recentpopularlog in
« earlier  
linux - Run perf without root-rights - Super User
"I have an application I would like to benchmark which doesn't need root and I don't want to run it as root to benchmark it."
sysadmin  linux  performance  profiling 
7 days ago
Linux Profiling tools and techniques
"GNU/Linux profiling and monitoring tools are currently progressing rapidly, and are in some flux, but I'll summarise the readily available utils below."
programming  linux  profiling  tools  sysadmin 
7 days ago
nyanpasu64/j0CC-FamiTracker: Numerous bugfixes for 0CC-FamiTracker (based off 0.3.14.5).
"This is a fork of HertzDevil's 0CC-Famitracker 0.3.14.5 (since 0.3.15.1 and master are quite buggy and changing rapidly). It contains bugfixes which HertzDevil has not merged yet (some for months, some fixed independently in 0.3.15.1 or master), as well as N163 multi-wave copy-paste support."
video  game  music  nintendo  nes  software  windows 
7 days ago
HertzDevil/0CC-FamiTracker: Extension of jsr's FamiTracker
"0CC-FamiTracker is a modified version of FamiTracker that incorporates various bug fixes and new features which work in exported NSFs as well. The name "0CC" comes from the author's favourite arpeggio effect command."
music  video  game  nintendo  nes  software  windows 
7 days ago
Atop Command Tutorial With Examples To Monitor Linux System Metrics – POFTUT
"Atop is a monitoring tool which is mainly developed for command line usage. It is capable of showing detailed information about process, memory, disk network information and metrics. Atop commands provides more details than popular top command."
sysadmin  performance  monitoring  linux 
7 days ago
ATOP for Linux server performance analysis (Guide)
"Atop is an ASCII full-screen performance monitor which can log and report the activity of all server processes. One feature I really like is that atop will stay active in the background for long-term server analysis (up to 28 days by default). Other advantages include:"
sysadmin  performance  monitoring  linux 
7 days ago
Using htop to Monitor System Processes on Linux
"The first great thing about htop is that it will show you your usage per CPU, as well as a meaningful text graph of your memory and swap usage right at the top. I find this much easier to understand at a glance than the default output from top."
sysadmin  performance  monitoring  linux 
7 days ago
htop: Quick Guide & Customization
"htop is an interactive system-monitor, but also a process-viewer, process-manager, strace tool and more. Sysadmins may opt to use htop in cases where Unix top does not provide enough information about system processes."
sysadmin  performance  monitoring  linux 
7 days ago
Noel Berry on how they embedded Celeste Classic
Noel Berry on Twitter: "@obskyr @lexaloffle @cleverpidgeon Ported the celeste pico-8 LUA code to C# line-by-line. Only took a few hours and was easy to add the pico8 engine methods to ours (spr, map)" / Twitter
video  games  pico8 
13 days ago
Domain-Oriented Observability
"Observability in our software systems has always been valuable and has become even more so in this era of cloud and microservices. However, the observability we add to our systems tends to be rather low level and technical in nature, and too often it seems to require littering our codebase with crufty, verbose calls to various logging, instrumentation, and analytics frameworks. This article describes a pattern that cleans up this mess and allows us to add business-relevant observability in a clean, testable way."
programming  architecture  unittest  testing  logging 
5 weeks ago
Why Public Wi-Fi is a Lot Safer Than You Think | Electronic Frontier Foundation
"In general, using public Wi-Fi is a lot safer than it was in the early days of the Internet. With the widespread adoption of HTTPS, most major websites will be protected by the same encryption regardless of how you connect to them.

