recentpopularlog in
« earlier  
Fortnite Is so Much More Than a Game – Great Escape – Medium
"And while the central premise really is compelling, what the alarmist coverage often misses is that Fortnite is not really a game about shooting people. It’s a game about escape."
video  games  fortnite 
5 days ago
How Chicago's Dining Scene Lost Its Mojo
"Chicago’s once-vaunted dining scene has lost its luster. Our food writer offers an unsparing five-point manifesto that explains why — and how we can fix it."
chicago  restaurant  food 
5 days ago
Getting Docker up on Linode, with Ubuntu 16.04 – Luke Berndt
"Unfortunately it is not a straight forward process for getting Docker installed on Linode using Ubuntu 16.04. The Image that Linode provides for Ubuntu 16.04 has a custom Linux Kernel installed in it. Docker requires AUFS, which is part of the linux-image-extra package. This package is tied to the kernel version, and since Linode kernel is custom, it is not clear how to load this package. In order to make this work, you have to revert your install back to the distribution kernel."
sysadmin  linode  docker  linux  ubuntu 
5 days ago - Amazon Review Checker
" analyzes millions of reviews and helps you decide which ones to trust"
shopping  amazon  review 
5 days ago
Technical Note TN2449: OpenSSH updates in macOS 10.12.2
"macOS 10.12.2 includes version 7.3p1 of OpenSSH. This technote documents some ssh behavior changes over previous macOS versions introduced in this update."
sysadmin  osx  ssh  keychain 
22 days ago
Easy parsing of Excel spreadsheet format with Swift's Codable protocols | Max Desiatov
"It seems like there are no cross-platform libraries for parsing XLSX available to use with Swift. Turns out, implementing file format support from scratch isn’t that hard with the great Codable API available in Swift standard library. XLSX files are actually zip archives with multiple XML files within. In this article, we had a look at the code that decompresses an archive in memory and parses the XML files to get cell data for any given worksheet."
programming  swift  xml 
25 days ago
How Princess Peach's Story Draws On 2000 Years Of Women In Peril
"In the end, I don’t think there’s anything wrong with having damsels in distress—as long as we also have dudes in distress. Saving a person from harm is not a bad trope in itself—it only becomes problematic (and boring, honestly) when the damsel is always a woman and the hero is always a man."
video  games  mario  sexism 
4 weeks ago
HF Ham Radio on a Budget: QRP Labs, QRPGuys, CW Academy - KE6MT
"I’ll probably write more about this in other posts, but I believe that we are indeed in the midst of a golden age for amateur radio. Never before have we had such easy access to information, parts and kits needed to get on the air and to experiment.  From microcontrollers to easily available parts and information, never have there been more possibilities for experimentation.  With ingeniously-designed inexpensive kits, it’s easier than ever to get on the air.  Whether it’s VHF/UHF, HF, microwave, or all of the above—if you’re interested, you can do it."
ham  radio  hardware 
4 weeks ago
Atwood Center
I went here in 7th grade for an overnight field trip.
4 weeks ago
PocketMine on a Raspberry Pi? | PMMP Forums
" use pocketmine you will need to have a 64bit os. Opensuse has a 60 day trial for the Raspberry Pi 3 however there is a better option: pi64."
minecraft  software  oss  raspberry-pi 
5 weeks ago
"For a while it was always a pleasure to see one of my ICs
being sold to hobbyists. Although the LM383 had perhaps a
typical life for an IC, it was sad to see the part being
electronics  history 
5 weeks ago
Kernel RCE caused by buffer overflow in Apple's ICMP packet-handling code (CVE-2018-4407) - Blog - LGTM
"This post is about a heap buffer overflow vulnerability which I found in Apple's XNU operating system kernel. I have written a proof-of-concept exploit which can reboot any Mac or iOS device on the same network, without any user interaction. Apple have classified this vulnerability as a remote code execution vulnerability in the kernel, because it may be possible to exploit the buffer overflow to execute arbitrary code in the kernel."
security  osx 
6 weeks ago
How to Get to The Best Readability Without More Abstraction
"TL;DR: From this experiment, I’ve learned that we shouldn’t be too hasty adding new abstraction level when refactoring. Maybe there is a way to improve readability within the bounds of the current abstraction."
programming  refactoring 
6 weeks ago
The Empty Core of the Trump Mystique | The New Republic
"So for those white liberals wringing their hands over the purported racism of Trump’s supporters, there is good news and bad news: They don’t all hate black folk. A lot of them just hate you."
