Rules of Typography
“The four most important typographic considerations for body text are point size, line spacing, line length, and font, because those choices determine how the body text looks.” - link
“The four most important typographic considerations for body text are point size, line spacing, line length, and font, because those choices determine how the body text looks.” - link
Briggs & Riley
Interesting looking VPN with no subscription (just “pay as you go” flat fee) - link
I came across this rather delightful musical term! - link
“Ambience Antarctica is a chill spot to listen to music and look at visuals pertaining to the wonderful continent of Antarctica!” - link
In this tutorial, we’ll walk through the fundamental strategies for optimizing images for mobile browsers. The main idea is simple: reduce image size as much as possible without sacrificing its quality. - link
Godot Shaders is a community-driven shader library for the Godot game engine. - link
“Airalo uses eSIMs to help you stay connected and avoid huge global roaming bills while you’re abroad.” - link
“SID Factory II is a cross-platform editor for composing music that will work on a Commodore 64. It uses the reSID emulator and is currently in open BETA. Here you can find the latest builds for downloading.” - link
Javascript for rendering abc music notation - link
“This guide is designed to help developers navigate the complexities of video game publishing agreements. It consists of several articles that explain the clauses most commonly found in these contracts.” - link
Extensive source of example workflows for ComfyUI - link
Be the first person to see a star! - link
Presented as alternative to using generative AI, a really solid list of free image resources - link
“Inspired in part by the art of gem cutting, Tanaka delved into the philosophy of watch design. By 1962, he developed a series of rules for just that; he called it the ‘Grammar of Design’...” - link
“A new permanent home for David Bowie’s archive, and a bookable creative workspace.” - link
This is a list of David Bowie’s favorite songs. I wish I had kept the source!
“There has never been a successful, widespread malware attack against iPhone. The only system-level iOS attacks we observe in the wild come from mercenary spyware, which is vastly more complex than regular cybercriminal activity and consumer malware...” - link
When button holster are closed/fake (i.e., not surgeon’s cuff) - link