recentpopularlog in
« earlier  
How to Find Hidden Cameras and Spy Bugs (The Professional Way) - Sentel Tech Security
This is without a doubt most thorough guide to detecting hidden cameras and covert spy gear that is online. The simple strategies that we are going to show you will effectively clear most rooms for hidden cameras and bugs without having to use super expensive countersurveillance gear or an outside company.
guide  privacy  security 
3 days ago
wireless - How can I display the list of available WiFi networks? - Ask Ubuntu
Use nmcli dev wifi command. It shows the transfer rate, the signal strength and the security as well.
wifi  linux  howto  sysadmin  network 
9 days ago
A Trump voter hurt by the shutdown’s incredibly revealing quote - Vox
Think about that line for a second. Roll it over in your head. In essence, Minton is declaring that one aim of the Trump administration is to hurt people — the right people. Making America great again, in her mind, involves inflicting pain.
politics  article  government  shutdown 
9 days ago
Windows KB4480960 & KB4480970 Updates Causing Network and License Problems
On January 8th, Microsoft released the KB4480960 and KB4480970 updates for Windows 7 SP1 and Windows Server 2008 R2 SP1, which have been causing networking and licensing havok for users and organizations that have installed them.
windows  windows7  update  troubleshooting  sysadmin  howto  article 
9 days ago - iCalendar Resources, Specifications and Tools
This site is devoted to promoting the iCalendar standard, an open standard for exchanging calendar and scheduling information between users and computers.  On this site you will find iCalendar resources, an iCalendar validator and specifications for iCalendar and related protocols in an easy to use layout.
reference  ical  calendar  documentation  help  tutorial  tutorials  development  dev 
11 days ago
visual studio 2013 - how to resolve dependency when comparing schema in TFS for SQL Server project or when creating .DACPAC files in SSMS? - Stack Overflow
The correct way to handle it would be to also create a dacpac for the database the other end of the linked server and add a database reference as "Other Server, Other Database". Instead of SSMS I would create a new ssdt project in ssdt and import each database as it will be more reliable than the ssms extract.
database  dacpac  project  best_practice 
11 days ago
falafel – smitten kitchen
Until recently, if you’d asked me if I ever wanted to make falafel at home, I’d have said “sure, one day” but what I meant was “nah, why bother?” I was certain that falafel was fussy to make and had a long ingredient list. It probably related in some way to a fritter, meaning that it was bound with eggs and flour, and probably had breading on it too, all pesky steps and this is even before you get to the peskiest of all: deep-frying them. I figured that it’s one of these things that there as many recipes for as there are people who make it, thus whatever I came up with would be wrong by default – too firm or too soft, with chickpeas instead of favas or vice-versa — no matter what. But this isn’t the whole truth. The fact is that below 14th Street, there are two locations each of Taim and Mamoun’s every time I even distantly considered whether I needed a homemade falafel recipe in my life, I knew I could get a perfectly executed sandwich in my hands before I even wrote out a grocery list.
cooking  recipe  food 
13 days ago
HN.Academy - Online Courses Recommended By Hacker News Users
HN.Academy collects, ranks, and showcases the online courses recommended by Hacker News users.
class  learning  online  recommendations  computer  engineering  howto  course  coursera 
16 days ago
The 13 best sci-fi books to check out on your new Kindle - The Verge
The holidays are here, and it looks like you got a new Kindle (or a device with a Kindle app). You now have before you a fun task: to build a portable library of all the books that you have on your reading list — or to create a new list for the coming year. If you’re looking for recommendations, here are 13 science fiction books that stand on their own (or are loosely part of a bigger world) to start off with. (If you’re interested in trying a series, you can also check out some of last year’s recommendations.)
books  reading  list  science  kindle 
18 days ago
Things I Don’t Know as of 2018 - Overreacted
People often assume that I know far more than I actually do. That’s not a bad problem to have and I’m not complaining. (Folks from minority groups often suffer the opposite bias despite their hard-earned credentials, and that sucks.)
