Companies used to assume that details about their internal workings were valuable precisely because they were secret. If you were cagey about your plans, you had the upper hand; if you kept your next big idea to yourself, people couldn't steal it. Now, billion- dollar ideas come to CEOs who give them away; corporations that publicize their failings grow stronger. Power comes not from your Rolodex but from how many bloggers link to you – and everyone trembles before search engine rankings.

Power, it seems, comes from public information. Secrets are only a source of powerlessness. Just ask Brad Abrams, who poses this rhetorical question :

If no one knows you did X, did you really get all the benefits for doing X?

I think Brad is being a bit too cautious here. I'll go one step further. Until you've..

  • Written a blog entry about X
  • Posted Flickr photos of X
  • Uploaded a video of X to YouTube
  • Typed a Twitter message about X

.. did X really happen at all? This is not to say we should fill the world with noise on every mundane aspect of our existence. But who decides what is mundane? Who decides what is interesting? Everything's interesting to someone, even if that someone is only you and a few other people in the world. It's my firm belief that the inclusionists are winning. We live in a world of infinitely searchable micro-content, and every contribution, however small, enriches all of us. But more selfishly, if you're interested in deriving maximum benefit from your work, there's no substitute for making it public and findable. Obscurity sucks. But obscurity by choice is irrational. When in doubt, make it public.

How To Make a Plastic Bag Keeper

[http://www.curbly.com/DIY-Maven/posts/1315-How-To-Make-a-Plastic-Bag-Keeper]

How To Make a Plastic Bag Keeper » Curbly | DIY Design Community « Keywords: Reduce, Reuse, recycle, plastic

How To Make a Plastic Bag Keeper

In an effort to reduce and reuse plastic bags, how about making a plastic bag keeper? Chances are you already have everything you need to make one for free. Or you can buy one at The Container Store for 4.99 plus 6.50 s & h. Your choice.The Props A 2 quart plastic bottle (I used a Juicy Juice bottle, which worked particularly well.)Box cutter and/or scissorsSharpieDurable tape Excess plastic bagsThe Procedure Mark your bottle on top and bottom as shown. Use box cutter to punch hole in marked areas and then switch to the scissors to cut out openings. (Using a scissors will greatly reduce the odds of cutting off one of your fingers.)Apply tape around openings, if plastic edges are sharp. Punch or drill a hole in the bottle's cap and add twine to hang, if desired. As you get them, shove bags in the top hole; as you need them, pull them out of the bottom hole. (I fit 15 medium-sized bags in my bottle.) Having the plastic bags at hand–my keeper will be hanging by my back door–should encourage reusing them. Plus, they look a lot neater packed in that bottle.

不使用backtick处理参数

  backtick, the grave accent ( ` ) is a diacritic mark [wikipeida]。
  如果使用backtick,那么在unix shell中,可以方便地用’cat ini_file.ini’把配置文件中的内容取出,对于配置文件只有一行的情况。如果配置文件有多行,也可以使用shell工具取出某行的数据。
  放弃backtick方案。 仍使用GUI部分从配置文件读入参数,再作为批处理的命令行参数。配置文件准备使用多个,每个参数一个文件,方便使用fstream读入,避免使用windows api。
放弃backtick方案的原因如下。
  需要重写所用已用批处理实现的场景 ;

已经与袁福宇一起测试了可行性。
1.在shell中的使用方法。不是原文引用,可能有错。
  >test.exe -para `cat device_name.txt`
等同于执行
  >test.exe -para .EmeterDevice0
其中,'.EmeterDevice0'是device_name.txt的内容。
需要注意当前目录、配置文件目录。

