Hack w/ Limbic Media

Interactive Electronica and IoT

Visit Limbic Media

hack.limbicmedia.ca was created by the developers and engineers at Limbic Media to share their knowledge and experiences with DIY and hacker community-at-large.

by Eric McNiece

Using Lodash and UnderscoreJS with Ionic 2 RC0

Using Lodash and UnderscoreJS with Ionic 2 RC0

Or, "Straight out of Lodash" This is a quick guide to getting Lodash or UnderscoreJS working in your Ionic 2 RC0 project. Here we are - 2016 is drawing to a close, and I'm just sitting here struggling to include basic libraries in my apps. In case you missed it…

Read On

by Jorge Aranda

Property-based testing with Hypothesis

We are big fans of automated testing at Limbic—our projects routinely have test coverage in the high-nineties, and we use our test suites as part of our continuous integration process. However, until recently, most of our testing has been of the traditional, example-based kind. If you are at all…

Read On

by Gabrielle Odowichuk

How to Make a Conversation Cloud

How to Make a Conversation Cloud

Part 2: Phones, Cans and Strings of Light For an introduction to the project, start with Part 1. Introducing... SHINY GOLD PHONES!!!! We’ve decided to replace the tin cans from previous versions with shiny gold phones. We made this choice for a couple of reasons. First, the microphone and…

Read On

by Gabrielle Odowichuk

How to Make a Conversation Cloud

How to Make a Conversation Cloud

Part 1: MoshiMoshi! MoshiMoshi: The Conversation Cloud is an artistic collaboration between a small group of new media artists/engineers from Vancouver BC. Our friend and media artist Ben Z Cooper (from HFour Design saw this cloud in his dreams: tin cans on strings of light hanging from a bright…

Read On

by Eric McNiece

How to Split DNS DKIM Records Properly

How to Split DNS DKIM Records Properly

If you have ever had the opportunity to fiddle around with email servers, you might have heard of DKIM or DomainKey records. DKIM records are a way to fight the "bad guys" by adding an encrypted signature to your emails so that the recipient can check to see if the…

Read On