development  engineering  programming  blog  article 
18 days ago
Lessons from Running a Small-Scale Electronics Factory in my Guest Bedroom, part 1: Design –
This post primarily focuses on design choices for PCBs and the firmware running on them, the next post will show some tricks I’ve learned to save time and energy actually assembling and baking your boards.
electronics  assembly  best_practice  hardware 
18 days ago
AWS Lambda Deployment Package in Go - AWS Lambda
To create a Lambda function you first create a Lambda function deployment package, a .zip file consisting of your code and any dependencies. After you create a deployment package, you may either upload it directly or upload the .zip file first to an Amazon S3 bucket in the same AWS region where you want to create the Lambda function, and then specify the bucket name and object key name when you create the Lambda function using the console or the AWS CLI.
aws  documentation  go  golang 
4 weeks ago
Dachstein Woolwear Military Cardigan Sweater - Sweater Chalet
Throw this Dachstein Woolwear Kamgarn wool cardigan sweater on and be ready for the adventure of your life!  Made in Austria of 100% fine Kamgarn wool, this Dachstein zippered wool cardigan sweater is perfect for military and civilian use.
clothes  clothing  sweater  shop  shopping 
5 weeks ago
Dale of Norway Haukeli Sweater for Men - Sweater Chalet
A masculine design, inspired by the historical "Valknut" symbol. This is a knot with no opening, beginning or end, symbolizing that it is unbreakable by evil forces and used for protection against black magic. Named after Haukeli, a mountain area located in the central part of Norway.
clothes  clothing  christmas  sweater  shop 
5 weeks ago
Seinfeld Festivus For The Rest Of Us Pole Sweater
Who doesn’t love Seinfeld? Fans of Seinfeld with appreciate your ugly Seinfeld Festivus sweaters this holiday season. Festivus is something to be celebrated, indeed
sweater  clothes  clothing  shop  christmas 
5 weeks ago
Windows 10 privacy guide: How to take control | ZDNet
Over the past several years, I've read countless "privacy guides" for Windows 10. Most are well intentioned, but they invariably take a simplistic approach to privacy: Just turn off every switch in the Privacy section of the Settings app and disable some services.
windows10  privacy  guide  howto 
5 weeks ago
Westeros - Google Maps - Poster — Mongolife
If the world of Westeros was on Google Maps. High resolution with lots of details with almost every little town, castle and stronghold marked as well as mountains, forests and roads.
art  poster 
5 weeks ago
Lace Lab
Shortly after laces started hitting the market. We noticed a trend of "branding." We then worked hard to cook up the highest quality of laces that didn't need to be branded, allowing the quality to speak for itself. SIMPLY PUT, OUR LACES ARE "FRESH OUT OF THE LAB."
shoes  store  clothes  clothing  shop  shopping  accessories 
5 weeks ago
A blogging style guide | Robert Heaton
Here are 39 ways to make your blog more entertaining to read and more pleasurable to write.
blog  writing  blogging  best_practice  ideas 
5 weeks ago
Stripe Atlas: Guide to scaling engineering organizations
We’ve deliberately chosen to add engineers at a slower rate than the growth of of our user base and instead take an iterative approach to recruiting and developing our team. We were able to keep teams small, invest more in each person, and nimbly change our ways of working as needs changed. Since what works for fifty engineers may not work for ten or a thousand, we’ve built a culture of feedback and iterative thinking that enables us to continually make changes as we grow. This guide talks through some of the things we’ve learned along the way.
guide  management  hiring  organization  best_practice 
6 weeks ago
Complex Tables, Simple Code
graph  javascript  table 
6 weeks ago
javascript - How to update parent's state in React? - Stack Overflow
For child-parent communication you should pass a function setting the state from parent to child, like this
react  code  howto 
7 weeks ago
Edward Snowden Explains Blockchain to His Lawyer — and the Rest of Us | American Civil Liberties Union
Through it all, I’ve found him to be the clearest, most patient, and least condescending explainer of technology I’ve ever met. I’ve often thought that I wished more people — or perhaps different people — could eavesdrop on our conversations. What follows is a very lightly edited transcript of one of our chats. In it, Ed attempts to explain “blockchain” to me, despite my best efforts to cling to my own ignorance.
