Common use-case for awk is to extract text by a separator. It’s way more powerful than that, learning awk is useful to quickly analyze text data.
Scaling up TCP servers is usually straightforward. Most deployments do it by spinning up multiple processes, usually same amount of CPU cores, and hope they balance the load. Turns out it’s not 100% correct.
HTTPS was created to allow HTTP traffic to be transmitted in encrypted form, however the authors of the KRACK Attack presented how the encryption could be completely stripped away (despite the website supporting HTTPS). This blog post presents a plain-English primer on how HTTPS protection can be stripped and mechanisms for mitigating this.
Frontend moves so fast with many approaches. Peter had a look at jQuery, Vue.js, React, and Elm in this series to compare between them.
We could have simply named this post “How great QR code are and how we recovered one from almost nothing.” But it’s much more interesting when the QR code is the key to a $1,000 Bitcoin Cash wallet.
The problem with video is it’s hard to quickly go through them since they are audio/video. So Dan watched and summarized them very nicely.
Did you know that when you’re using OpenSSH from the command line, you have a variety of escape sequences available to you?
This post compares available service discovery frameworks and compares CRDT-based service discovery mechanism with them.
Point in Time Recovery allows us to restore data to a given time. Percona talks about the pitfalls of common approaches and solutions.
There is a great deal to be said about how Ethernet works at the physical level, this post will focus on Ethernet II frames.
Better Dev Link