recentpopularlog in
« earlier  
Stop cherry-picking, start merging, Part 1: The merge conflict – The Old New Thing
"This is the start of a series that will begin by explaining why cherry-picking is bad, continue by explaining why cherry-picking is worse, then try to talk you down from the ledge by showing how to get the same effect as a cherry-pick but with merging, showing how to apply that technique to the case where you need to do a retroactive merge, and wrap up by showing how to apply that technique to the case where you already made the mistake of cherry-picking and want to fix it before something bad or worse happens."
version-control  git 
2 days ago
Stop cherry-picking, start merging: Index – The Old New Thing
"Here's an index to the "Stop cherry-picking, start merging" series that just completed, if that's the sort of thing you are into:"
version-control  git 
2 days ago
What’s the difference between an integer and a pointer? – Embedded in Academia
"it is a big mistake to try to understand pointers in a programming language as if they follow the same rules as pointer-sized integer values. Even people who have come to terms with [undefined behavior] and its consequences are often surprised by this."
programming  compiler  c  c++ 
4 days ago
Solved: Fan noise - 16port 150W vs 24port 500W - Ubiquiti Networks Community
"I have half the ports on my 16 port providing POE to Unifi video cameras and Unifi APs and the fans aren't even on, nor have they been whenever I have looked at the properties.  
 
Can't get much quieter than not running"
networking  hardware  ubuntu 
11 days ago
"Weird Al" Is Rivers Cuomo in Weezer's Very Familiar Video for "Africa" - Noisey
"It means that a Twitter joke started by a 14-year-old kid now involves a beloved parodist who's been around since the mid-70s, a song released in 1981, and a video that came out in 1994."
music  memes  weezer 
22 days ago
weezer cover africa by toto on Twitter:
"@RiversCuomo it's about time you bless the rains down in africa"
music  memes  weezer 
22 days ago
Why I’m done with Chrome – A Few Thoughts on Cryptographic Engineering
"Today I wanted to write specifically about Google Chrome, how much I’ve loved it in the past, and why — due to Chrome’s new user-unfriendly forced login policy — I won’t be using it going forward."
software  web  google  privacy 
24 days ago
Scott And Scurvy (Idle Words)
"Somehow a highly-trained group of scientists at the start of the 20th century knew less about scurvy than the average sea captain in Napoleonic times. Scott left a base abundantly stocked with fresh meat, fruits, apples, and lime juice, and headed out on the ice for five months with no protection against scurvy, all the while confident he was not at risk. What happened?"
history  science  health 
26 days ago
Temperature log - Introduction | Raspberry Pi Projects
"The system on a chip (SoC) of the Raspberry Pi has a temperature sensor that can be used to measure its temperature from the command line. It can provide information on how much heat the chip has generated during operation and also report on the temperature of the environment. This project’s aim is to create a simple Python script that can run automatically as you boot up your Raspberry Pi, take measurements from the temperature sensor at given intervals, and write them into log files that can be viewed later. You’ll also be able to view the data as an interactively plotted graph."
sysadmin  raspberry-pi 
26 days ago
Entity Component System - Alemil: Gamedev blog
"ECS (Entity Component System) is a great architectural pattern that is perfect for building medium to big games, that offers some advantages over traditional OOP (Object Oriented Programming). In short, when using ECS, every game object consists of Entity - unique ID, multiple Components that hold data, and Systems that operate on and manipulate components. This separation allows for much easier implementation of independent features than big objects built with inheritance."
programming  design  patterns  oop 
26 days ago
Best practices for writing Dockerfiles | Docker Documentation
"This document covers recommended best practices and methods for building efficient images."
sysadmin  docker  advice 
4 weeks ago
Lessons Learned from deploying a UniFi network at home
"As it turns out, to get a UniFi network running at home you actually do need to care about a few things. I aim to guide you through these."