security  help  blockchain  documentation  article  howto  technology 
7 weeks ago
20 Questions To Ask Before Joining A Startup
When I first joined a startup in 2012 I did my best to ask the right questions when interviewing. My engineering background prepared me for engineering tasks and helped me write a resume, but it didn’t prepare me well for how to evaluate a startup offer. While this might be obvious to some, this is what I wish I knew when trying to break into the startup scene.
career  entrepreneurship  jobs  startup  startups  interview 
7 weeks ago
Errors in Go: From denial to acceptance — Martian Chronicles, Evil Martians’ team blog
Learn how to stop worrying and love error handling in Go. Author of Overmind and imgproxy describes his journey through all five stages of Kübler-Ross model—from denial to acceptance—as he went deeper into the language, and shares his favorite patterns for dealing with errors in Go code.
go  golang  programming  error  errorhandling  best_practice 
7 weeks ago
Battling Entropy: Making Order of the Chaos in Our Lives
Now think of this example in relation to your organization. You’re applying energy to get something done. The higher the entropy in the system, the less efficient the energy you apply will be. The same person applying 20 units of energy in a big bureaucracy is going to see less impact than someone applying the same 20 units in a small startup. You can think about this idea in a competitive sense, too. If you’re starting a business and you’re competing against very effective and efficient people, a lot of effort will get absorbed. It’s not going to be very efficient. If, on the other hand, you compete against less efficient and effective people, the same amount of energy will be more efficient in its conversion.
article  energy  ideas  startup  career  advice 
7 weeks ago
Improving spam protection | FastMail
FastMail uses many tools that help catch and stop as much spam as possible. With a little help from you, you can virtually eliminate spam from your Inbox.
mail  spam  help  fastmail  support  documentation 
8 weeks ago
JavaScript ES6: Arrow Functions & the spread operator
In the previous tutorial we looked at classes and modules, in this final tutorial I’m going to give you a basic understanding of Arrow Functions and the spread operator. After each topic, a resources section is provided with resources to help you understand if you are confused and to learn more about the feature. Let’s begin!
javascript  es6  tutorial  help  interview 
8 weeks ago
Steve Blank How to Keep Your Job As Your Company Grows
If you’re an early employee at a startup, one day you will wake up to find that what you worked on 24/7 for the last year is no longer the most important thing – you’re no longer the most important employee, and process, meetings, paperwork and managers and bosses have shown up. Most painfully, you’ll learn that your role in the company has to change.
advice  career  management  startup  business 
9 weeks ago
Build a do-it-yourself home air purifier for about $25 | Michigan Medicine
Many people with sinus problems have underlying allergies to dust, pollen, mold or animal dander. All of these can build up in the air inside homes.
diy  health 
9 weeks ago
HTTP/3 |
The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3. This was triggered by this original suggestion by Mark Nottingham.
article  networking  http3  best_practice  network 
10 weeks ago
What I say to people who are looking for a job — Greg Kamradt
After I got my new role, I did a video explaining my process on how to get a job. Today, a lot of people have questions about their journey as they try and navigate a new career for themselves. Most questions follow the same format. Here are my responses to the most common:
career  jobs  help  search 
10 weeks ago
Learn the basics of destructuring props in React –
With React, which fully embraces the ES6 syntax, destructuring adds a slew of benefits to improving your code. This article will go over the basics of destructuring objects and how it applies to props in React.
react  es6  howto  syntax  javascript 
11 weeks ago
Basic concepts of flexbox - CSS: Cascading Style Sheets | MDN
The Flexible Box Module, usually referred to as flexbox, was designed as a one-dimensional layout model, and as a method that could offer space distribution between items in an interface and powerful alignment capabilities. This article gives an outline of the main features of flexbox, which we will be exploring in more detail in the rest of these guides.
css  flexbox  layout 
11 weeks ago
Visual Studio 2017 .csproj version patching in AppVeyor - Arthur Rump
After the debacle with project.json and .xproj, Microsoft settled on a simpler, more modern version of the old .csproj project system with Visual Studio 2017. One of the changes advanced users will notice when creating a new project in Visual Studio 2017, is the absence of AssemblyInfo.cs. You can add it back yourself, if you want to use some advanced options that aren’t available in .csproj, like the ability to make internal types visible to other assemblies, but by default, it’s gone.