politics  america 
6 weeks ago
Why do we still rebuild RAID drives? | ZDNet
"Assume the hard drive averages 100MB/sec write speed. That's 360GB/hour, or more than 22 hours of maximum speed rebuild time for an 8TB drive."
storage  raid 
7 weeks ago
Why RAID 5 still works, usually | ZDNet
"Simple: drive vendors up'd the spec - for some drives - to one URE in 10^15 bits, or about 125TB."
storage  raid 
7 weeks ago
Stop cherry-picking, start merging, Part 1: The merge conflict – The Old New Thing
"This is the start of a series that will begin by explaining why cherry-picking is bad, continue by explaining why cherry-picking is worse, then try to talk you down from the ledge by showing how to get the same effect as a cherry-pick but with merging, showing how to apply that technique to the case where you need to do a retroactive merge, and wrap up by showing how to apply that technique to the case where you already made the mistake of cherry-picking and want to fix it before something bad or worse happens."
version-control  git 
8 weeks ago
Stop cherry-picking, start merging: Index – The Old New Thing
"Here's an index to the "Stop cherry-picking, start merging" series that just completed, if that's the sort of thing you are into:"
version-control  git 
8 weeks ago
What’s the difference between an integer and a pointer? – Embedded in Academia
"it is a big mistake to try to understand pointers in a programming language as if they follow the same rules as pointer-sized integer values. Even people who have come to terms with [undefined behavior] and its consequences are often surprised by this."
programming  compiler  c  c++ 
9 weeks ago
Solved: Fan noise - 16port 150W vs 24port 500W - Ubiquiti Networks Community
"I have half the ports on my 16 port providing POE to Unifi video cameras and Unifi APs and the fans aren't even on, nor have they been whenever I have looked at the properties.  
Can't get much quieter than not running"
networking  hardware  ubuntu 
10 weeks ago
"Weird Al" Is Rivers Cuomo in Weezer's Very Familiar Video for "Africa" - Noisey
"It means that a Twitter joke started by a 14-year-old kid now involves a beloved parodist who's been around since the mid-70s, a song released in 1981, and a video that came out in 1994."
music  memes  weezer 
11 weeks ago
weezer cover africa by toto on Twitter:
"@RiversCuomo it's about time you bless the rains down in africa"
music  memes  weezer 
11 weeks ago
Why I’m done with Chrome – A Few Thoughts on Cryptographic Engineering
"Today I wanted to write specifically about Google Chrome, how much I’ve loved it in the past, and why — due to Chrome’s new user-unfriendly forced login policy — I won’t be using it going forward."
software  web  google  privacy 
12 weeks ago
Scott And Scurvy (Idle Words)
"Somehow a highly-trained group of scientists at the start of the 20th century knew less about scurvy than the average sea captain in Napoleonic times. Scott left a base abundantly stocked with fresh meat, fruits, apples, and lime juice, and headed out on the ice for five months with no protection against scurvy, all the while confident he was not at risk. What happened?"
history  science  health 
12 weeks ago
Temperature log - Introduction | Raspberry Pi Projects
"The system on a chip (SoC) of the Raspberry Pi has a temperature sensor that can be used to measure its temperature from the command line. It can provide information on how much heat the chip has generated during operation and also report on the temperature of the environment. This project’s aim is to create a simple Python script that can run automatically as you boot up your Raspberry Pi, take measurements from the temperature sensor at given intervals, and write them into log files that can be viewed later. You’ll also be able to view the data as an interactively plotted graph."
sysadmin  raspberry-pi 
12 weeks ago
Entity Component System - Alemil: Gamedev blog
"ECS (Entity Component System) is a great architectural pattern that is perfect for building medium to big games, that offers some advantages over traditional OOP (Object Oriented Programming). In short, when using ECS, every game object consists of Entity - unique ID, multiple Components that hold data, and Systems that operate on and manipulate components. This separation allows for much easier implementation of independent features than big objects built with inheritance."
programming  design  patterns  oop 
12 weeks ago
Best practices for writing Dockerfiles | Docker Documentation
"This document covers recommended best practices and methods for building efficient images."
sysadmin  docker  advice 
september 2018
Lessons Learned from deploying a UniFi network at home
"As it turns out, to get a UniFi network running at home you actually do need to care about a few things. I aim to guide you through these."
sysadmin  networking  unifi  home  howto 
september 2018
Alpine Linux | A security-oriented, lightweight Linux distribution based on musl libc and busybox
"Alpine Linux is an independent, non-commercial, general purpose Linux distribution designed for power users who appreciate security, simplicity and resource efficiency." Very useful for Docker containers, given it's small footprint (~5 MB).