sysadmin  networking  unifi  home  howto 
4 weeks ago
Alpine Linux | A security-oriented, lightweight Linux distribution based on musl libc and busybox
"Alpine Linux is an independent, non-commercial, general purpose Linux distribution designed for power users who appreciate security, simplicity and resource efficiency." Very useful for Docker containers, given it's small footprint (~5 MB).
sysadmin  unix  linux 
4 weeks ago
Profiling ZSH startup time | Kevin Burke
"A new /bin/bash login shell loads instantaneously and I was wondering why my ZSH startup was so slow, and if there was anything I could do to make it faster. My goal was to get to a command prompt in under 100 milliseconds."
shell  zsh  performance 
4 weeks ago
The Nintendo King and the Midlife Crisis | WIRED
An article about "Pat the NES Punk," Pat Contri.
video  games  nintendo 
5 weeks ago
I’ve Been Reporting on MS-13 for a Year. Here Are the 5 — ProPublica
"The gang is not invading the country. They’re not posing as fake families. They’re not growing. To stop them, the government needs to understand them."
politics  america  crime  immigration 
5 weeks ago
[Video] A Night at the Garden
"In 1939, New York's Madison Square Garden was host to an enormous—and shocking—gathering of 22,000 Americans that has largely been forgotten from our history."
politics  america  nazi  fascism 
5 weeks ago
Pi-Hole on Synology in Docker - ServiceMax
"I have plenty of spare Raspberry Pi devices but I wanted to do this without adding another device to the network. I have plenty of computing power already, so I made the decision to add the service as a Docker appliance on my Synology DS1817+."
sysadmin  synology  pi-hole  docker 
5 weeks ago
Agile Otter Blog: TDD: more to know
"I have been gathering little sound bites for you which may help you build your skills and knowledge."
programming  test  unit  tdd 
5 weeks ago
SOLID Principles Around You – Oleksii Trekhleb – Medium
"In this article I want to briefly go through SOLID principles (acronym that stands for five basic principles of object-oriented programming and design) supplying each of them with real-world visual examples to make those principles more understandable, readable and memorizable."
programming  design  patterns  architecture 
5 weeks ago
Time-travelling exploits with Meltdown – Pwn All The Things – Medium
"This past week there’s been a lot of speculation over two new processor vulnerabilities called Meltdown and Spectre. In this post I’ll talk about Meltdown. I’ll talk about Spectre elsewhere later."
security  cpu  architecture 
5 weeks ago
LEDs
"Most beginners start out exploring electronics and embedded control by making an LED do something. This is great it’s easy to wire up and you can actually see something happening. With an Arduino you only need one LED and one resistor and their are lots of examples around. Unfortunately their is also a lot of confusion, muddle and downright rubbish about such a simple thing. This page give you the truth and reasons behind the calculations you need to do."
electronics  hardware  led 
5 weeks ago
The Militarization of Sports and the Redefinition of Patriotism
"Sports were sports. Military service was military service. And never the twain shall meet.

Since 9/11, however, sports and the military have become increasingly fused in this country."
politics  sports  military 
5 weeks ago
Haskell for all: Advice for Haskell beginners
"This post summarizes advice that I frequently give to Haskell beginners asking how to start out learning the language."
programming  languages  haskell 
5 weeks ago
Blocklist Collection ¦ Firebog
"The Internet is full of unsavoury content: advertisers wanting to sell you stuff you don't need, trackers extracting and selling your data as if it were oil, and malicious content vying to hijack your favourite device. This collection hopes to help you minimise these issues, and to maintain a more enjoyable online presence, using the wonderful, free and open source utility known as Pi-hole."
sysadmin  dns  list  pi-hole 
5 weeks ago
The Total Beginner's Guide to Game AI - Artificial Intelligence - GameDev.net
"This article will introduce you to a range of introductory concepts used in artificial intelligence for games (or ‘Game AI’ for short) so that you can understand what tools are available for approaching your AI problems, how they work together, and how you might start to implement them in the language or engine of your choice."
