recentpopularlog in

kme : interesting   123

« earlier  
ElasticSearch configuration via `gitlab.rb` (#3457) · Issues · GitLab.org / omnibus-gitlab · GitLab
Not a problem I have, just interesting. As of GitLab 12.5.something, you have to enable and configure Elasticsearch through the "Admin Area," and you have to have an active (paid) license.
gitlab  configuration  searchandindex  elasticsearch  interesting 
9 weeks ago by kme
MacPorts - Developer - Re: Macports 2.0.3/Lion 10.7.2 Perl
As "man port" says, "Available select groups are installed as subdirectories of ${prefix}/etc/select/." So you can check that directory to see what things can be selected.
macports  interesting  alternatives  portselect 
10 weeks ago by kme
How (and Why) to Log Your Entire Bash History
Interesting technique, but as mentioned in the comments, you can use Bash's built-in features to do basically the same thing.

Curiously, this was the same basic approach as in the "eternal history" article at https://debian-administration.org/article/543/Bash_eternal_history.
interesting  bash  history  histfile  promptcommand  dotfile 
july 2019 by kme
Bash test: get the directory of a script
Dude made the mistake of assuming the whole world was Linux.
whereami  bash  shellscripting  tipsandtricks  tests  interesting 
june 2019 by kme
Tracking cursor position in real-time with remote monitoring (without JavaScript) · GitHub
Tracking cursor position in real-time with remote monitoring (without JavaScript) - noscript-tracking.go
golang  tracking  css  webdevel  interesting  hack 
may 2019 by kme
bash - How to expand filenames with Tab, even when a shell variable is used in the path? - Unix & Linux Stack Exchange | https://unix.stackexchange.com/
The solution is 'shopt -s direxpand' in Bash 4.2 or later. This is (supposedly) the default on 4.1 and earlier. I learned that "Ctrl+Alt+E" does something cool when you 'set -o emacs', though:
For example, typing less $lh/acc then hitting Tab will expand to: less \$lh/access_log.

Of course, what I would like instead is less $lh/access_log or even less /var/log/httpd/access_log. (weirdly, with the cd command the autocomplete doesn't work at all in that case, this question already talks about it)

I know that there is an alternative by using shell-expand-line (default key: Ctrl+Alt+E), but it's far from perfect because it expands aliases as well, and it doesn't quote paths with special chars (spaces, ...).
bash  tabcompletion  movein  configfile  interesting 
february 2019 by kme
set locale on commandline without system-config-language - CentOS | https://www.centos.org/
So... there is basically no good solution for this out of the box? A CentOS 7 Docker container has the same problem.

<code class="language-bash">yum whatprovides \*/setlocale</code>
centos  language  locale  i18n  interesting  sysadmin 
may 2018 by kme
Manual:$wgExternalLinkTarget - MediaWiki | https://www.mediawiki.org/
<code class="language-php">$wgExternalLinkTarget = '_blank';</code>
mediawiki  configsetting  links  interesting 
march 2018 by kme
Extension:Link Attributes - MediaWiki | https://www.mediawiki.org/
Doesn't support the title attribute, though, which is the only one I cared about. :(

See, however, https://meta.wikimedia.org/wiki/Help:Link#%22Hover_box%22_on_links for a workaround.
mediawiki  extension  links  interesting 
march 2018 by kme
syntax - In a URL, what is // for? - Super User | https://superuser.com/
Protocol-less URLs are now seen as an "anti-pattern" (https://www.paulirish.com/2010/the-protocol-relative-url/), but anyway, this was interesting.

More recently, it could be argued that the double slash does have a role. Google recommend (to avoid accidentally calling insecure content from a secure page, for example) omitting the protocol from embedded resources (stylesheets, js etc), like this

<script src="//www.google.com/js/gweb/analytics/autotrack.js"></script>

So it is now apparent that such a protocol-less URL is a fully qualified URL and not a relative URL (which would begin with a single slash).
interesting  http  url  protocol  theweb 
november 2017 by kme
StreamWriter.WriteLine converting hex A0 to hex EF BF BD
"EF BF BD" is what we saw on those filenames from the BedInt jobs in January 2014.
characterencoding  illegalcharacters  unicode  interesting 
july 2015 by kme
Easiest way to add an app to the "Open With" menu? - The macosxhints Forums
tl;dr - but there may be good stuff in here. I found a solution elsewhere, which involved modifying the app bundle's 'info.plist' with Xcode.
mac  osx  finder  contextmenu  launchservices  openwith  interesting  maybesolution 
january 2014 by kme
Revenge of the Nerds

