Effective Tensorflow
TensorFlow tutorials and best practices.
TensorFlow  tutorial 
3 days ago
The world in which IPv6 was a good design
Why is IPv6 such a complicated mess compared to IPv4? Wouldn't it be better if it had just been IPv4 with more address bits? But it's not, oh goodness, is it ever not. So I started asking around. Here's what I found.
ipv6  history  networking  internet  QUIC 
5 days ago
Why Github can't host the Linux Kernel Community
The problem is that github doesn’t support the way the linux kernel scales out to a huge number of contributors, and therefore we can’t simply move, not even just a few subsystems. And this isn’t about just hosting the git data, that part obviously works, but how pull requests, issues and forks work on github.
kernel  git  github  maintenance  opensource 
8 days ago
Understanding the IPFS White Paper part 1
To understand how IPFS works it's a good idea to walk through this white paper step by step. I'll limit this post to chapter 2 of the white paper, having a look at the underlying technologies:

Distributed Hash Tables
Block Exchanges - BitTorrent
Version Control Systems - Git
Self-Certified Filesystems - SFS

OK, here we go!
ipfs  primer  learning 
8 days ago
Side Project Marketing
I've been building little software side projects for years, but I've always been terrible at marketing them. I come up with some ideas, forget those ideas, do some random stuff, then lose interest. The goal of this project is to fix that by making marketing as simple as a checklist.
10 days ago
A collection of various "awesome lists" for hackers, pentesters and security researchers
pentest  security 
10 days ago
Docker vs. Kubernetes vs. Apache Mesos: Why What You Think You Know is Probably Wrong - Mesosphere
While all three technologies make it possible to use containers to deploy, manage, and scale applications, in reality they each solve for different things and are rooted in very different contexts. In fact, none of these three widely adopted toolchains is completely like the others.

Instead of comparing the overlapping features of these fast-evolving technologies, let’s revisit each project’s original mission, architectures, and how they can complement and interact with each other.
docker  kubernetes  mesos  containers  orchestration 
15 days ago
re be dragons: the same 3D scene implemented with 10 different 3D APIs
This repository contains multiple implementations of the same 3D scene, using different APIs and frameworks on various platforms. The goal is to provide a comparison between multiple rendering methods. This is inherently biased due to the variety of algorithms used and available CPU/GPU configurations, but can hopefully still provide interesting insights on 3D rendering.
gpu  3d  Programming 
20 days ago
GraphQL vs. REST
We’ll identify some properties of an API, and then discuss how GraphQL and REST handle them.
api  rest  webdev  GraphQL  http 
21 days ago
Exactly-once Support in Apache Kafka – Jay Kreps – Medium
On Thursday we released a new version of Apache Kafka that dramatically strengthens the semantic guarantees it provides.
distributed  kafka 
22 days ago
Slides and links for 2017 talks
golang  gophercon  talks 
22 days ago
Postgres EXPLAIN Visualizer (pev)
Pev is designed to make Postgres query plans easier to grok. It displays a plan as a tree, with each node representing a step that takes in a row set and produces another.
postgresql  database  optimization  visualization 
25 days ago
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords.
wpa  wpa2  wifi  security  airodump  aircrack  hashcat 
25 days ago
An end to end tutorial of a machine learning pipeline
This tutorial tries to do what most Most Machine Learning tutorials available online do not. It is not a 30 minute tutorial which teaches you how to "Train your own neural netowrk" or "Learn deep learning in under 30 minutes".

It's a full pipeline which you would need to do if you actually work with machine learning - introducing you to all the parts, and all the implementation decisions and details that need to be made.