programming  video  games  ai 
5 weeks ago
Party Like It's 1985: Making NES Games in Assembly — We RISE Tech Conference
"In this workshop, we will explore assembly development for the NES using a modern toolkit, building playable games the same way commercial developers did in the 80's."
programming  video  games  nintendo  nes  assembly  6502 
5 weeks ago
N3 I/O Tips & Tricks
"Phew, I think that’s all the stuff that’s good-to-know when doing file IO in Nebula3. Please note that this was all about synchronous I/O. For asynchronous IO the IO::IoInterface interface-singleton is used, this simply launches a thread with its own thread-local IoServer, and IO operations are sent to the IO thread using Message objects (which in turn need to be checked for completion of the IO operation). It’s not much more complicated then synchronous IO. However I’m planning to do a few changes under the hood for asynchronous IO to enable better platform-specific optimizations in the future."
programming  languages 
5 weeks ago
How YouTube’s A.I. boosts alternative facts – Guillaume Chaslot – Medium
"We all heard about conspiracy theories, alternative facts and fake news circulating on the internet. How do they become so popular? What’s the impact of the state-of-the-art algorithms on their success? Having worked on YouTube’s recommendation algorithm, I started investigating, and came to the conclusion that the powerful algorithm I helped build plays an active role in the propagation of false information."
politics  news 
5 weeks ago
Stephen Miller: Trump’s Right-Hand Troll - The Atlantic
"Stephen Miller once tormented liberals at Duke. Now the president’s speechwriter and immigration enforcer is deploying the art of provocation from the White House."
politics 
5 weeks ago
The best Mario Kart character according to data science
"My Mario Kart reflexes aren’t what they used to be, but I am better at data science than I was as a fourth grader, so in this post I’ll use data to finally answer the question “Who is the best character in Mario Kart?”"
video  games  mario  kart 
5 weeks ago
C Is Not a Low-level Language - ACM Queue
"In the wake of the recent Meltdown and Spectre vulnerabilities, it's worth spending some time looking at root causes. Both of these vulnerabilities involved processors speculatively executing instructions past some kind of access check and allowing the attacker to observe the results via a side channel. The features that led to these vulnerabilities, along with several others, were added to let C programmers continue to believe they were programming in a low-level language, when this hasn't been the case for decades."
security  hardware  software  computer  languages  c  cpu 
5 weeks ago
FiloSottile/mkcert: A simple zero-config tool to make locally trusted development certificates with any names you'd like.
"mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration."
sysadmin  security  ssl 
5 weeks ago
Middle Earth Map Style – Adventures In Mapping
"Here are a couple maps made to resemble the epic collaboration of JRR (oops, turns out it was Christopher) Tolkien and Pauline Baynes."
maps  design 
5 weeks ago
Semiconductor Engineering .:. FPGAs Becoming More SoC-Like
"FPGAs are blinged-out rockstars compared to their former selves. No longer just a collection of look-up tables (LUTs) and registers, FPGAs have moved well beyond into now being architectures for system exploration and vehicles for proving a design architecture for future ASICs."
electronics  design  fpga 
5 weeks ago
EMC basics and practical PCB design tips
"In summary, it’s always best to design with EMC in mind, rather than risk board re-spins, but you must have a clear understanding of which EMC rules will apply to your project. Also, having an EMC analysis capability embedded within the PCB design CAD tool can greatly reduce the risk of EMC compliance failure once the board is manufactured; but make sure the tool’s rule checker is based on well-documented and verified EMC principles and explanations. And never simulate unless a) you trust the simulator and b) you have a feel for what the results will be."
electronics  pcb  design 
5 weeks ago
So You Wanna Buy a Vacuum Sealer? | ChefSteps
"There are plenty of inexpensive external vacuum sealers that work perfectly for home cooks and take up way less room in your already crowded kitchen."