visual-studio  visualstudio  appveyor  assembly  build  ci  howto 
11 weeks ago
Clear Any Clogged Drain | This Old House
Armed with the right tools and techniques, you can easily unplug stopped-up drains.
howto  plumbing  tool  tools  home 
11 weeks ago
Lee Valley Tools
Lee Valley is a family-owned business that has been serving users of woodworking and gardening tools since 1978.
woodworking  tool  tools  shop  shopping  online  store 
october 2018
Fold N Fly ✈
A database of paper airplanes with easy to follow folding instructions.
craft  kids  papercraft  diy  howto  parenting 
october 2018
Securing your users' authentication - Stavros' Stuff
Having worked in web security for years, I know how hard it is to get authentication right, especially when users will find ingenious ways to defeat your system, such as storing their “do not store these codes on your phone” two-factor authentication (2FA) codes on the phone and then throwing the phone in the ocean. Another user surprised me when, instead of properly setting up their authenticator app, they brilliantly used one of the ten backup codes to finish their 2FA setup (and didn’t even store the rest), thus locking themselves out of their account immediately.
security  article 
october 2018
Introduction · Evergreen
Evergreen is a pragmatic UI kit for building evolving products on the web. It is build and maintained open-source by Segment.
react  ui  components  opensource  development  javascript  framework 
october 2018
The Key to Becoming a Software Consultant - DaedTech
Recently, I made an idle threat on Twitter (shown below).  I was thinking of creating some content along the lines of how to go from being a software developer to a software consultant.  People ask me about this all the time, and it makes for an interesting subject.  I was also flattered and encouraged by the enthusiastic response to the tweet.
business  jobs  consulting  startup  startups  howto 
october 2018
Dustopper High Efficiency Dust Separator, 12 in. dia, with 2.5 in hose, 36 in. long-HD12 - The Home Depot
Owning a Dustopper means never having to worry about cleaning the inside of your wet/dry vacuum, or its nasty filter. Dustoppers new, low-profile design puts a whole new spin on cyclonic dust separation, and offers a faster, better, easier way to manage the dust and debris. For decades, most wet/dry vacuums have been based on a design where a pleated air filter is positioned inside the same bucket used to haul away collected dirt and debris. While much of what is drawn into the wet/dry vacuum is collected by its bucket, finer particles of dust will become lodged in the air filter, robbing the wet/dry vacuum of much of its suction power. Dustopper is designed to keep your filter clean, so you can spend less time cleaning up. Dustopper spins the incoming dirty air in a newly designed, and patent-pending chamber that causes more than 99% of the dust and debris to fall into a standard 5 Gal. bucket before reaches the filter. Simply lift the Dustopper from its bucket and carry collected dirt away for easy disposal. Dustopper is design so it can easily be removed from the box and placed into service within seconds. There are no holes to drill, no screws to tighten, and no sealers to apply. Simply remove Dustopper from its box, place it on a 5 Gal. standard bucket, and then connect it to your shop vacuum with the hose provided.
dust  garage  wood  woodworking  cleaning 
october 2018
Create React App 2.0: Babel 7, Sass, and More – React Blog
Create React App 2.0 has been released today, and it brings a year’s worth of improvements in a single dependency update.
development  javascript  react  blog  howto 
october 2018
The Illustrated TLS Connection: Every Byte Explained
Every byte of a TLS connection explained and reproduced.
http  network  networking  ssl  tls 
october 2018
Catch CTRL-C on Windows using Git Bash / MINGW64 with Go - Stack Overflow
Use winpty to catch signals correctly in Git Bash for Windows. It comes bundled with the installation, so all you need to do is:
golang  go  windows  bash  mingw64  signal  notification  command  cli 
october 2018
Fire and Forget on ASP.NET
.NET 4.5.2 added a built-in way to queue background (a.k.a. “fire and forget”) work in ASP.NET. This post is a summary of the different techniques available today.  async  howto  development  best_practice  analysis  article 
october 2018
Returning Early from ASP.NET Requests
I have great reservations about writing this blog post. Pretty much everything I’m going to describe here is a bad idea and you should strongly avoid putting it into production, but there are just a few situations where this technique can be really helpful. As I described in Async Doesn’t Change the HTTP Protocol, in the ASP.NET worldview you only get one “response” for each “request”. You can’t return early just by using an await. However, in some situations you have enough information to generate the response but the actual request processing may take some more time. That’s were today’s solution comes in.
