131 private links
If you are looking to outsource software development, this guide is for you. This comprehensive 15 mins read will help you get an overall knowledge of every component related to outsourcing.
Computers are taking the error out of human chess — and the adventure.
Reviewed by Emily Andrews Perhaps this has happened to you: Finally finding a minute to settle in with a good book, you curl up on the sofa and crack open the cover of a book you have been eagerly looking forward to reading. At first, the sensation of the text in your hands and the smell of the crisp, new pages feels, oh, so good. You savor the first few paragraphs. But before long, a panicky twitch starts in your gut and works its way up to your brain. The desire to turn your eyes away to something else becomes irresistible. The window, the next room, your phone. You can no longer bear to pay attention to the words on the page, forgetting most of what you have just read. To dedicated bibliophiles, the sensation is alarming. What happened to those long hours of quiet bliss?
Don’t stop typing, or all progress will be lost.
Open Location Code is a library to generate short codes, called "plus codes", that can be used as digital addresses where street addresses don't exist. - google/open-location-code
Meet moreutilis, a growing collection of more useful Unix utilities. The moreutils can be installed on GNU/Linux, FreeBSD, openBSD and Mac OS.
Take your Raspberry Pi project, liberate it from the desk, and start creating wherever you go.
👾 Pokemon version of cowsay with CLI and API.
Homer, a text analyser in Python, can help make your text more clear, simple and useful for your readers.
Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
In order to use a GnuPG key on a smartcard or Yubikey, a GnuPG key needs to be created. This post will show you how to create a GnuPG key with sub-keys for signing, encryption and authentication. The authentication key can be used later on to authenticate via ssh as well.
Protect sensitive information with Fluidkeys. Share tokens and certificates securely among the team, encrypt your emails and sign and verify git commits. Fluidkeys works with git, GPG, Enigmail, GPGSuite, Mailvelope and pass.
Slax is a modern, portable, small and fast Linux operating system.
Debian-based, takes around 300MB.
what3words is a really simple way to talk about location.
We have assigned each 3m square in the world a unique 3 word address that will never change.
For example ///filled.count.soap marks the exact entrance to what3words’ London headquarters.
3 word addresses are easy to say and share, and are as accurate as GPS coordinates.