2.在shell之外,由GUI调用的方法。
----引用开始
d:msys1.0bin>sh
sh-2.04$ exit
exit

d:msys1.0bin>sh test.sh
ok

d:msys1.0bin>cat test.sh
echo ok
d:msys1.0bin>
----引用结束

备忘,免得哪天又把这个方案想起来,然后再花上大半天否定它。

学习郭安定的EXCEL课件

郭安定:Excel 实用基础教程
[http://wstatic.xunlei.com/content/5941A95C4A529804C899E83649FD5E6CBCB454A4.html]
---------------
技巧和值得关注的知识点:附加到开始菜单安全模式启动excel打开:只读打开,打开并修复名称框用于选择单元格增加缩进量滚动条高度:标签字号新工作簿中工作表数量工作表标签颜色工作表快速切换:鼠标右键强制换行ALT + Enter有步长的自动填充:选定两个单元格,或步长值(edit->fill->series)整列移动:选定列->shift+移动选到最右:ctrl+shift+右选定范围显示比例:view->zoom->fit selection冻结窗格:window->freeze window转置:选择性粘贴自定义格式:分类->自定义->类型(域)
自定义格式:0 “辆”工作组:ctrl/shift,使用相同的head样式斜线:Alt+鼠标,或者单元格格式
先设置颜色,后涂,如同使用画笔自动调整列宽:选中整表->双击网格线(或拖动)跨列居中:单元格格式双击格式刷取消隐藏:先选中整个工作表
工作表也可以隐藏数据有效性的出错和提示信息列表,用逗号分开数据有效性->对同样设置的所有单元格应用这些更改审核有效性查找特定格式:定位查找时,根据单元格选定格式~*,避免通配按行排序筛选不重复的记录状态栏中的函数绝对引用,用钱($)固定
选中引用->用F4名称框,以提高公式的可读性快速调试公式:F9参数过多的处理:用双括号粘贴链接:内部引用,远程引用,外部引用,立体引用追踪引用:来龙,去脉页眉、页脚顶端标题行、左端标题列 重复:页面设置->工作表ctrl+shift+*:选定大纲级别:alt+shift+右
重复上次:选中->用F4
显示/隐藏大纲:ctrl+8模板的分类:新建文件夹模板的位置:在word中设置
工作组模板
-------------------
未讲到的知识点,可能会在高级班中提及:
分类汇总
透视表
----------------
授课技巧:
1.先需求、场景,后知识点
2.视频不录制教师,只录制屏幕
3.慢语速
4.任务栏右侧,演示者广告
5.先参数,后函数名
6.每个视频文件都较小(3分钟到小于10分钟),适于下载和学习。也利于失误后的重录、教学内容的组织
7.好麦克风,好嗓音,吐字清楚
8.菜单字体,toolbar大图标

缺欠:
1.使用英文术语,而且没有解释
2.不标准发音,如”英数”发音为”音数”,”括号”发音为”刮号”,”粘贴”发音为”年贴”
3.吞音,不完全爆破
4.”coū”,嘬牙的声音
5.台湾词汇,如”网路”