async  iis  article  advice  best_practice  development 
october 2018
Why you can have millions of Goroutines but only thousands of Java Threads
Golang prevents large (mostly unused) stacks running the system out of memory with a clever trick: Go’s stacks are dynamically sized, growing and shrinking with the amount of data stored. This isn’t a trivial thing to do, and the design has gone through a couple of iterations.4 While I’m not going to get into the internal details here (they’re more than enough for their own posts and others have written about it at length), the upshot is that a new goroutine will have a stack of only about 4KB. With 4KB per stack, you can put 2.5 million goroutines in a gigabyte of RAM – a huge improvement over Java’s 1MB per thread.
go  golang  programming  java  memory  threading 
october 2018
Tom Nichols: Why I'm Leaving the Republican Party - The Atlantic
Her speech on the nomination of Brett Kavanaugh convinced me that the Republican Party now exists for one reason, and one reason only: for the exercise of raw political power, and not for ends I would otherwise applaud or even support.
october 2018
Do You Really Know CORS? –
If you work with a frontend sometimes, the chances are that you’ve seen the error above before. When it had happened to you for the first time, like any proper developer does, you googled it. As a result, you have probably seen some advice on StackOverflow to include Access-Control-Allow-Origin in your server’s response and then, you can happily return to your code.   Surprisingly, this is the end of the experience with Cross-Origin Resource Sharing (CORS) for many developers. They know how to fix the problem, but they don’t always understand why the problem exists in the first place. In this article, we will dive deeper into this topic, trying to understand what problem CORS really solves. However, we will start with the Same-Origin Policy (SOP) concept.
cors  programming  security  web 
october 2018
Hack My House: Running Raspberry Pi Without an SD Card | Hackaday
What does this have to do with Hacking My House? As I discussed last time, I’m using Raspberry Pi as Infrastructure by building them into the walls of every room in my house. You don’t want to drag out a ladder and screwdriver to swap out a misbehaving SD card, so booting over the network is a really good solution. I know I promised we’d discuss cabling and cameras. Think of this as a parenthetical article — we’ll talk about Ethernet and ZoneMinder next time.
automation  raspberrypi  electrical  home  howto  pxe  boot  network  ethernet 
october 2018
Sans Forgetica - RMIT
Sans Forgetica is a downloadable font that is scientifically designed to help you remember your study notes.
design  font  fonts  learning  typography 
october 2018
Hardening macOS
Your device is not secure, and never will be. I’m not going to lie to you, this guide ain’t no silver bullet, there’s no such thing as a completely secure system. That said, you can make it a lot harder for the bad guys to steal what’s yours, that’s what this guide is made for.
computers  mac  macos  security  best_practice  howto  guide 
october 2018
testing - The Go Programming Language
It is sometimes necessary for a test program to do extra setup or teardown before or after testing. It is also sometimes necessary for a test to control which code runs on the main thread. To support these and other cases, if a test file contains a function: func TestMain(m *testing.M) then the generated test will call TestMain(m) instead of running the tests directly.
golang  testing 
september 2018
Using Subtests and Sub-benchmarks - The Go Blog
In Go 1.7, the testing package introduces a Run method on the T and B types that allows for the creation of subtests and sub-benchmarks. The introduction of subtests and sub-benchmarks enables better handling of failures, fine-grained control of which tests to run from the command line, control of parallelism, and often results in simpler and more maintainable code.
go  golang  testing 
september 2018
What Most Remote Companies Don’t Tell You About Remote Work
Articles about the remote work lifestyle have tended to focus on drinking piña coladas on the beach, traveling the world, and otherwise enjoying a life that inspires envy in your social media following. This is not one of those articles.
