2901
Working with timezones | David Turner says…
I do enjoy thinking about some of the strange things that can happen with time and timezones and it can be amusing, and occasionally useful, to read some lists of counterexamples to reasonable-sounding statements about time, but it’s hard to actually get stuff done with this information alone. All those counterexamples might leave you thinking that dealing with timezones is basically impossible to get right, whereas in fact it’s not that difficult once you draw the right pictures. I ...
programming  timezone 
4 days ago
Kubernetes: Core Concepts – YLD Engineering Blog – Medium
Getting to grips with Kubernetes can be extremely difficult, with so much information floating around on the seas of the internet, it is sometimes very difficult to find the "core" pieces of…
kubernetes 
17 days ago
The Complete Illustrated Flexbox Tutorial – freeCodeCamp
If you wish to support my work, CSS Visual Dictionary is my book. All diagrams in this tutorial were taken directly from the manuscript! When I started to learn Flexbox, I wanted to see everything it…
layout  guide  flexbox  css  webdesign 
17 days ago
Deploying Vms On Kubernetes Glusterfs Kubevirt
Kubernetes is traditionally used to deploy and manage containerized applications. Did you know Kubernetes can also be used to deploy and manage virtual machines? This guide will walk you through installing a Kubernetes environment backed by GlusterFS for storage and the KubeVirt add-on to enable deployment and management of VMs.

kubernetes  glusterfs  kubevirt 
17 days ago
Chris's Wiki :: blog/linux/BtrfsCoreMistake
comparison between zfs and btrfs from a higher level
zfs  btrfs 
10 weeks ago
RPM SPEC pre/post/preun/postun argument values | Me in IT
RPM has 4 parts where (shell) scripts can be used:

%pre - Executed before installation.
%preun - Executed before un-installation.
%post - Executed after installation.
%postun - Executed after un-installation.
In all these parts or sections the variable "$1" can be checked to see what's being done:

Initial installation
Upgrade
Un-installation
This table show the values of "$1" per section related to the action:
[...]
rpm  packaging  script 
11 weeks ago
Let's talk about packages
Recently the Python community got to celebrate the triumphant launch of the new Python Package Index. It’s been a long time coming, and the folks who made it happen all deserve a round of applause.

PyPI is an incredibly important piece of infrastructure for the Python community, and if you use Python you probably use PyPI, directly or indirectly, on a daily basis, and many different sites, services, and companies rely heavily on it.

But: if you rely on PyPI, how often do you think about that reliance? What would you do if an incompatible version of one of your dependencies, or one of your dependencies’ dependencies, suddenly appeared? What if one of them disappeared? Would your applications or your deployments break? What would you do if PyPI had extended downtime? Would you still be able to deploy your applications? What if PyPI got hacked? If someone replaced one or more packages with malicious versions, would you be safe, or would you install the malicious packages and end up running them on your servers?

The people who run PyPI are smart and conscientious and do what they can to keep it running 24/7 and not hacked, but these are still serious questions you should be thinking about. The people who run PyPI certainly are thinking about some of the scarier cases, and working on ways to make them less scary, but there are also things you can do.

So let’s talk a bit about that.
deployment  python  packaging 
may 2018
A Homomorphic Encryption Illustrated Primer
Homomorphic encryption schemes provide an amazing capability - to be able to perform calculations on data without knowing what the data is. This lets you work out the answer to questions while keeping potentially sensitive source data private.
[...]
encryption 
may 2018
Jenkins as a Sysadmin tool
(aka “launching ansible automatically”)
ansible  automation  jenkins 
may 2018
« earlier      
accessibility ajax analysis ansible apache apps archlinux art aws backup bash bgp bind blog boot browser bsd business cache cheatsheet cisco cli cluster color comparison config console container couchdb cracking creativecommons crypt cryptography css css3 culture database datenschutz debian debug debugging design desktop development devops diy django dns docker documentation ebook education email encryption exploit ext3 fail faq filesystem filetype:jpg filetype:pdf fink.weitergeben firefox firewall font fonts forms framework free freebsd fuckup fun geek gesellschaft git google gpg graphics graphite gui guide hack hacking hacks hardware hash howto html html5 http humor icon icons image inspiration interface internet intro ip ipsec iptables ipv6 jabber javascript jquery kernel kotzen kubernetes latex learning lesbar license linux list logging maemo mail management media media:document media:image monitoring music musik mysql n810 netlabel network networking news nginx opensource optimization p2p password pdf pentest performance photography php plugin plugins politics politik presentation privacy productivity programming proxy psychology python recht reference regex resources rl router routing ruby satire scalability scaling scripting security server shell sicherheit slides software spam sql ssh ssl statistics storage streaming svn sysadmin system tcp template terminal test testing tex theme tips tls todo tool tools toread tuning tutorial tweak typographie typography umgang unicode unix usability video vim virtualization vista visualization vmware vpn wallpaper web webdesign webdev wifi wiki windows wireless wordpress work workflow xhtml xmpp zeitgeschehen zensur zfs Überwachung überwachung

Copy this bookmark:



description:


tags: