An explanation of the most confusing car buttons and symbols is illuminating (what does the "Funk" button do?) but even better is this comment thread featuring an incredibly funny interpretation of some particular obscure symbols. If bad design has you down, look at some of the most amazing in-car graphics for contrast. Jalopnik has been compiling these lists for awhile, with the help of their readers. Some other favorites: the cheapest cars ever sold, the worst highway exits, worst taxi experiences, misleading car names, coolest non-US space projects, oldest military vehicles in service, best car print ads, coolest car keys, and, more practically - things you shouldn't ignore on your car if they go wrong and the 10 cars most recommended by readers.
Why Gawker Nick Denton is a genius - he can smell the page views!. The redesign he's championed (previously) is a convoluted nightmare which breaks the web and left blog posts unindexed Google. Page views are in the toilet. He may loose that bet. It doesn't matter, Nick Denton is a genius. Look, pictures of a naked man!
An anonymous hacking outfit called "Gnosis" has infiltrated Gawker Media, hijacking the front page and leaking the company's internal chat logs, source code, and content databases along with the usernames, email addresses, and passwords of over 1.3 million users (including Gawker staff). The attack, which was motivated by what the group describes as the "outright arrogance" with which the company's bloggers taunted anonymous imageboard 4chan (semi-previously), affects every site in the Gawker network, including Gizmodo, Kotaku, Lifehacker, Jezebel, Deadspin, Jalopnik, and io9. While most of the leaked passwords are encrypted, more than 200,000 of the simpler ones in the torrent file have been cracked, and the links between account names and email addresses are in plaintext for all to see. Since the integrity of Gawker's encryption methods remains in doubt, it is recommended that anyone who has ever registered an account on any Gawker property change their passwords immediately, especially if the same log-in information is used for other services.