与一般教学的对比:
1.不以考试为目的,不强调知识点
2.突出小技巧和实用性
3.不强调基本概念,如单元格、行、列。
=================
OIIO – Excel 实用基础班OIIO – Excel 实用基础班�0 基本准备工作
9,236,351 0-1 软件基本功能概说.wmv
7,341,511 0-2 软件环境界面说明.wmv
4,775,259 0-3 解决软件运行问题.wmv
5,922,909 0-4 挽救现有损坏文件.wmv
4,664,993 0-5 设定菜单全部显示.wmv
3,047,675 0-6 设定R1C1表示方式.wmv
8,959,511 0-7 调整单元格的字体.wmv
3,873,795 0-8 调整工作表的字体.wmv
5,409,277 0-9 设定默认工作表数.wmvOIIO – Excel 实用基础班�1 基本编辑录入
4,967,281 1-1 单元格的新增编辑.wmv
4,129,467 1-2 正确数据录入技巧.wmv
6,467,861 1-3 自动填充设定技巧.wmv
6,166,849 1-4 数据的复制与搬移.wmv
6,074,217 1-5 选定范围显示比例.wmv
16,505,291 1-6 拆分冻结编辑窗格.wmv
9,968,575 1-7 清除数据加入批注.wmv
1,712,887 1-8 行列数据快速转置.wmv
4,934,087 1-9 录入当天日期时间.wmvOIIO – Excel 实用基础班�2 格式设定技巧
13,243,047 2-1 设置单元格的格式.wmv
11,082,833 2-2 字型大小色彩样式.wmv
6,121,145 2-3 边框及斜线的设定.wmv
6,971,475 2-4 跨栏居中对齐设定.wmv
3,814,093 2-5 设定自动套用格式.wmv
3,156,947 2-6 格式复制形态设定.wmv
8,269,181 2-7 单元格的条件格式.wmv
6,882,959 2-8 工作表的相关设定.wmvOIIO – Excel 实用基础班�3 数据录入检查
4,276,719 3-1 限制数据的有效性.wmv
6,300,213 3-2 设定日期时间限制.wmv
2,859,813 3-3 设定序列下拉箭头.wmv
5,312,457 3-4 设定文本长度限制.wmv
5,874,167 3-5 设定出错提示信息.wmv
3,834,531 3-6 应用同样设置变更.wmv
4,266,383 3-7 审核出错数据录入.wmv
1,160,497 3-8 简繁文本批量转换.wmvOIIO – Excel 实用基础班�4 查找替换数据
8,945,453 4-1 查找特定数据内容.wmv
7,966,499 4-2 查找特定格式设置.wmv
8,362,175 4-3 近似文本查找替换.wmv
6,659,463 4-4 特殊定位查找功能.wmv
8,403,869 4-5 行列内容定位差异.wmvOIIO – Excel 实用基础班�5 排序筛选数据
8,707,433 5-1 简单基本排序功能.wmv
3,801,109 5-2 筛选不重复的数据.wmv
10,252,563 5-3 自定义排序的设置.wmv
7,021,579 5-4 自动筛选数据显示.wmv
5,352,201 5-5 多条件筛选的设定.wmvOIIO – Excel 实用基础班�6 计算公式设定
8,794,919 6-1 设定函数的表达式.wmv
11,127,195 6-2 插入各种函数设定.wmv
8,706,553 6-3 绝对相对位置引用.wmv
4,626,503 6-4 名称的定义与应用.wmv
1,600,345 6-5 快速公式调试提示.wmv
1,899,199 6-6 突破参数太多限制.wmv
6,651,303 6-7 参照概念基本操作.wmv
5,307,909 6-8 追踪公式从属引用.wmv
6,927,933 6-9 管理文件链接更新.wmvOIIO – Excel 实用基础班�7 图表打印功能
8,392,557 7-1 工作表的基本打印.wmv
7,508,367 7-2 切换分页预览视图.wmv
8,596,695 7-3 图形化页眉的设定.wmv
16,239,943 7-4 工作表的打印设置.wmv
2,274,525 7-5 图形数据分开打印.wmv
6,380,669 7-6 打印长条类型数据.wmv
5,816,125 7-7 避免打印特定行号.wmvOIIO – Excel 实用基础班�8 文件管理作业
9,822,423 8-1 将文件保存为模版.wmv
11,177,009 8-2 设定工作组的模版.wmv
6,048,345 8-3 下载网络免费模版.wmv
11,137,003 8-4 设定文件保护密码.wmv
4,652,177 8-5 保留文件最近备份.wmv