That sounds like a joke, but it happens so often to varying degrees in large programming projects that there is a name for the phenomenon, Greenspun's Tenth Rule:

Any sufficiently complicated C or Fortran program contains an ad hoc informally-specified bug-ridden slow implementation of half of Common Lisp.
phb  lisp  programming  java  management  perspective  technology  opinion  essay  interesting  history  thewaythingswere 
march 2013 by kme
python - 'int' object is not callable - Stack Overflow
"Your methods are just getting and setting an attribute. In Python, we generally do not use getters and setters—we just let users set our attributes.

* You're coming from a Java background, where one of the basic rules is always to use getter and setter methods rather than let users access attributes. The rationale for this rule is that if, at some future date, you needed to do more than just get and set (you needed to process the data), it would require an API change. Since in Python we have properties, we would not need an API change in that instance so we can safely avoid the boilerplate and cruft of setters and getters."
python  gettersandsetters  programming  pythonic  interesting 
march 2013 by kme
"Even Brendan Eich admitted...". As if I would not expect, nay demand, that Gila... | Hacker News
Prisoner's Dilemma

"The "free market" is a bogus political phrase. I'm in favor of markets: real ones that self-regulate by preventing fraud (a central clearing/blinding counter-party, bid/offer/open-interest/size transparency) and abuse of power (market winners capture governments -- this has happened throughout history, it's a big problem right now, see the Global Financial Crisis)."
webkit  nacl  dart  websql  indexeddb  google  javascript  interesting  poignant  mozilla  standards  openweb 
march 2013 by kme
Gluten-free diet fad: Are celiac disease rates actually rising? - HealthPop - CBS News
jeffreydachmd says:
Modern wheat was genetically modified in the 1970's by Norman Borlaug, a plant geneticist who won the Nobel Prize and Congressional Gold Medal for developing a high yield dwarf wheat which was a blessing because it saved two or three billion people from dying of starvation. The "curse" is the magnified adverse health effects. Changes to the gliadin protein in the new wheat have quadrupled the incidence of celiac disease and auto-immune disease. Opiate activity of semi-digested peptide fragments from the gliadin protein stimulate the appetite causing increased caloric intake and obesity. Amylopectin component causes hyperglycemia and insulin resistance diabetes, now reaching epidemic proportions in our population. For genetically susceptible people with celiac or autoimmune disease, eliminating wheat from the diet is curative. Your mainstream rheumatologist, gasteroenterologist or endocrinologist will deny or reject this connection, even though it is now published in mainstream medical journals.
interesting  health  glutenfree  diet 
february 2013 by kme
Facebook’s polluted graph | ROUGH TYPE
"People often assume that Google and Facebook have come close to collecting all the world’s knowledge. This is especially the case, the chorus goes, since people are compulsive and uninhibited on the web, and therefore more liable to reveal “the truth” about themselves.

I protest against this view of human knowledge–against its stupidity and its philistinism. The great resource of world literature teaches us nothing if not that we are most intimately attuned to ourselves when we take the time and care to meditate upon the subtleties and nuances of our subjective experience.

Facebook’s Social Graph is therefore severely limited, and necessarily so. It is precisely that realm of our humanity that is most mysterious to us that our search engines fail to penetrate.

Marcel Proust, that great man of solitude and introspection, suggests that “a very slight degree of self-acquaintance” teaches us that “a book is the product of a different self from the self we manifest in our habits, in our social life, in our vices. If we would try to understand that particular self, it is by searching our own bosoms, and trying to reconstruct it there, that we may arrive at it.”

“In fact,” Proust writes, “it is the secretions of one’s innermost self, written in solitude and for oneself alone that one gives to the public. What one bestows on private life – in conversation…or in those drawing-room essays that are scarcely more than conversation in print – is the product of a quite superficial self, not of the innermost self which one can only recover by putting aside the world and the self that frequents the world.”

“The beautiful things we shall write if we have talent,” Proust says, “are inside us, indistinct, like the memory of a melody which delights us though we are unable to recapture its outline. Those who are obsessed by this blurred memory of truths they have never known are the men who are gifted … Talent is like a sort of memory which will enable them finally to bring this indistinct music closer to them, to hear it clearly, to note it down …”

If we allow Facebook to dominate our lives, and to become the primary medium of discourse, we impoverish out culture immeasurably. But my suspicion is that the more we trumpet the social network as a revolutionary force for transparency and unification, the more its shallowness and poverty will make itself apparent.

