131 private links
Revised and tested several options, the conclusion is to use shaarli.
Tips for writing effective emails avoiding misunderstandings, with examples from the software development world.
Uncover the key differences between amateurs and professionals that make a difference and improve the prospects of success.
McFly replaces your default ctrl-r Bash history search with an intelligent search engine that takes into account your working directory and the context of recently executed commands. McFly's suggestions are prioritized in real time with a small neural network.
This article introduces how to build a Python and Flask based web application for performing text analytics on internet resources such as blog pages. To perform text analytics I will utilizing Requests for fetching web pages, BeautifulSoup for parsing html and extracting the viewable text and, apply the TextBlob package to calculate a few sentiment scores.
Anonymization has been the main means of addressing privacy concerns in sharing medical and socio-demographic data. Here, the authors estimate the likelihood that a specific person can be re-identified in heavily incomplete datasets, casting doubt on the adequacy of current anonymization practices.
It's not qmail. It's also not netqmail.
notqmail is a community-driven fork of qmail. notqmail begins where netqmail left off: providing stable, compatible, small releases to which existing qmail users can safely update. notqmail also aims higher: developing an extensible, easily packaged, and increasingly useful modern mail server.
The Companion Website for C++ Crash Course
The Blog of Josh Lospinoso
A distributed data community. Dat is a nonprofit-backed community & open protocol for building apps of the future.
Use Dat command line to share files with version control, back up data to servers, browse remote files on demand, and automate long-term data preservation.
After 6 years, I removed Docker from all my home servers. apt purge -y docker-ce Why? This was triggered by a recurring incident I faced where the Docker daemon was using 100% CPU on multiple cores…
The images allow to easily, visually take in what a sorting algorithm did over time, as it took the list from an unsorted, random state to a completely sorted state. On the horizontal axis, we have a list of numbers, represented as a single line of colors. On the vertical axis, there is time. From the top of the image to the bottom of the image, there is the list of numbers (the line of colored pixels) from a random ordering to a “sorted” rainbow line, by applying each kind of sorting algorithm one step per row.
We, the Terminal-savvy people, do not like to leave the comfort of the command line and go somewhere else to do our activities. We always find ways to do all our stuff right inside the Terminal. Why should listening to
While envisioning the darkest of futures and grappling with mortality, the English writer retreated to an idyllic Scottish isle to write Nineteen Eighty-Four
A curated list of websites with beautiful free icon design sets that can be used for personal and commercial projects.
Stretched for time, some households are starting to operate more like businesses.
Steven Rostedt wanted to do a little housekeeping, specifically with the function tracing code used in debugging the kernel. Up until then, the kernel could enable function tracing using either GCC's -pg flag or a combination of -pg and -mfentry. In each case, GCC would create a special routine that would execute at the start of each function, so the kernel could track calls to all functions. With just -pg, GCC would create a call to mcount() in all C functions, although with -pg coupled with -mfentry, it would create a call to fentry().