business  health  remote  worker  workplace 
september 2018
AWS Well-Architected - Build secure, efficient, cloud enabled applications
The Well-Architected framework has been developed to help cloud architects build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for customers and partners to evaluate architectures, and provides guidance to help implement designs that will scale with your application needs over time.
architecture  aws  cloud  design  devops 
september 2018
Mailspring - The best free email app
Boost your productivity and send better email with Mailspring, the best mail client for Mac, Linux, and Windows.
app  client  email  linux  mail 
september 2018
How to Solar Power Your Home - MJLorton
A video series discussing sizing and practicalities of powering your home using solar power.
video  home  improve  project  howto  tutorial  tutorials 
september 2018
How to measure temperature and send it to AWS IoT using a Raspberry Pi
What if you want to self-correct the temperature in your office? Or what if you are curious to understand your office environment using IoT sensors?
aws  iot  howto  raspberrypi 
september 2018
Fresh Farm Produce, Local Fresh Produce in North Georgia| Jaemor Farms
Jaemor Fresh refers to the produce and products grown right here on the farm.  Since 1912, the Echols family has been sowing this land and harvesting produce to retail in our market and wholesale. See our picking calendar below for the best time to get your favorite variety of Jaemor Fresh produce when it is freshly picked. We don't just sell fresh produce, we sell Jaemor Fresh.  We hope you enjoy the fruits of our labor as much as we do. Never before have so few fed so many for so little! Jaemor Farms grows 500-acres of fruits and vegetables, most of which are peaches. We have 33 varieties of peaches. Ripening dates are Memorial Day to Mid September. Our heaviest production is late July and August. Taste the difference family makes!
food  farm  georgia 
september 2018
Ace - The High Performance Code Editor for the Web
Ace is an embeddable code editor written in JavaScript. It matches the features and performance of native editors such as Sublime, Vim and TextMate. It can be easily embedded in any web page and JavaScript application. Ace is maintained as the primary editor for Cloud9 IDE and is the successor of the Mozilla Skywriter (Bespin) project.
browser  editor  javascript  programming 
september 2018
What Lord Macaulay said about India in 1835 - Every Indian should read this | Sulekha Creative
Lord Macaulay said the following about India in 1835 in British Parliament.   "I have traveled across the length and breadth of India and I have not seen one person who is a beggar, who is a thief. Such wealth I have seen in this country, such high moral values, people of such calibre, that I do not think we would ever conquer this country, unless we break the very backbone of this nation, which is her spiritual and cultural heritage, and, therefore, I propose that we replace her old and ancient education system, her culture, for if the Indians think that all that is foreign and English is good and greater than their own, they will lose their self-esteem, their native self-culture and they will become what we want them, a truly dominated nation."
india  history  british  government 
september 2018
Digital fabrication tools have broadened participation in making and enabled new methods of rapid physical prototyping across diverse materials. We present a novel smart tool designed to complement one of the first materials employed by humans — wood — and celebrate the fabrication practice of joinery. Our tool, MatchSticks, is a digital fabrication system tailored for joinery. Combining a portable CNC machine, touchscreen user interface, and parametric joint library, MatchSticks enables makers of varying skill to rapidly explore and create artifacts from wood. Our system embodies tacit woodworking knowledge and distills the distributed workflow of CNC tools into a hand tool; it operates on materials existing machines find difficult, produces assemblies much larger than its workspace, and supports the parallel creation of geometries. We describe the workflow and technical details of our system, present example artifacts produced by our tool, and report results from our user study.
code  woodworking  router  cnc 
september 2018
‘Five Eyes’ Nations Quietly Demand Government Access to Encrypted Data - The New York Times
The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.
government  politics  encryption 
september 2018
Transcript: Phone call between President Trump and journalist Bob Woodward - The Washington Post
Bob Woodward, an associate editor at The Washington Post, sought an interview with President Trump as he was writing “Fear,” a book about Trump’s presidency. Trump called Woodward in early August, after the manuscript had been completed, to say he wanted to participate.
