Stellar Web Links

Stellar Web Links

1128 bookmarks
Newest
Git from the inside out — Code Words
Git from the inside out — Code Words
This essay explains how Git works. It assumes you understand Git well enough to use it to version control your projects. The essay focuses on the graph structure that underpins Git and the way the properties of this graph dictate Git’s behavior. Looking at fundamentals, you build your mental model on the truth rather than on hypotheses constructed from evidence gathered while experimenting with the API.
·codewords.recurse.com·
Git from the inside out — Code Words
Trivium: Link Blog
Trivium: Link Blog
Welcome to Trivium, my new blog that aims to merge the best parts of a tumblelog and a “classic” blog full of editorial, essayish content (which is not that classic at all, but this will be the topic of a later post).
·leahneukirchen.org·
Trivium: Link Blog
The Basics of Legibility – A Short Guide for Non-Typographers
The Basics of Legibility – A Short Guide for Non-Typographers
The scope of this piece, therefore, cannot be to teach you everything there is to know about typography. It cannot even be to teach you everything there is to know about legibility. For that reason, I will concentrate mainly on the shapes of letters and how their design can be conducive – or detrimental – to legibility.
·nubero.ch·
The Basics of Legibility – A Short Guide for Non-Typographers
Glasp: PDF & Web Highlighter for Researchers & Learners
Glasp: PDF & Web Highlighter for Researchers & Learners
Glasp is a social PDF & Web highlighter that allows you to collect, organize, and share insightful ideas from the web. With your highlights and notes, you can build a personalized AI clone, creating a dynamic, collective knowledge-sharing experience.
·glasp.co·
Glasp: PDF & Web Highlighter for Researchers & Learners
Modern Adversary
Modern Adversary
I’m a security professional with over two decades of experience working across all domains of security. I specialize in understanding how adversaries think and disrupting the inherent asymmetry of security.
·modernadversary.com·
Modern Adversary