131 private links
M3, a metrics platform, and M3DB, a distributed time series database, were developed at Uber out of necessity. After using what was available as open source and finding we were unable to use them at our scale due to issues with their reliability, cost and operationally intensive nature we built our own metrics platform piece by piece. We used our experience to help us build a native distributed time series database, a highly dynamic and performant aggregation service, query engine and other supporting infrastructure.
Haven is for people who need a way to protect their personal areas and possessions without compromising their privacy. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical areas. Haven turns any Android phone into a motion, sound, vibration and light detector, watching for unexpected guests and unwanted intruders. We designed Haven for investigative journalists, human rights defenders and people at risk of forced disappearance to create a new kind of herd immunity. By combining the array of sensors found in any smartphone, with the world's most secure communications technologies, like Signal and Tor, Haven prevents the worst kind of people from silencing citizens without getting caught in the act.
The climate crisis isn’t a future we must fight to avoid. It’s an already unfolding reality. It’s the intensification of extreme weather–cyclones, storms and floods, droughts and deadly heat waves. It’s burning forests in Australia, the Amazon, Indonesia, Siberia, Canada and California. It’s melting ice caps, receding glaciers and rising seas. It’s ecosystem devastation and crop failures. It’s the scarcity of resources spreading hunger and thirst. It’s lives and communities destroyed, and millions forced to flee.
Some hints: Naming Convention; Keyword First Syntax; Type Last Syntax; No Dangling Else; Everything Is An Expression, Including Blocks; etc.
Science-fiction writer, journalist and longtime Slashdot reader, Cory Doctorow, a.k.a. mouthbeef, writes:
The Electronic Frontier Foundation (EFF) just published the latest installment in my case histories of "adversarial interoperability" -- once the main force that kept tech competitive. Today, I tell the story of Gopher, the web's immediate predecessor, which burrowed under the mainframe systems' guardians and created a menu-driven interface to campus resources, then the whole internet. Gopher ruled until browser vendors swallowed Gopherspace whole, incorporating it by turning gopher:// into a way to access anything on any Gopher server. Gopher served as the booster rocket that helped the web attain a stable orbit. But the tools that Gopher used to crack open the silos, and the moves that the web pulled to crack open Gopher, are radioactively illegal today.
If you wanted do to Facebook what Gopher did to the mainframes, you would be pulverized by the relentless grinding of software patents, terms of service, anticircumvention law, bullshit theories about APIs being copyrightable. Big Tech blames "network effects" for its monopolies -- but that's a counsel of despair. If impersonal forces (and not anticompetitive bullying) are what keeps tech big then there's no point in trying to make it small. Big Tech's critics swallow this line, demanding that Big Tech be given state-like duties to police user conduct -- duties that require billions and total control to perform, guaranteeing tech monopolists perpetual dominance. But the lesson of Gopher is that adversarial interoperability is judo for network effects.
Panolens.js is based on Three.JS (a 3D framework) with specific interest area in panorama, virtual reality, and potentially augmented reality.
More Americans are being sent home to die, placing an overwhelming financial and caregiving burden on families.
Email is unsafe and cannot be made safe. The tools we have today to encrypt email are badly flawed. Even if those flaws were fixed, email would remain unsafe. Its problems cannot plausibly be mitigated. Avoid encrypted email.
Technologists hate this argument. Few of them specialize in cryptography or privacy, but all of them are interested in it, and many of them tinker with encrypted email tools.
Most email encryption on the Internet is performative, done as a status signal or show of solidarity.
Use the cheat utility to keep Linux cheat sheets handy on the command line. Personalize your cheat sheets by editing and creating them to suit your needs.
This tool serializes the output of popular gnu linux command line tools and file types to structured JSON output.
This allows piping of output to tools like jq.
There are lots of laws which people discuss when talking about development. This repository is a reference and overview of some of the most common ones.
Some examples: Hofstadter's Law, Kernighan's Law, Metcalfe's Law, Moore's Law, Murphy's Law, Occam's Razor, etc.
Learn Rust tricks and test your knowledge at the same time!
Table of Contents
- About Manager
- Career development
- Conversation starters
- Job satisfaction
- Other
- Team and company
- Work-life
I long ago stopped reading books on note-taking.
They were always too vague and boring, full of platitudes that had little to do with the world outside academia.
I especially avoided “how-to” style books on the subject.
They would often list dozens of tips and tricks that had little to do with each other. There was never an overarching system for turning notes into concrete results.
But recently I picked up How To Take Smart Notes (affiliate link) by Sönke Ahrens. Ahrens is a Lecturer in Philosophy of Education at the University of Duisburg-Essen and also coaches students, academics, and professionals with a focus on time management, decision-making, and personal growth.
This article contains the flow-charts of many common programming language constructs that involve distinct combinations of gotos. The goto (or jump) is a basic building block of control flow, therefore most control flow constructs can be modelled using it.
My name is Betto Cardoso and this is my tribute to the greatest band of all time! A Chronological Medley featuring all of their songs! From Kill 'Em All to Death Magnetic! 10 albums! 122 songs straight!