There are plenty of things in life to worry about. You can cross “public Wi-Fi” off your list."
privacy  encryption  wifi 
7 weeks ago
The Joy of Coding: Observable – David Maynard: Software Artist
"This is a story about my experience exploring Observable "The magic notebook for exploring data and thinking with code.""
programming  javascript 
8 weeks ago
The Best Python IDEs and Code Editors
"As far as Python developers are concerned, PyCharm wins the popularity contest, with Visual Studio Code being the runner-up. But since IDEs and editors are highly specialized, these two may not fit your individual needs."
programming  python  editor  ide 
8 weeks ago
More video evidence of Astros cheating in 2017 emerges | Larry Brown Sports
"Jomboy has gone through several Astros games from the 2017 season and uncovered numerous instances when an obvious banging sound could be heard before an off-speed pitch was thrown to a Houston hitter. Here are several examples:"
sports  basebal  cheating  l  analytics 
8 weeks ago
Sign Stealing Scandal
"I’m an Astros fan. They cheated during the 2017 regular season — the evidence is clear. In an attempt to understand the scope of the cheating and the players involved, I decided to listen to every pitch from the Astros’ 2017 home games and log any banging noise I could detect. These are the results of my efforts. I’ve logged over 8,200 pitches and found banging before over 1,100 of those pitches."
sports  baseball  cheating  analytics 
8 weeks ago
The Astros stole signs electronically in 2017 — part of a much broader issue for Major League Baseball – The Athletic
"When the onlookers believed they had decoded the signs, the expected pitch would be communicated via a loud noise — specifically, banging on a trash can, which sat in the tunnel. Normally, the bangs would mean a breaking ball or offspeed pitch was coming."
sports  baseball  cheating 
8 weeks ago
ChunkyPNG
"ChunkyPNG a pure Ruby library that can read and write PNG files. It aims to be able to read any image conforms to, the PNG standard, give read/write access to the image’s pixels and metadata, and efficiently encode images."
programming  ruby  library  image  png 
9 weeks ago
J.K. Rowling Archive - Wizarding world
"Explore the inner workings of the wizarding world with a collection of writing from J.K. Rowling"
harrypotter 
9 weeks ago
[PDF] Flower_Fields.pdf - Box
"Flower Fields - Kirby's Epic Yarn"
music  video  games  kirby 
9 weeks ago
Usage Tables for HID Power Devices 1.0 | USB-IF
"The Usage Tables for HID Power Devices 1.0 specification provides information to guide implementers in using the USB logical structures for Power Devices, OS designers, BIOS designers, and peripheral and UPS designers can use the common descriptors, of USB Power Device Usages and Reports."
hardware  usb  specification 
9 weeks ago
Linux-USB Gadget API Framework
"The <linux/usb_gadget.h> API makes it easy for peripherals and other devices embedding GNU/Linux system software to act in the USB "device" (slave) role. The drivers implementing and using that API combine to make a useful driver framework for Linux systems that implement USB peripherals."
programming  embedded  usb  linux  hardware  gadget 
9 weeks ago
Query Expressions - F# | Microsoft Docs
"Query expressions are a type of computation expression similar to sequence expressions. Just as you specify a sequence by providing code in a sequence expression, you specify a set of data by providing code in a query expression. In a sequence expression, the yield keyword identifies data to be returned as part of the resulting sequence. In query expressions, the select keyword performs the same function. In addition to the select keyword, F# also supports a number of query operators that are much like the parts of a SQL SELECT statement."
programming  languages  f# 
9 weeks ago
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis by Adam Tornhill | The Pragmatic Bookshelf
"Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that’s just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code!"
programming  books  architecture 
9 weeks ago
Gargoyle : Interactive Fiction
"Gargoyle is an IF player that supports all the major interactive fiction formats."
software  games  interactive  fiction 
9 weeks ago
Pi Zero W power through usb socket - Raspberry Pi Stack Exchange
"In other words: yes, you can do both things at the same time. This is exactly what both ports are for."
raspberry-pi  usb  power  hardware 
9 weeks ago
Clojure Concurrency Tutorial for Beginners with Code Examples
"In this tutorial, you'll learn 16 ways for doing concurrency in Clojure including how to start threads and how to communicate between them."
programming  concurrency  clojure  tutorial 
9 weeks ago
GitHub - MitchellSternke/SuperMarioBros-C: An attempt to translate the original Super Mario Bros. for the NES to readable C/C++
"An attempt to translate the original Super Mario Bros. for the NES to readable C/C++.

