Skip to content

Instantly share code, notes, and snippets.

lucasgonze /
Last active Aug 29, 2015
Advantage: middle

Artists now spend significantly more time touring than they did in the pre-Napster days (estimates here vary) and command close to 35% more per ticket on an inflation-adjusted basis. As a result, the US concert industry has nearly tripled since 1999 (when recorded music sales peaked).

Yet, what’s typically overlooked by this narrative is that the vast majority of this growth – 83% to be exact – has gone to non-Top 100 touring artists. In 2000, the Top 100 tours (which included ‘NSYNC, Metallica and Snoop Dogg & Dr. Dre) collected nearly 90% of annual concert revenues. Today, that share has fallen to only 44%. Furthermore, the Top 100 tours have faced stagnant revenues for close to a decade, with both ticket prices and sales largely flat:

So in all, the pains and changes over the past 15 years have been unevenly distributed.

The most popular artists have seen their primary income stream, recorded music sales, collapse by more than 70% in inflation-adjusted terms since 2000 (~$14B), while their conc


The cult of growth denies the idea that you can build anything useful or helpful unless you're prepared to bring it to so-called "Internet scale". There's no point in opening a lemonade stand unless you're prepared to take on PepsiCo.

I always thought that things should go the other way. Once you remove the barriers of distance, there's room for all sorts of crazy niche products to find a little market online. People can eke out a living that would not be possible in the physical world. Venture capital has its place, as a useful way to fund long-shot projects, but not everything fits in that mold.

The cult of growth has led us to a sterile, centralized web.

View gist:23bb922b5dfa2be2941a
Plugin IndieWeb Post Kinds
Version 1.4.0
Warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'transition' not found or invalid function name in /home/lgonze/ on line 496
Warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'transition' not found or invalid function name in /home/lgonze/ on line 496
lucasgonze / gist:a57f8f5262a5a82c3797
Last active Aug 25, 2020
Q: how do you make money? A: sell stuff
View gist:a57f8f5262a5a82c3797

Internet of Things products rely on hardware sensors. These are little devices that monitor things like room temperature, heart rate, compass reading, etc. Sensors need to be cheap and plentiful. Low prices mean ultra-low profit margins.

So how do you make money in the sensor business?

  1. Only allow access from a front end you control, and charge for the front end.
  2. Don't bother trying, let suckers eat the tiny margin.
  3. Give away the sensor and own the data center and/or UI.

Those are the consensus as far as I can tell, anyway. But I don't know if I believe this is all you can do. So here are my contrarian answers:

View gist:9880502a396bcd113108
When I'm on an open wifi network, I use an SSH tunnel to encrypt my traffic. Here's my script:
ssh -D 9999 "
echo '
Establishing ssh tunnel...
View gist:c5d935823ef17f5ffa3f

Do This

  1. Create dedicated domain on an Apache server that supports .htaccess
  2. ssh to root directory there
  3. Use to create 200 random strings. (Five characters long, with digits, uppercase letters and lowercase letters).
  4. Save to short-strings.txt
  5. echo "RewriteRules On" > .htaccess
  6. cat short-strings.txt | awk '{print "RewriteRule ^"$1"$ TO [R,L]"}' >> .htaccess
  7. rm short-strings.txt
  8. When you want to shorten a URL, edit .htaccess. Replace any TO with the long URL.
lucasgonze / gist:22f10779e89e21332c5e
Last active Aug 29, 2015
Proof of concept anti-surveillance tunnel
View gist:22f10779e89e21332c5e

Goal: Develop ways to construct tunnels through surveilled areas.

A surveilled area has cameras, either recording or or transmitting. A tunnel is a path with no cameras and an unsurveilled entrance and exit.

Proof of Concept

Identify a surveilled area bordered by unsurveilled areas. You could start with really small chunks of real estate, like:

  1. Surveilled area to tunnel through is a single ATM with a security camera on it, with camera-free areas on either side.
View designer.html
<link rel="import" href="../components/polymer/polymer.html">
<polymer-element name="my-element">
#design_host {
position: absolute;
width: 100%;
height: 100%;
View gist:11199481

A couple observations on fragmentions (

Google Drive has a comparable feature which uses this syntax to bookmark searches:

Another piece of prior art is the .well-known:

I think that what the RFC 5785 example shows it that Kevin's double-hash syntax is one of a thousand flowers blooming. It's the same process that played out eventually as .well-known - a path to standardized fragment IDs.

lucasgonze /
Last active Aug 29, 2015
The Humanian Explosion

It's 250,000 years from now and people are moving back to the sea.

The land is crowded with a human population of two trillion. Humans have reached the Malthusian limits of what the land can support. Enough real estate for a bed is too precious for many, and the homeless are in the billions.

Living outdoors from one generation to the next, breeding among themselves on the streets, the homeless have begun to diverge physically. They are becoming a new species.

And nowhere more clearly than among the homeless living on the shore. To compete with commercial fishing and one another, a fringe spends its time literally in the water, as close as possible to edible fish and plants.

Competing for food means getting there first, and getting there first means swimming right up to your catch. Webbed toes help, especially for those too poor to buy fins. The ability to hold your breath longer follows quickly. Larger eyes to see in dark water. New digestive enzymes to process seaweed and kelp. Faster reflexes to catc