history  politics  usa  article 
september 2018
GopherCon 2018 - Implementing a Network Protocol in Go
An very detailed walkthrough of implementing a networking protocol (NDP in IPv6) in Go, with many, many code snippets.
golang  programming  network  networking  analysis  howto  presentation 
september 2018
cayley/ at master · cayleygraph/cayley
Currently, Cayley supports being used as a Go library for other projects. To use it in such a way, here's a quick example:
cayley  graph  database  library  go  golang  code  example  data 
august 2018
NoSQL Data Modeling Techniques – Highly Scalable Blog
In this article I provide a short comparison of NoSQL system families from the data modeling point of view and digest several common modeling techniques. I would like to thank Daniel Kirkdorffer who reviewed the article and cleaned up the grammar. To  explore data modeling techniques, we have to start with a more or less systematic view of NoSQL data models that preferably reveals trends and interconnections. The following figure depicts imaginary “evolution” of the major NoSQL system families, namely, Key-Value stores, BigTable-style databases, Document databases, Full Text Search Engines, and Graph databases:
data  database  db  model  nosql  analysis  language  technology 
august 2018
c# - Connect to Active Directory via LDAP - Stack Overflow
DC is your domain. If you want to connect to the domain than your dc's are: DC=example,DC=com You actually don't need any hostname or ip address of your domain controller (There could be plenty of them). Just imagine that you're connecting to the domain itself. So for connecting to the domain you can simply write
ldap  active  directory  ad  windows  code  howto  stackoverflow 
august 2018
How To Enable Color Emoji on Chrome for Linux (Updated) - OMG! Ubuntu!
Monica has hit upon a way to get full-color, Unicode 9.0-supporting emoji looking like they should in Chrome (and other Chromium related browsers) for Linux. As someone who’s worked on Google Chrome, and just so happens to be a big, big fan of the zany colorful glyphs some of us love to hate, Monica was the ideal person to figure it out. Her solution is surprisingly simple, truth told: install Google’s free Noto Color Emoji font on Linux.
chrome  emoji  font  fonts  linux  howto  tutorial  cli  browser  chromium 
august 2018
Same Guitar, New Sounds: A Guide to Strings – Acoustic Guitar
Even if you are lucky enough to own the guitar of your dreams, you can still improve the sound or adjust it more to your liking with several low-budget modifications. Fortunately, for most of us, simply changing to a different set of strings may be the easiest and most cost-effective way to improve the sound of your guitar.
guitar  howto  maintenance 
august 2018
Auto-start chromium on raspbian jessie - 11/2015 - Raspberry Pi Stack Exchange
chromium-browser --noerrdialogs --disable-session-crashed-bubble --disable-infobars --kiosk
chrome  raspberrypi  howto 
august 2018
Mod and Remainder are not the Same – Rob Conery
Anyway: last week I found out something weird that I thought I would share: mod and remainder are not the same thing. The really fun thing about that statement is that there are a small fraction of people reading this, jumping out of their chairs saying “NO SHIT I’VE BEEN TRYING TO TELL YOU AND EVERYONE ELSE FOREVER”. Shout out to mods-not-remainder crew! This one’s for you.
math  programming  interview  article 
august 2018
New Russian Hacking Targeted Republican Groups, Microsoft Says - The New York Times
In a report scheduled for release on Tuesday, Microsoft Corporation said that it detected and seized websites that were created in recent weeks by hackers linked to the Russian unit formerly known as the G.R.U. The sites appeared meant to trick people into thinking they were clicking through links managed by the Hudson Institute and the International Republican Institute, but were secretly redirected to web pages created by the hackers to steal passwords and other credentials.
microsoft  security  analysis  article 
august 2018
Home Assistant
Open source home automation that puts local control and privacy first. Powered by a worldwide community of tinkerers and DIY enthusiasts. Perfect to run on a Raspberry Pi or a local server.
automation  hardware  home  iot  python 
august 2018
Why Trump Supporters Don’t Care About Cohen’s Admission - The Atlantic
What the president’s supporters fear most isn’t the corruption of American law, but the corruption of America’s traditional identity.
politics  article  analysis 
august 2018
« earlier      
per page:    204080120160

Copy this bookmark:

to read