The combination of naked greed and cheerful utopianism, which characterizes Facebook and Google, and which has characterized so many dangerous and creepy regimes in the past, is not indefinitely sustainable.

Some things can’t be easily ignored, even by those who have announced their intention to make the world a better place, and to do so at the cost of our art and our individuality."
searchengine  facebook  graphsearch  google  socialmedia  interesting  article  forthecomments 
january 2013 by kme
Errata Security: I conceal my identity the same way Aaron was indicted for
"Besides taking the “civil liberty” angle, I’m trying to get to the “witchcraft” angle. As Arthur C Clarke puts it, “Any sufficiently advanced technology is indistinguishable from magic”. Here is my corollary: “Any sufficiently technical expert is indistinguishable from a witch”. People fear magic they don’t understand, and distrust those who wield that magic. Things that seem reasonable to technical geeks seem illegal to the non-technical"
mac  osx  macspoofing  networking  security  privacy  aaronsw  interesting  article 
january 2013 by kme
Anonymous is dying. What comes next? : anonymous
Anonymous isn't an ordinary group in the modern sense. It's the first true human superorganism. It's the Type II civilization of groups, unable to be destroyed by any social means. Taking the concept of something so existential as anonymity and forming a collective based off of it has produced something that will literally not die until it's memory is forcefully exstinguishes from the minds of hundreds of millions, if not a few billion. The Anonymous collective, despite it's size, has become as indestructible as other collective identities, such as conservatism and liberalism, or warriors and craftsmen. Anonymous will survive for many, many years.
anonymous  activism  interesting  forthecomments 
december 2012 by kme
Homeland Security spent $430M on radios its employees don’t know how to use | Ars Technica
From the comments "tl;dr: A lot of these agencies could be far more effective and responsive if they were managed locally and had a narrowly defined mission."
interesting  article  dhs  forthecomments 
november 2012 by kme
My degree was a formality. It's a footnote on my resume, for HR's eyes only. | Hacker News
Original post: https://news.ycombinator.com/item?id=4312097 (on: Lying on your resume)
My degree was a formality. It's a footnote on my resume, for HR's eyes only.

When I get into the interview, I'm completely candid - All college taught me was how to pay off debt. I'm still learning.
interesting  discussion  forthecomments  employment  resume 
october 2012 by kme
Missouri Pastor's Fiery Speech Against Equal Rights for Homosexuals Has Stunning Twist Ending
Back in August, during a Springfield City Council public hearing on amending the city's nondiscrimination ordinance to include sexual orientation and gender identity protections, Rev. Phil Snider of the Brentwood Christian Church lashed out at the council for "inviting the judgement of God upon our land" by making "special rights for gays and lesbians."

He goes on to invoke the bible and morality and the end of days a few more times before suddenly appearing to lose his train of thought.

And then something pretty amazing happens.

(Unfortunately, the bill was tabled by the council to allow for a "cooling down period," whatever that means.)

Spoiler follows:
"You see, the right of segregation... is clearly established by the holy scriptures..."

I'm sorry.

I've brought the wrong notes with me this evening. I've borrowed my argument from the wrong century. It turns out that what I've been reading to you this whole time have been direct quotes from white preachers in the 1950s and the 1960s, all in support of racial segregation. All I have done is simply take out the phrase "racial integration" and substituted it with the phrase "gay rights."
humanrights  interesting  article  video  forthecomments 
october 2012 by kme
Fighting Hackers: Everything You've Been Told About Passwords Is Wrong | Wired Opinion | Wired.com
Security is not just about strong encryption, good anti-virus software, or techniques like two-factor authentication. It's also about the "fuzzy" things ... involving people. That's where the security game is often won or lost. Just ask Mat Honan.

We – the users – are supposed to be responsible, and are told what to do to stay secure. For example: "Don’t use the same password on different sites." "Use strong passwords." "Give good answers to security questions." But here’s the troublesome equation:

more services used = more passwords needed = more user pain

... which means it only gets harder and harder to follow such advice. Why? Because security and practicality are in conflict.
passwords  security  encryption  interesting  article  forthecomments 
october 2012 by kme
« earlier      
per page:    204080120160

Copy this bookmark:





to read