Raph Koster makes a pretty good case for 1971 being the perfect year to be born geek. I'm biased (born: July 17, 1971), of course:
* It meant I got to see Star Wars in the theater, 13 times, at age 8 and 9, exactly when it would overwhelm my sense of wonder.
The perfect geek age?
* I got an 8-bit computer at exactly the age when boys get obsessive about details, and I spent days PEEKing and POKEing and typing in listings from magazines and learning how computers actually worked.
* It meant at least half the new games I played were actually new ideas.
* And yet I got to play real pinball machines.
* In real arcades.
* New Wave science fiction was the used paperbacks laying around, and I got to read cyberpunk and steampunk as they were invented, and see SF when fandom was not yet a media circus.
* I got to play D&D from as close to the beginning as most anyone.
It’s been seven years since we previewed Theft: A History of Music, a comic book that explains the complicated history of music, borrowing, control and copyright, created by a dynamic duo of witty copyright law professors from Duke University as a followup to the greatest law-comic ever published: the book was due out years ago, but the untimely and tragic death of illustrator Keith Aoki delayed it — until today.
Back in 2014, Google announced Project Ara, a click-in/click-out modular concept-phone that you could customize by adding or removing modules as you saw fit.
Announced today: So It Is, a new album of Cuban-inspired jazz from the monumentally amazing Preservation Hall Jazz Band (previously), due out on April 21. Available today: Santiago, an instrumental track from the album that will MAKE YOU DANCE.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]