I've taken the smbdis.asm disassembly of Super Mario Bros. and successfully converted it to C++ using an automated codegen program I wrote (which you can be found in the codegen/ subdirectory of the repo). Right now, it looks very similar to the original disassembly and is fairly dense code, but it works! Check out source/SMB/SMB.cpp if you're curious."
video  games  smb  reverse-engineering 
9 weeks ago
GitHub - historicalsource/zork1: Zork I (Microcomputer Version) by Infocom
"The source code was contributed anonymously and represents a snapshot of the Infocom development system at time of shutdown - there is no remaining way to compare it against any official version as of this writing, and so it should be considered canonical, but not necessarily the exact source code arrangement for production."
video  games  history  code 
9 weeks ago
[Help Thread] - How to Get Faster using the Fridrich / CFOP Method | SpeedSolving Puzzles Community
"Welcome! This thread will be a guide to help you get faster at solving the Rubik’s Cube using the popular Fridrich/CFOP method. Please read this thread and do some forum searching prior to asking questions about becoming faster."
speedcube  tutorial 
9 weeks ago
Crash course in Swift's 'function builders' with SwiftUI
"This is yet another post in a series of posts on some of the new Swift 5.1 features seen in Swift UI (introduced at WWDC19). I’ll discuss function builders if you’re not already familiar with them which are a pretty simple yet consise way to create data structures."
programming  swift 
9 weeks ago
swift-evolution/XXXX-function-builders.md at 9992cf3c11c2d5e0ea20bee98657d93902d5b174 · apple/swift-evolution · GitHub
"This proposal describes function builders, a new feature which allows certain functions (specially-annotated, often via context) to implicitly build up a value from a sequence of components."
programming  swift 
9 weeks ago
The Making of a YouTube Radical - The New York Times
"In the video, he told the story of how, as a liberal college dropout struggling to find his place in the world, he had gotten sucked into a vortex of far-right politics on YouTube."
politics  youtube 
9 weeks ago
NES Emulator Debugging
"This post is not about making an emulator.

It is about the nightmarish, overwhelmingly complex, and at times seemingly hopeless task of hunting down the parts of your emulator that don’t behave exactly like the real hardware."
programming  video  games  emulator  nintendo  nes 
9 weeks ago
Fran Lebowitz on Race and Racism | Vanity Fair
"In our October 1997 issue, the famously contrarian humorist spells it out in black and white."
racism 
9 weeks ago
Super Metroid and A Link to the Past Combo Randomizer
"This randomizer mixes Super Metroid and A Link to the Past together into one experience and will randomize both games items to any location in either game creating a new kind of multi-game challenge. The goal is to kill both Ganon and Mother Brain and then finish either game.

Travel between the two game can be done by using certain doors and entrances in either game, a list of those can be found in the document linked below."
video  games  metroid  zelda 
9 weeks ago
Linked lists - Data structures in practice
"Although linked lists work well for representing variable data, they can cause performance problems in time-critical apps due to poor cache locality.

