127 private links
Python has incredibly scalable options for exploring data. With Pandas or Dask, you can scale Jupyter up to big data. But what about small data? Personal data? Private data? [JupyterLab and Jupyter Notebook provide a great environment to scrutinize my laptop-based life.
You've possibly just found out you're in a data breach. The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. But you should change it anyway. Huh? Isn't the whole point of encryption that it protects data when exposed to unintended parties?
So The Register managed to incite a lot of discussion with a headline that plain-text e-mail is a barrier to entry for kernel development. While attention grabbing, this is actually not a new debate. Like a lot of tech arguments this one seems to come up on a cyclical basis. Maybe because maintainer summit didn’t happen this year it needed to come out elsewhere. I gave a few thoughts on twitter but this topic really deserves a longer look at the problem and what e-mail being a barrier really means.
No, there hasn’t been any new vulnerability found in SSH, nor am I denying the usefulness of SSH as a building block in the dev toolchain. This article is about why you shouldn’t be (and how you can avoid) using raw SSH sessions for development work.
In summary, how the author discovered screen, tmux, etc.
Most of us last saw calculus in school, but derivatives are a critical part of machine learning, particularly deep neural networks, which are trained by optimizing a loss function. This article is an attempt to explain all the matrix calculus you need in order to understand the training of deep neural networks. We assume no math knowledge beyond what you learned in calculus 1, and provide links to help you refresh the necessary math where needed.
Crack LeetCode, not only how, but also why.
Text editors remain a controversial area. Here's our recommended Vim-like text editors. They are all released under an open source license.
askgit provides a sql interface to your git repository.
How to poison phishing sites with fake data.
Top command is good but there are better alternatives to Top. Take a look at these system monitoring tools that are similar to top but are actually better.
whowatch is a simple, easy-to-use interactive who-like command line program for monitoring processes and users on a Linux system in real time.
BigBird is shown to dramatically improve performance across long-context NLP tasks, producing SOTA results in question answering and summarization.
A Google researcher looks into the mind of a computer.
A window manager manages the windows that applications bring up. We recommend the best c.ompositing, stacking, tiling, and dynamic window managers.
One of the main tool I use daily for any project is the fantastic tmux. It will change your terminal experience. What it is? How does it work? How to configure it?