Lessons on app marketing

Complete cold call but the story was right up his alley. He was interested but didn’t end up writing something. That happens — get over it! He did start reading the Tapity blog though (hint: in case you hadn’t noticed, the blog has been pretty key to my success). Journalists want good stories and if you become a fountain of noteworthy, thought provoking material, they will be all over you.

 

Source

9 Anti-Patterns Every Programmer Should Be Aware Of

Every once in a while we’d interrupt that to discuss the typography and the color of the cover. And after each discussion, we were asked to vote. I thought it would be most efficient to vote for the same color we had decided on in the meeting before, but it turned out I was always in the minority! We finally chose red. (It came out blue.)

— Richard Feynman, What Do You Care What Other People Think?

Source: 9 Anti-Patterns Every Programmer Should Be Aware Of

This Is Your Brain on Podcasts: Why Audio Storytelling Is So Addictive – The Atlantic

“Audio is one of the most intimate forms of media because you are constantly building your own images of the story in your mind and you’re creating your own production,” Rodero says. “And that of course, is something that you can never get with visual media.”

Source: This Is Your Brain on Podcasts: Why Audio Storytelling Is So Addictive – The Atlantic

JSONExport

Code Issues 1 Pull requests 0 Wiki Pulse Graphs SSH clone URL You can clone with HTTPS, SSH, or Subversion. Clone in Desktop Download ZIP JSONExport is a desktop application for Mac OS X which enables you to export JSON objects as model classes with their associated constructors, utility methods, setters and getters in your favorite language.

Source: Ahmed-Ali/JSONExport

Technical Note TN2232: HTTPS Server Trust Evaluation

If this trust evaluation fails, the client refuses to connect. This can happen for a variety of reasons, some benign—the server might be using a self-signed certificate, an intermediate certificate is missing, and so on—and some malicious—the server is an impostor, looking to steal the user’s data. This document describes the reasons why server trust evaluation can fail, and how this problem can be resolved while not compromising the user’s security.

Source: Technical Note TN2232: HTTPS Server Trust Evaluation