124 private links
The U.S. education system spent more than $26 billion on technology in 2018. That’s larger than the entire Israeli military budget. By one estimate, annual global spending on technology in schools will soon total $252 billion. But the technology pushed into schools today is a threat to child development and an unredeemable waste.
When something very basic goes wrong, I have this hierarchy of potential culprits:
- the compiler
- buggy hardware
- OS vendor
- last and least me, because I don’t make mistakes :)
So what doesn’t work ? I am doing a simple cast from a floating point value to an integer value in C. This happens in a routine, that checks, if a double is integral and if it would fit into a long.
Facebook AI has developed the first neural network that uses symbolic reasoning to solve advanced mathematics problems.
Speaking as a maintainer of Mercurial and an avid user of Python, I feel like the experience of making Mercurial work with Python 3 is worth sharing because there are a number of lessons to be learned.
Python haters always say, that one of reasons they don't want to use it, is that it's slow. Well, whether specific program - regardless of programming language used - is fast or slow is very much dependant on developer who wrote it and their skill and ability to write optimized and fast programs.
So, let's prove some people wrong and let's see how we can improve performance of our Python programs and make them really fast!
When you learn c, you gain a basic understanding of the flow of these languages and how they run, though all of them bring some or the other changes which make them unique. So, if you’re interested in programming, C is a great place to start.
Fostering reliability, maintainability, compactness, and good performance in code has been a constant quest for programmers and language designers over the years. It's rare that one technique can give you all of the above benefits, concurrently. But intelligent use of associative arrays can do that. If you haven't yet tapped into the power of associative arrays, you might want to give the issues involved some thought. The issues are widely applicable to a variety of programming tasks, cutting across all major languages.
Any C structure can be stored in a hash table using uthash. Just add a UT_hash_handle to the structure and choose one or more fields in your structure to act as the key. Then use these macros to store, retrieve or delete items from the hash table.
Hot things glow red, hotter things yellow, and really hot things white. When you heat glass, it does not shine forth with an encouraging green or pale.
Long article dealing with the several aspects and impacts of climate change.
With many references to papers and multimedia content to deepen the concepts.
Over the past year, I’ve worked on and off documentation for WordPress. I started contributing during a freeze around launch to help developers transition to the new platform. I found writing documentation is something I enjoy, plus rewarding to help and educate people. Though it’s not a primary part of my job, I’ve continued to find time here and there to keep contributing.
In this time, I’ve read various resources on technical writing and documentation. These are my notes, both to help me remember later, but also as a tool to help me think about writing now.
In a world of evolving and targeted cyber threats understanding your attacker’s intentions and tools has never been more crucial. By deliberately maintaining vulnerable systems, or Honey Pots, and letting the attackers in you can analyse their activity and gather intelligence so you can be ahead of the game if you ever have a compromise. When running an SSH Honey Pot you can gain a full log of the commands an attacker attempts to run on your system and any files which they attempt to download and can be a great way to obtain samples of malicious software for analysis or understand the techniques used by an attacker to scour your data.
This article, explains different ways of preventing Git from repeatedly prompting for username and password when interacting with a remote repository over HTTP(S).
In one of the breakthrough experiments, researchers at the University of Bristol’s Quantum Engineering Technology Labs (QET Labs) demonstrate the quantum teleportation of information between two programmable chip for the first time, which they remark is a cornerstone of quantum communications and quantum computing.
Quantum teleportation offers quantum state transfer of a quantum particle from one place to another by utilising entanglement. Teleportation is not only useful for quantum communication but is a fundamental building-block of optical quantum computing. Establishing an entangled communication link between two chips in the lab however has proven to be highly challenging.
“Each chip was then fully programmed to perform a range of demonstrations which utilise the entanglement.
“The flagship demonstration was a two-chip teleportation experiment, whereby the individual quantum state of a particle is transmitted across the two chips after a quantum measurement is performed. This measurement utilises the strange behaviour of quantum physics, which simultaneously collapses the entanglement link and transfers the particle state to another particle already on the receiver chip.”
Researchers at EPFL have developed an ultra-light robotic insect that uses its soft artificial muscles to move at 3 cm per second across different types of terrain. It can be folded or crushed and yet continue to move.
BusKill is a Kill Cord for your laptop implementing a Dead Man Switch using $20 in USB hardware + udev rule to trigger your laptop self-destruct if stolen.
A funny checklist to understand the common errors from all the persons/companies wishing to propose their own "brand new programming language".
You may have heard about Bandersnatch, an interactive film released on Netflix as part of the Black Mirror series. I’ve heard about it when it was released, but didn’t get around to watch it until recently, and I was surprised at how deep and thorough the implementation is.
Analysis and numbers of the Bandersnatch interactive film.
How to combine data spread over two CSV files, like separate tables in a normalized relational database.
From a tiny observation at work about odd behaviors of spinlocks I spent months trying to find good benchmarks, (still not entirely successful) writing my own spinlocks, mutexes and condition variables and even contributing a patch to the Linux kernel. The main thing I’ll try to answer is to give some more informed guidance on the endless discussion of mutex vs spinlock. Besides that I found that most mutex implementations are really good, that most spinlock implementations are pretty bad, and that the Linux scheduler is OK but far from ideal.