131 private links
Fábio Rehm's Blog
Many functional programming articles teach abstract functional techniques. That is, composition, pipelining, higher order functions. This one is different. I...
Python expert Jonathan Lettvin looks at some Python practices that shouldn't be used, but often can't be avoided.
The problems with peer review and scientific publishing have been a topic for …
Have you ever submitted an article to a reputable scientific journal only to have the paper rejected or sent back for major or even impossible...
Comparing text files requires time, effort, a large monitor and a good amount of patience, or simply just the right tools to do it without any of the aforementioned. If you are an editor that has to deal with multiple versions of a text file, or a developer that wants to check the various code revisions of a file, then the following tutorial is for you.
A few weeks ago, I felt inspired by articles from Jeff Kreeftmeijer and Armin Ronacher. I took some time to configure and fine-tune my Vim environment. A lot of new stuff made it into my .vimrc file and my .vim directory. This blog post is a summary describing what I’ve added and how I use it in my daily work.
The ability to customize tools to suit your needs is one of the great advantages of many Linux utilities. However, when you find yourself working on a new server, there is the issue of getting the settings you are comfortable with working in a new env.
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
There are a lot of conflicting ideas and misconceptions on how to do password hashing properly, probably due to the abundance of misinformation on the web. Password hashing is one of those things that's so simple, but yet so many people get wrong. With this page, I hope to explain not only the correct way to do it, but why it should be done that way.
Very good article describing the issues of having global state entities in software development.
There are lots of plugins that do similar jobs to those that I'm going to mention, but I'm not interested in making this an exhaustive list; these are my recommendations based on experience, and they may well change as time goes on:
- Syntax checking/linting
- File navigation
- Keyword searching
- Autocompletion
- Tags
- "Project management"
Like for every thing, there are plenty of commands to check information about the hardware of your linux system. Some commands report only specific hardware components like cpu or memory while the rest cover multiple hardware units.
This post takes a quick look at some of the most commonly used commands to check information and configuration details about various hardware peripherals and devices. The list includes lscpu, hwinfo, lshw, dmidecode, lspci etc.
John Frusciante è una icona. Uno dei “loser” più caratteristici e famosi degli anni ’90, la cui immagine è entrata ormai nell’immaginario collettivo. Un’immagine inevitabilmente legata alla sua chitarra, lo strumento che gli permette di amplificare a dismisura la densità di significato...