128 private links
JuliaMono is a monospaced typeface designed for programming in the Julia Programming Language and in other text editing environments that require a wide range of specialist and technical Unicode characters.
Be more efficient with this Linux directory navigation trick.
Well, if you found this page and are interessed in pass, you must already have your reasons to look into password managers. For me, it's a basic concept: Use password only once. Don't (ever) reuse passwords or passphrases for other services. If one service gets compromised, you won't automatically have to worry about your other services. This makes remembering passwords a bitch, especially if you don't iterate through numbers of your favorite, easy-to-guess, passwords. Speaking of which, yes, there are tools out there, that can generate very good dictionaries based on a bit of social engineering. So you really should use generated passwords.
Python has incredibly scalable options for exploring data. With Pandas or Dask, you can scale Jupyter up to big data. But what about small data? Personal data? Private data? [JupyterLab and Jupyter Notebook provide a great environment to scrutinize my laptop-based life.
You've possibly just found out you're in a data breach. The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. But you should change it anyway. Huh? Isn't the whole point of encryption that it protects data when exposed to unintended parties?
So The Register managed to incite a lot of discussion with a headline that plain-text e-mail is a barrier to entry for kernel development. While attention grabbing, this is actually not a new debate. Like a lot of tech arguments this one seems to come up on a cyclical basis. Maybe because maintainer summit didn’t happen this year it needed to come out elsewhere. I gave a few thoughts on twitter but this topic really deserves a longer look at the problem and what e-mail being a barrier really means.
No, there hasn’t been any new vulnerability found in SSH, nor am I denying the usefulness of SSH as a building block in the dev toolchain. This article is about why you shouldn’t be (and how you can avoid) using raw SSH sessions for development work.
In summary, how the author discovered screen, tmux, etc.
Most of us last saw calculus in school, but derivatives are a critical part of machine learning, particularly deep neural networks, which are trained by optimizing a loss function. This article is an attempt to explain all the matrix calculus you need in order to understand the training of deep neural networks. We assume no math knowledge beyond what you learned in calculus 1, and provide links to help you refresh the necessary math where needed.
Crack LeetCode, not only how, but also why.
Text editors remain a controversial area. Here's our recommended Vim-like text editors. They are all released under an open source license.
askgit provides a sql interface to your git repository.
How to poison phishing sites with fake data.