长知识啊

1.万象峰年先生教我:自怨自艾的读音是这样的。
查了一下,没有我读的aì这样的发音。
备忘一下,免得以后忘了。
  词目 自怨自艾
  发音 zì yuàn zì yì
  释义 怨:怨恨,悔恨;艾:割草,比喻改正错误。原意是悔恨自己的错误,自己改正。     现在只指悔恨自己的错误。
  出处 《孟子・万章上》:”太甲悔过,自怨自艾。”
  示例 但倘有不知道自怨自艾的人,想将这位先生”送进疯人院”去,我可要拚命反对,尽力     呼冤的。(鲁迅《集外集・”音乐”》)
2.讲计算机应用基础的时候,全班同学一起纠正我的发音,
media,应读作 米迭,而不是 买碟。不学无术啊,一次次被发现。注:对于1,也有不同观点。
--引文开始
“自怨自艾(ai)”应该没有错
《汉语大词典》第9卷第270页把自怨自艾的”艾”发音标注为“ai”
艾1 [ài ㄞˋ]
艾2 [yì ㄧˋ]
【艾怨】《孟子·万章上》:“ 太甲 顛覆 湯 之典刑, 伊尹 放之於 桐 ,三年, 太甲 悔過,自怨自艾,於 桐 處仁遷義。”言 太甲怨恨自己的错误,并加以改正。后以“艾怨”谓埋怨,悔恨。 张洁 《沉重的翅膀》十二:“ 万群 知道她应该不带任何感情色彩和 方文煊讲话,但,她由得了自己么?生硬和冰冷后面,是 方文煊 几乎可以触摸到的浓烈的艾怨。”
注意”艾”后面没有数字2的都读“ai”,读yi的都标成“艾2”

商务印书馆的《现代汉语词典》1670页明确标明是ziyuanziyi,《新华成语词典》977页明确表示“艾,不读ai4。”《新华字典》550页,对yi的解释是治理,第2页ai但解释是“1、艾草,2止,如方兴未艾”。
--引文结束

[电脑游戏] 美华裔高中生自制CS地图被捕

[电脑游戏] 美华裔高中生自制CS地图被捕
from 水木社区 游戏天地区十大热门话题 by lowy
发信人: lowy (礼义廉耻忍耐克己百折不屈), 信区: Game
标 题: 美华裔高中生自制CS地图被捕
发信站: 水木社区 (Fri May 4 09:47:41 2007), 站内
  德州班德堡克莱蒙特高中一名华裔高中生躲在家中,以自己的校园为蓝本自制CS地图并上传至某服务器和同学对战,结果这种"校园枪战"游戏被两名家长发现,随即向班德堡独立校区警署(FBISD)报警,警察前往这名华裔学生家中将他带走并搜查了他的卧室。  此事发生在弗州理工枪杀案之后的敏感时期,警方接报后不敢怠慢,但起初只在那名学生的卧室里发现一把锤子,据称是用来校正床铺的,因为那张床睡起来不太舒服。  终于,FBISD不负众望,在五月一日又宣布说找到了五把剑,看似好像一个冷兵器版的赵承熙就此诞生,全然不顾那些剑有可能仅是装饰用品。  最后官方将此事件定义为"三级"事态,意即导致一个涉及恐怖袭击或炸弹威胁的虚假警报。虽然警方并未就某项罪名对那名华裔学生提出指控,但他已被克莱蒙特高中除名且被转入M.R.
Wood再教育中心,不能和他的同学一起毕业了,这一切仅仅是因为一张自制的CS地图。–※ 来源:・水木社区 newsmth.net・[FROM: 125.121.221.*]–

转发

  老婆不常用机器,要求我替她收邮件。试了一下GOOGLE的邮件转发。
log:
1.转发目的设置错了.转发时在老婆的信箱里有未送达通知.
2.修改目的地址,用目的地址给老婆发信,邮件未转发.
3.用我的另一个信箱,不是目的地址的给老婆发信,邮件转发到目的地址.
  似乎不能目的地址和发信人不能相同?
4.在目的地址设置过滤器,把所有to老婆的信转到一个label里.

重剑无锋,大巧不工。

实现一个愿望

  前天吧,与老婆从第一MALL电影院回,一路吃一路聊一路晒太阳。
  路过伊通河,当年发现时尚未完工的小公园,桃花盛开,青草才发芽。还有长凳,躺了一会,看看久违的蓝天。
  那天有个愿望,
   绿蚁新醅酒,红泥小火炉。
   晚来天欲雪,能饮一杯无?
  没想到,今天就实现了。跟老婆说,以为要几年以后才能实现呐。美好美好。
  约2174.15m,一条新的行走路线,单程。

重剑无锋,大巧不工。