Hi everyone, Welcome to issue #168. Let’s get straight to our links this time
A byte of data has been stored in a number of different ways through the years as newer, better, and faster storage media are introduced. A byte is a unit of digital information that most commonly refers to eight bits. A bit is a unit of information that can be expressed as 0 or 1, representing a logical state. Let’s take a brief walk down memory lane to learn about the origins of bits and bytes.
Neil worked at Bloomberg for a year, sat next to a senior software engineer for a year. Here’s what he learned. Many topics: naming, dealing with legacy code , when thing goes wrong and more.
On AWS, tagging is a way to categorize resources for many reasons: billing analysis, grant permission. Examples of tag usages: this user can only access resources with this tag, or automated backup EBS volume with this tag. AWS is massive and if we don’t tag, we will very quickly end up with a big mess.
Tristan shared a whole bunch of tips and recommendations they’ve learned about over many years, but often quite hard to find out about. Some hidden tips, some good mac apps to improve productivity.
Basecamp, the maker of Ruby On Rails, suffered a few major outages this month and share the post mortem. I always love these posts because why we can learn from success, learning from failure is even more important because not many share their failure :-). An interesting part is that the chatops server that can be used to reconfigure the network is down/slow due to network being overload and they have to manually reconfigure the routers.
What is the uppercase of あ, a Japanese character? why ſecret == secret == Secret? When you upper-case groß you can get either GROß or GROSS? What is that mess? Let’s dig into the Unicode encoding world
Finding the shell you’re actually using isn’t all that simple at first. You can find the location of the executable of the shell. You can find all the processes currently running with that shell name. But gathering information about the shell you’re typing all those commands in to find the shell you’re using requires a little more poking around. The two easiest solutions, on macOS at least, are lsof and fuser
In order to see what the who command is doing I could try to find the source code and dig into it. But I found it fun to use strace to check what the process was doing instead. Since we are expecting who to read system files, we can only focus on the open syscalls.
When I makes mobile check deposit and the bank mobile app detects the amount reliably, I’m amazed at that technology. That’s good use of tech to improve our life. In this article we will be learning about the task of handwritten text recognition, it’s intricacies and how we can solve it using deep learning techniques.
a book to learn the good parts of Vim.
a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks aims to be the easy-to-use, all-in-one solution for finding secrets, past or present, in your code.
provides Windows Hello™ style authentication for Linux. Use your built-in IR emitters and camera in combination with facial recognition to prove who you are.Python
A rewriting web proxy for testing interactions between your browser and external sites. Works with ruby + rspec. Puffing Billy is like webmock or VCR, but for your browser.Ruby
a reasonably fast, minimal stack-based VM in C. It currently implements just enough functionality to do recursive FibonacciC
an intuitive find & replace CLI. Kind of like
an A/B testing backend using AWS Lambda/API Gateway + Redis.
a Scaleable A/B testing backend in ~100 lines of code (and for free*)
you describe the configuration of your application. werf build docker image and deploy to k8s
a lightweight but powerful SQL tool with a notebook interface
a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads
Better Dev Link