cooking  sous-vide 
5 weeks ago
The Weird History Of The Super NES CD-ROM, Nintendo's Most Notorious Vaporware
"The legacy of the Super NES CD-ROM is also one of historical misinformation, confusion, and outright myths."
video  games  history  nintendo  snes  cd 
5 weeks ago
WhereGoes? - A tool for tracing the redirect path of URLs
"WhereGoes does 1 thing: it takes a URL and shows you the entire path of redirects and meta-refreshes that leads to the final destination."
sysadmin  web  dev  spam 
5 weeks ago
How To Encrypt Traffic to Redis with Spiped on Ubuntu 16.04 | DigitalOcean
"In this guide, we will demonstrate how to encrypt Redis traffic using a secure piping program called spiped. Traffic between Redis clients and servers will be routed through a dedicated encrypted tunnel, similar to a dedicated SSH tunnel. We will be using two Ubuntu 16.04 servers to demonstrate."
sysadmin  linux  security  encryption 
5 weeks ago
Remote Redis: Spiped vs Stunnel – Its Chris!
"As we can see, spiped seems to be hitting some kind of bottleneck, limiting the numbers regardless of the tests performed. The problem here appears to be that spiped pads messages:"
sysadmin  security  performance  comparison 
5 weeks ago
How To Encrypt Traffic to Redis with Stunnel on Ubuntu 16.04 | DigitalOcean
"In this guide, we will demonstrate how to encrypt Redis traffic using a secure tunneling program called stunnel. Traffic between Redis clients and servers will be routed through a dedicated SSL encrypted tunnel. We will be using two Ubuntu 16.04 servers to demonstrate."
sysadmin  linux  security  encryption 
5 weeks ago
You Might Not Need jQuery
"Some developers believe that jQuery is protecting us from a great demon of browser incompatibility when, in truth, post-IE8, browsers are pretty easy to deal with on their own."
programming  web  javascript  jquery 
5 weeks ago
Confusion about purpose of monthly funding goal : ynab
"Monthly funding goals are for setting aside $x each month, like if you want to save $100 each month for potential travel or something.
What I've started doing this month is using the 'Spent Last Month' quick budget button. This would give you the desired effect. Just get rid of the goals on the categories you don't want to build a balance for and use that button."
finance  ynab 
5 weeks ago
nYNAB and credit cards: Why it's not treated like any other bill : ynab
"Lots of people find credit cards in YNAB confusing. I've been doing some thinking about why, and I think one of the major reasons is revealed in one of the most common complaints:
I wish YNAB would just treat my credit card like any other bill!"
finance  ynab 
5 weeks ago
Using CSS Grid where appropriate (revisited) | Silvestar Bistrović—fearless web developer, JAMstack enthusiast, Wordpress coder, and blog writer.
"This solution is a follow-up post on my last year’s article “Using CSS Grid where appropriate”. The goal is to find a solution for navigation with an unknown number of items."
web  design  html  css 
5 weeks ago
Tarsnap - The spiped secure pipe daemon
"Spiped (pronounced "ess-pipe-dee") is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses, so that one may connect to one address (e.g., a UNIX socket on localhost) and transparently have a connection established to another address (e.g., a UNIX socket on a different system). This is similar to 'ssh -L' functionality, but does not use SSH and requires a pre-shared symmetric key."
sysadmin  networking  security  ssh 
5 weeks ago
Protecting sshd using spiped
"By running spiped on a server, configured to accept connections on port 8022 and connect to port 22 on the same host, it becomes possible to firewall off port tcp/22 completely and yet still be able to connect over SSH from anywhere in the world — as long as you have the spiped secret key, of course."
sysadmin  networking  security  ssh 
5 weeks ago
VyOS – an open source linux-based os for routers and firewalls
This is apparently what Ubiquiti uses under the hood for EdgeOS and Unifi stuff.