sysadmin  unix  linux 
september 2018
Profiling ZSH startup time | Kevin Burke
"A new /bin/bash login shell loads instantaneously and I was wondering why my ZSH startup was so slow, and if there was anything I could do to make it faster. My goal was to get to a command prompt in under 100 milliseconds."
shell  zsh  performance 
september 2018
The Nintendo King and the Midlife Crisis | WIRED
An article about "Pat the NES Punk," Pat Contri.
video  games  nintendo 
september 2018
I’ve Been Reporting on MS-13 for a Year. Here Are the 5 — ProPublica
"The gang is not invading the country. They’re not posing as fake families. They’re not growing. To stop them, the government needs to understand them."
politics  america  crime  immigration 
september 2018
[Video] A Night at the Garden
"In 1939, New York's Madison Square Garden was host to an enormous—and shocking—gathering of 22,000 Americans that has largely been forgotten from our history."
politics  america  nazi  fascism 
september 2018
Pi-Hole on Synology in Docker - ServiceMax
"I have plenty of spare Raspberry Pi devices but I wanted to do this without adding another device to the network. I have plenty of computing power already, so I made the decision to add the service as a Docker appliance on my Synology DS1817+."
sysadmin  synology  pi-hole  docker 
september 2018
Agile Otter Blog: TDD: more to know
"I have been gathering little sound bites for you which may help you build your skills and knowledge."
programming  test  unit  tdd 
september 2018
SOLID Principles Around You – Oleksii Trekhleb – Medium
"In this article I want to briefly go through SOLID principles (acronym that stands for five basic principles of object-oriented programming and design) supplying each of them with real-world visual examples to make those principles more understandable, readable and memorizable."
programming  design  patterns  architecture 
september 2018
Time-travelling exploits with Meltdown – Pwn All The Things – Medium
"This past week there’s been a lot of speculation over two new processor vulnerabilities called Meltdown and Spectre. In this post I’ll talk about Meltdown. I’ll talk about Spectre elsewhere later."
security  cpu  architecture 
september 2018
"Most beginners start out exploring electronics and embedded control by making an LED do something. This is great it’s easy to wire up and you can actually see something happening. With an Arduino you only need one LED and one resistor and their are lots of examples around. Unfortunately their is also a lot of confusion, muddle and downright rubbish about such a simple thing. This page give you the truth and reasons behind the calculations you need to do."
electronics  hardware  led 
september 2018
The Militarization of Sports and the Redefinition of Patriotism
"Sports were sports. Military service was military service. And never the twain shall meet.

Since 9/11, however, sports and the military have become increasingly fused in this country."
politics  sports  military 
september 2018
Haskell for all: Advice for Haskell beginners
"This post summarizes advice that I frequently give to Haskell beginners asking how to start out learning the language."
programming  languages  haskell 
september 2018
Blocklist Collection ¦ Firebog
"The Internet is full of unsavoury content: advertisers wanting to sell you stuff you don't need, trackers extracting and selling your data as if it were oil, and malicious content vying to hijack your favourite device. This collection hopes to help you minimise these issues, and to maintain a more enjoyable online presence, using the wonderful, free and open source utility known as Pi-hole."
sysadmin  dns  list  pi-hole 
september 2018
The Total Beginner's Guide to Game AI - Artificial Intelligence -
"This article will introduce you to a range of introductory concepts used in artificial intelligence for games (or ‘Game AI’ for short) so that you can understand what tools are available for approaching your AI problems, how they work together, and how you might start to implement them in the language or engine of your choice."
programming  video  games  ai 
september 2018
Party Like It's 1985: Making NES Games in Assembly — We RISE Tech Conference
"In this workshop, we will explore assembly development for the NES using a modern toolkit, building playable games the same way commercial developers did in the 80's."
programming  video  games  nintendo  nes  assembly  6502 
september 2018
N3 I/O Tips & Tricks
"Phew, I think that’s all the stuff that’s good-to-know when doing file IO in Nebula3. Please note that this was all about synchronous I/O. For asynchronous IO the IO::IoInterface interface-singleton is used, this simply launches a thread with its own thread-local IoServer, and IO operations are sent to the IO thread using Message objects (which in turn need to be checked for completion of the IO operation). It’s not much more complicated then synchronous IO. However I’m planning to do a few changes under the hood for asynchronous IO to enable better platform-specific optimizations in the future."
