127 private links
Any C structure can be stored in a hash table using uthash. Just add a UT_hash_handle to the structure and choose one or more fields in your structure to act as the key. Then use these macros to store, retrieve or delete items from the hash table.
Hot things glow red, hotter things yellow, and really hot things white. When you heat glass, it does not shine forth with an encouraging green or pale.
Long article dealing with the several aspects and impacts of climate change.
With many references to papers and multimedia content to deepen the concepts.
Over the past year, I’ve worked on and off documentation for WordPress. I started contributing during a freeze around launch to help developers transition to the new platform. I found writing documentation is something I enjoy, plus rewarding to help and educate people. Though it’s not a primary part of my job, I’ve continued to find time here and there to keep contributing.
In this time, I’ve read various resources on technical writing and documentation. These are my notes, both to help me remember later, but also as a tool to help me think about writing now.
In a world of evolving and targeted cyber threats understanding your attacker’s intentions and tools has never been more crucial. By deliberately maintaining vulnerable systems, or Honey Pots, and letting the attackers in you can analyse their activity and gather intelligence so you can be ahead of the game if you ever have a compromise. When running an SSH Honey Pot you can gain a full log of the commands an attacker attempts to run on your system and any files which they attempt to download and can be a great way to obtain samples of malicious software for analysis or understand the techniques used by an attacker to scour your data.
This article, explains different ways of preventing Git from repeatedly prompting for username and password when interacting with a remote repository over HTTP(S).
In one of the breakthrough experiments, researchers at the University of Bristol’s Quantum Engineering Technology Labs (QET Labs) demonstrate the quantum teleportation of information between two programmable chip for the first time, which they remark is a cornerstone of quantum communications and quantum computing.
Quantum teleportation offers quantum state transfer of a quantum particle from one place to another by utilising entanglement. Teleportation is not only useful for quantum communication but is a fundamental building-block of optical quantum computing. Establishing an entangled communication link between two chips in the lab however has proven to be highly challenging.
“Each chip was then fully programmed to perform a range of demonstrations which utilise the entanglement.
“The flagship demonstration was a two-chip teleportation experiment, whereby the individual quantum state of a particle is transmitted across the two chips after a quantum measurement is performed. This measurement utilises the strange behaviour of quantum physics, which simultaneously collapses the entanglement link and transfers the particle state to another particle already on the receiver chip.”
Researchers at EPFL have developed an ultra-light robotic insect that uses its soft artificial muscles to move at 3 cm per second across different types of terrain. It can be folded or crushed and yet continue to move.
BusKill is a Kill Cord for your laptop implementing a Dead Man Switch using $20 in USB hardware + udev rule to trigger your laptop self-destruct if stolen.
A funny checklist to understand the common errors from all the persons/companies wishing to propose their own "brand new programming language".
You may have heard about Bandersnatch, an interactive film released on Netflix as part of the Black Mirror series. I’ve heard about it when it was released, but didn’t get around to watch it until recently, and I was surprised at how deep and thorough the implementation is.
Analysis and numbers of the Bandersnatch interactive film.
How to combine data spread over two CSV files, like separate tables in a normalized relational database.
From a tiny observation at work about odd behaviors of spinlocks I spent months trying to find good benchmarks, (still not entirely successful) writing my own spinlocks, mutexes and condition variables and even contributing a patch to the Linux kernel. The main thing I’ll try to answer is to give some more informed guidance on the endless discussion of mutex vs spinlock. Besides that I found that most mutex implementations are really good, that most spinlock implementations are pretty bad, and that the Linux scheduler is OK but far from ideal.
exa is a replacement for the venerable ls command. exa sports more features and arguably better defaults. Free and open source software.
Normally, the arrangement of mines is decided at the start of the game (except for some trickery so that you cannot lose on the first click). But what if there was no pre-determined arrangement, and the game was allowed to choose after you play?
An interesting article describing the logic of this original minesweeper game.
This article is designed to serve as a directory of software projects built on NLP (natural language processing), that anyone — even someone without ML experience — can build.
This year I sent out quite a few proposals to the majority of mobile conferences in Europe. Some ignored me, the others replied with automated rejections. However, some accepted and it was fun. Here is what I've learned on the way.
There is a a lot of misinformation being spread about Brave. Many people claim that it is spyware or harmful to your privacy. This is not true and I will debunk every claim I have found.
A distanza di cinquant’anni dalla strage di Piazza Fontana, l’Italia è ancora sovrastata dalla stessa cappa di disinformazione: “la strategia della tensione” che, portata avanti dallo Stato o perlomeno da ampi settori dello Stato, avrebbe dovuto facilitare una “svolta a destra” della politica, fermando l’avanzata del PCI nel mondo bipolare della Guerra Fredda. La strage di Piazza Fontana fu invece l’inizio di una campagna destabilizzante contro l’Italia che, dalla Libia alla Somalia, stava guadagnando molte posizioni internazionali cavalcando il “terzomondismo”. Le bombe cessarono nei primi anni ‘90 perché, distrutti la Prima Repubblica e lo Stato imprenditore, non servivano più.