For example, when DOOM 3 was rewritten to run at 60FPS, the developers identified the use of linked lists as a major performance issue (see the DOOM 3 technical note for details)."
programming  algorithms  c 
9 weeks ago
I Accidentally Uncovered a Nationwide Scam Run by Fake Hosts on Airbnb - VICE
"While searching for the person who grifted me in Chicago, I discovered just how easy it is for users of the short-term rental platform to get exploited."
news 
9 weeks ago
Inside TurboTax’s 20-Year Fight to Stop Americans From Filing Their Taxes for Free — ProPublica
"Using lobbying, the revolving door and “dark pattern” customer tricks, Intuit fended off the government’s attempts to make tax filing free and easy, and created its multi-billion-dollar franchise."
finance  taxes  politics 
9 weeks ago
The Most Effective Way of Organizing Your Files and Folders
"Let’s look at some good practices for keeping your files and documents neat, in folders and easily searchable and accessible."
organization  advice 
9 weeks ago
I2C in a Nutshell | Interrupt
"I2C is perhaps the most commonly used bus to connect ICs together. As such, firmware engineers encounter it on most projects. In this post, we explain how I2C works, explore common bugs and investigate how to debug these issues."
programming  hardware  embedded  electronics  serial 
10 weeks ago
X Macro - Wikipedia
"Usage of X Macros dates back to the 1960s. It remains useful also in modern-day C and C++ programming languages, but remains relatively unknown."
programming  c  preprocessor  x-macro 
10 weeks ago
Reduce C language coding errors with X macros: Part 3 - Embedded.com
"This article, last in a series of discussions of x macro usage, examines how to use x macros to automate the task of configuring jump tables and lookup tables used by communication handlers."
programming  c  preprocessor  x-macro 
10 weeks ago
Reduce C- language coding errors with X-macros - Part 2 - Embedded.com
"This article continues the discussion in Part 1 regarding the use of X macros. Here I will examine several more uses of X macros that relieve the programmer from having to manually enforce dependencies and perform data structure sizing calculations."
programming  c  preprocessor  x-macro 
10 weeks ago
The Story of the PING Program
"Yes, it's true! I'm the author of ping for UNIX. Ping is a little thousand-line hack that I wrote in an evening which practically everyone seems to know about. :-)"
sysadmin  networking  history 
10 weeks ago
Using Combine
"This is an intermediate to advanced book, focusing fairly narrowly on how to use the Combine framework provided by Apple. The writing and examples expect that you have a solid understanding of Swift including reference and value types, protocols, and comfort with using common elements from the Foundation framework."
programming  swift  combine 
10 weeks ago
Why Averages Suck and Percentiles are Great | Dynatrace blog
"Anyone that ever monitored or analyzed an application uses or has used averages. They are simple to understand and calculate. We tend to ignore just how wrong the picture is that averages paint of the world. To emphasis the point let me give you a real-world example outside of the performance space that I read recently in a newspaper."
sysadmin  metrics  statistics  performance 
10 weeks ago
GitHub - n64decomp/sm64: A Super Mario 64 decompilation, brought to you by a bunch of clever folks.
"This repo contains a full decompilation of Super Mario 64 (J) and (U). The source and data have been decompiled but complete naming and documentation all of the code and data is still a work in progress. Decompiling the (E) ROM is also an ongoing effort."
video  games  reverse-engineering  nintendo  n64  mario64 
10 weeks ago
Dungeon of Numenas by Amegpo
"Dungeon of Numenas is a PICO-8 platformer in which you have been trapped by your nemesis, Numenas. In order to escape, you need to find orbs scattered through the dungeon which grant you special powers, which you will need to defeat Numenas."
video  games  pico8 
10 weeks ago
Sudoku Puzzle solving strategies
"There are only a few strategies that you need to know in order to solve Sudoku puzzles. Please take a look at our Sudoku introduction page for background on terminology and also our theory page. Sudoku Dragon comes with a range of guides that take you through these strategies step by step. You can share your tips and experiences on our strategy message forum. There follows a summary of the techniques you may find useful up to 'advanced' level."
sudoku  games  strategy  algorithms 
10 weeks ago
Sheepolution - How to LÖVE - Chapter 13 - Detecting collision
"It works! Now you know how to detect collision between two rectangles."
programming  video  games  love2d  lua 
10 weeks ago
[PDF] DOOM 3 BFG Technical Note
"This technical note describes some of the performance issues encountered during the development of DOOM 3 BFG."
programming  video  games  doom 
10 weeks ago
If you’re not using SSH certificates you’re doing SSH wrong - smallstep
"None of these issues are actually inherent to SSH. They’re actually problems with SSH public key authentication. The solution is to switch to certificate authentication.

SSH certificate authentication makes SSH easier to use, easier to operate, and more secure."
sysadmin  ssh  security  authentication 
10 weeks ago
INFINITE NES LIVES
New Nintendo NES hardware (PCBs, etc.)
hardware  nintendo  nes  pcb 
10 weeks ago
Against TDD
"What if you tried TDD and it didn’t “work” (whatever that means), but in fact the thing you tried wasn’t TDD at all? If you can set aside the certainty that you are incapable of making a mistake, just for the sake of discussion, then what would this sort of mistake look like?"
programming  unit  test  add 
10 weeks ago
Unit tests are tests of modularity
"People often make the case that it is better to cover an application with “smoke tests” before making any changes. It seems like a good idea, but in practice, the further away we test from the place where we are making changes, the harder it is to formulate test cases that cover that particular part of code. In software, we formulate test cases by tweaking values in our tests over and over again and checking behavior. When our tests are far away from the code we are changing, it feels like trying to hit a small target with a rock from an airplane. You might have to try a few times. Testing is easier when we are closer to the place where we are making a change. It’s just unfortunate that a lot of code lacks the modularity that would make that easy."
programming  unit  test  testing 
10 weeks ago
Tutorial series for simulating NES Graphics – BIT INK STUDIOS
"On my twitter page (follow me if you haven’t yet!) I’ve been creating a few very quick tutorials to help people understand what NES graphics mean. I see a lot of people doing pixel art and just calling it “8-bit” or “NES style”, but a lot of the time it misses the target by a fair margin. Hopefully these will help clarify why. You can click on any image to see the original tweet."
graphics  nintendo  nes  video  games  design 
10 weeks ago
« earlier      
per page:    204080120160

Copy this bookmark:





to read