When need to generate QR code, most of us reach for a library and call it a day. Let’s dig dive and see exactly what is involved.
These hidden features and shortcuts will help you perform some of the most common Bash functions more efficiently.
Fixing memory leaks may not be not the shiniest skill on a CV, but when things go wrong on production, it’s better to be prepared! After reading this article, you’ll be able to monitor, understand, and debug the memory consumption of a Node.js application
Linux has rich virtual networking capabilities that are used as basis for hosting VMs and containers, as well as cloud environments. In this post, I will give a brief introduction to all commonly used virtual network interface types.
The C programming language defines a string as “a contiguous sequence of characters terminated by and including the first null character”. Since the character \0 marks the end we often call this zero- or null-termination. Nevertheless, other programming languages often use different representations. What else is possible?
The OWASP Top 10 lists the main security threats that affect web applications today. Each point describes a threat, with an overview of the kinds of things you want to do to mitigate the threat as much as possible.
The concept of abstraction in software development is frequently misunderstood and confused with indirection. This is partially because of the keywords abstract and interface in statically-typed languages such as Java and C#. The confusion often leads to design changes that leave the code worse than before it was touched. Let’s look at how abstraction and indirection relate, and how to correctly connect components.
Red errors are important; they make it easy to discern exceptions from standard output. Surprisingly, colorizing stderr is not as straightforward as it sounds and this is the story of racing pipes, file descriptor hacking, and libc monkey-patching.
If you don’t know FlameGraphs, check out this short slide
Interesting journey to parse RubyGems.Org log, a single day log is already 500Gb.
3 parts on PostgreSQL lock. Next we will look into table-level locks and latches protecting internal database structures.
provides serverless execution and deployment of crystal language code in Google Cloud Functions
CrystalFun coding challenges with P5.JS. The style switch between real editor and white board, very informative and entertaining. For a specific one, check this out: Minesweeper in JavaScript with p5.js
Git is for code, SQL is for querying. gitbase combined them both allow you to explore a repo using SQL.
Nmap Web Dashboard and Reporting
provide simple container runtime clustering
cleaning up your cloud accounts by nuking all resources within it. Gruntwork save 85% aws bill with it.
an implementation of the Code City metaphor for visualizing Go source code
exploring, training and running ready, state-of-the-art Machine Learning models
Open source software to manage connected IoT devices
MongoDB Performance Measurement and Analytics
A Library for Building Hybrid and Multicloud Kubernetes Operators
k8s admission controllers use Open Policy Agent.
Development engine for Kubernetes, containers and serverless functions
BetterDev Link
Every Monday