sysadmin  firewall  linux  distribution 
5 weeks ago
[2010] Why RAID 6 stops working in 2019 | ZDNet
"Three years ago I warned that RAID 5 would stop working in 2009. Sure enough, no enterprise storage vendor now recommends RAID 5. Now it's RAID 6, which protects against 2 drive failures. But in 2019 even RAID 6 won't protect your data. Here's why."
storage  disk  raid 
6 weeks ago
[2009] Triple-Parity RAID and Beyond - ACM Queue
"How much longer will current RAID techniques persevere? The RAID levels were codified in the late 1980s; double-parity RAID, known as RAID-6, is the current standard for high-availability, space-efficient storage. The incredible growth of hard-drive capacities, however, could impose serious limitations on the reliability even of RAID-6 systems. Recent trends in hard drives show that triple-parity RAID must soon become pervasive."
storage  disk  raid 
6 weeks ago
Patch N Repair
"PatchNRepair is easy to use and repairs almost any hard, non-porous surface. When you heat the patch it changes from rigid to formable. The high performance self-adhesive backing holds tight against water, weather, and vibration."
plastic  repair 
6 weeks ago
Setting WiFi up via the command line - Raspberry Pi Documentation
"This method is suitable if you don't have access to the graphical user interface normally used to set up WiFi on the Raspberry Pi. It is particularly suitable for use with a serial console cable if you don't have access to a screen or wired Ethernet network. Note also that no additional software is required; everything you need is already included on the Raspberry Pi."
sysadmin  raspberry-pi  networking  wifi  linux 
6 weeks ago
Generate CPU, Memory and I/O report using SAR command
"SAR stands for System Activity Report, as its name suggest sar command is used to collect,report & save CPU, Memory, I/O usage in Unix like operating system. SAR command produce the reports on the fly and can also save the reports in the log files as well."
sysadmin  performance  monitoring  tools 
7 weeks ago
GitHub - SynoCommunity/spksrc: Cross compilation framework to create native packages for the Synology's NAS
"spksrc is a cross compilation framework intended to compile and package software for Synology NAS devices."
sysadmin  synology  nas 
8 weeks ago
WOZ Disk Image Reference – applesauce
".WOZ disk images comprise all the data from a 5.25-inch floppy disk, including the exact bitstream of each track and the physical layout of the tracks on disk. These are not "cracked" copies; all the original code, including on-disk copy protection checks, are retained. When booted in a compatible emulator, these disk images pass their own copy protection checks."
apple][  disk  image  specification 
8 weeks ago
MicroPython - Python for microcontrollers
"MicroPython is a lean and efficient implementation of the Python 3 programming language that includes a small subset of the Python standard library and is optimised to run on microcontrollers and in constrained environments.l
programming  embedded  microcontroller  python 
8 weeks ago
On Apple's Love Affair With Swift - Stefan Lesser
"I wanted to write a thoughtful article in response to Dominik Wagner’s “On my misalignment with Apple’s love affair with Swift”. During my research I realized, that Chris Lattner had already done this. Sort of. 17 months before Dominik published his piece."
programming  languages  swift  objc 
9 weeks ago
macOS Sierra: Use a dynamic global hostname
"If your service provider supports secure dynamic DNS update (RFC 3007), you can give your Mac a global DNS hostname so other computers outside your local network can refer to it by name."
sysadmin  osx  dns 
9 weeks ago
Installation & Removal of Spark Plugs
"Over-tightening spark plugs or improperly cleaning the threads in the cylinder head before installation of the NEW spark plug is a very common issue that can cause thread damage. Overlooking these basics can lead to breakage issues during the next replacement."
auto  engine  maintenance 
9 weeks ago
The default OpenSSH key encryption is worse than plaintext
"If, for compatibility reasons, you need to stick to RSA, you can use ssh-keygen -o. That will produce the new format, even for old key types. You can upgrade existing keys with ssh-keygen -p -o -f PRIVATEKEY"
sysadmin  security  encryption  ssh 
10 weeks ago
« earlier      
per page:    204080120160

Copy this bookmark:





to read