programming  languages 
september 2018
How YouTube’s A.I. boosts alternative facts – Guillaume Chaslot – Medium
"We all heard about conspiracy theories, alternative facts and fake news circulating on the internet. How do they become so popular? What’s the impact of the state-of-the-art algorithms on their success? Having worked on YouTube’s recommendation algorithm, I started investigating, and came to the conclusion that the powerful algorithm I helped build plays an active role in the propagation of false information."
politics  news 
september 2018
Stephen Miller: Trump’s Right-Hand Troll - The Atlantic
"Stephen Miller once tormented liberals at Duke. Now the president’s speechwriter and immigration enforcer is deploying the art of provocation from the White House."
september 2018
The best Mario Kart character according to data science
"My Mario Kart reflexes aren’t what they used to be, but I am better at data science than I was as a fourth grader, so in this post I’ll use data to finally answer the question “Who is the best character in Mario Kart?”"
video  games  mario  kart 
september 2018
C Is Not a Low-level Language - ACM Queue
"In the wake of the recent Meltdown and Spectre vulnerabilities, it's worth spending some time looking at root causes. Both of these vulnerabilities involved processors speculatively executing instructions past some kind of access check and allowing the attacker to observe the results via a side channel. The features that led to these vulnerabilities, along with several others, were added to let C programmers continue to believe they were programming in a low-level language, when this hasn't been the case for decades."
security  hardware  software  computer  languages  c  cpu 
september 2018
FiloSottile/mkcert: A simple zero-config tool to make locally trusted development certificates with any names you'd like.
"mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration."
sysadmin  security  ssl 
september 2018
Middle Earth Map Style – Adventures In Mapping
"Here are a couple maps made to resemble the epic collaboration of JRR (oops, turns out it was Christopher) Tolkien and Pauline Baynes."
maps  design 
september 2018
Semiconductor Engineering .:. FPGAs Becoming More SoC-Like
"FPGAs are blinged-out rockstars compared to their former selves. No longer just a collection of look-up tables (LUTs) and registers, FPGAs have moved well beyond into now being architectures for system exploration and vehicles for proving a design architecture for future ASICs."
electronics  design  fpga 
september 2018
EMC basics and practical PCB design tips
"In summary, it’s always best to design with EMC in mind, rather than risk board re-spins, but you must have a clear understanding of which EMC rules will apply to your project. Also, having an EMC analysis capability embedded within the PCB design CAD tool can greatly reduce the risk of EMC compliance failure once the board is manufactured; but make sure the tool’s rule checker is based on well-documented and verified EMC principles and explanations. And never simulate unless a) you trust the simulator and b) you have a feel for what the results will be."
electronics  pcb  design 
september 2018
So You Wanna Buy a Vacuum Sealer? | ChefSteps
"There are plenty of inexpensive external vacuum sealers that work perfectly for home cooks and take up way less room in your already crowded kitchen."
cooking  sous-vide 
september 2018
The Weird History Of The Super NES CD-ROM, Nintendo's Most Notorious Vaporware
"The legacy of the Super NES CD-ROM is also one of historical misinformation, confusion, and outright myths."
video  games  history  nintendo  snes  cd 
september 2018
WhereGoes? - A tool for tracing the redirect path of URLs
"WhereGoes does 1 thing: it takes a URL and shows you the entire path of redirects and meta-refreshes that leads to the final destination."
sysadmin  web  dev  spam 
september 2018
How To Encrypt Traffic to Redis with Spiped on Ubuntu 16.04 | DigitalOcean
"In this guide, we will demonstrate how to encrypt Redis traffic using a secure piping program called spiped. Traffic between Redis clients and servers will be routed through a dedicated encrypted tunnel, similar to a dedicated SSH tunnel. We will be using two Ubuntu 16.04 servers to demonstrate."
sysadmin  linux  security  encryption 
september 2018
Remote Redis: Spiped vs Stunnel – Its Chris!
"As we can see, spiped seems to be hitting some kind of bottleneck, limiting the numbers regardless of the tests performed. The problem here appears to be that spiped pads messages:"
sysadmin  security  performance  comparison 
september 2018
How To Encrypt Traffic to Redis with Stunnel on Ubuntu 16.04 | DigitalOcean
"In this guide, we will demonstrate how to encrypt Redis traffic using a secure tunneling program called stunnel. Traffic between Redis clients and servers will be routed through a dedicated SSL encrypted tunnel. We will be using two Ubuntu 16.04 servers to demonstrate."
sysadmin  linux  security  encryption 
september 2018
« earlier      
per page:    204080120160

Copy this bookmark:

to read