The dataset is not one of the standard sets like MNIST or CIFAR, you will make you very own dataset. Then you will go through a couple conventional machine learning algorithms, before finally getting to deep learning!
machinelearning  learning  courses 
4 weeks ago
Google Public NTP
Google Public NTP serves leap-smeared time. We use this technology to smoothly handle leap seconds with no disruptive events.
ntp  time  google 
5 weeks ago
Tutorial for vim-go
A simple tutorial on how to install and use vim-go
golang  vim 
5 weeks ago
BayesDB - Query the probable implicatons of your data - The MIT Probabilistic Computing Project
BayesDB is a probabilistic programming platform that enables users to query the probable implications of their data as directly as SQL databases enable them to query the data itself.
bayesian  statistics  sql  database  datamining  probability 
5 weeks ago
Kafka Message Queue (softwaremill/kmq)
Using kmq you can acknowledge processing of individual messages in Kafka, and have unacknowledged messages re-delivered after a timeout.

This is in contrast to the usual Kafka offset-committing mechanism, using which you can acknowledge all messages up to a given offset only.

If you are familiar with Amazon SQS, kmq implements a similar message processing model.
kafka  messaging  messagequeue 
7 weeks ago
Failsafe is a lightweight, zero-dependency library for handling failures. It was designed to be as easy to use as possible, with a concise API for handling everyday use cases and the flexibility to handle everything else.
java  java8 
7 weeks ago
Go Language - Web Application Secure Coding Practices
Go Language - Web Application Secure Coding Practices is a guide written for anyone who is using the Go Programming Language and aims to use it for web development.
golang  security 
7 weeks ago
FSArchiver - Filesystem Archiver for Linux
FSArchiver is a system tool that allows you to save the contents of a file-system to a compressed archive file. The file-system can be restored on a partition which has a different size and it can be restored on a different file-system. Unlike tar/dar, FSArchiver also creates the file-system when it extracts the data to partitions. Everything is checksummed in the archive in order to protect the data. If the archive is corrupt, you just loose the current file, not the whole archive.
9 weeks ago
Exploring LSTMs
It turns out LSTMs are a fairly simple extension to neural networks, and they're behind a lot of the amazing achievements deep learning has made in the past few years. So I'll try to present them as intuitively as possible – in such a way that you could have discovered them yourself.
machinelearning  deeplearning  RRN  LSTM  primer  neuralnetworks 
9 weeks ago
Why do Nigerian Scammers Say They are from Nigeria? (Microsoft, 2012)
By sending an email that repels all but the most gullible the scammer gets the most promising marks to self-select, and tilts the true to false positive ratio in his favor.
spam  papers 
9 weeks ago
golang: expvar in action
The Go standard library comes with the expvar package. This package allows one to expose metrics about your application and the Go runtime via a HTTP API in JSON format.
golang  metrics 
10 weeks ago
A gentle introduction to video technology, although it's aimed at software developers / engineers, we want to make it easy for anyone to learn. This idea was born during a mini workshop for newcomers to video technology.

The goal is to introduce some digital video concepts with a simple vocabulary, lots of visual elements and practical examples when possible, and make this knowledge available everywhere. Please, feel free to send corrections, suggestions and improve it.
video  graphics  vfx  visualisation  primer 
10 weeks ago
Programming Project List
A list of practical projects that anyone can solve in any programming language (See solutions). These projects are divided in multiple categories, and each category has its own folder.
learning  Programming  primer 
10 weeks ago
The microarchitecture of Intel and AMD CPUs - microarchitecture.pdf
An optimization guide for assembly programmers and
compiler makers
By Agner Fog. Technical University of Denmark
assembly  cpu  optimization  compiler 
10 weeks ago
Kubernetes By Example
This is a hands-on introduction to Kubernetes.
kubernetes  docker  learning 
11 weeks ago
The Tectonic Typesetting System
Tectonic is a modernized, complete, self-contained TeX/LaTeX engine, powered by XeTeX and TeXLive.
tex  rust  LaTeX 
11 weeks ago
A simple set of utility functions for colours
JavaScript  color 
11 weeks ago
Blockchains from the ground up: Part 1 - John Mathews
Using a scenario that begins with the exchange of apples for oranges, understand the essential concepts and advantages of blockchains.
blockchain  primer 
11 weeks ago
Language Mechanics On Stacks And Pointers
This post has described the purpose behind pointers and how stack and pointer mechanics work in Go. This is the first step in understanding the mechanics, design philosophies and guidelines needed for writing consistent and readable code.
11 weeks ago
Porting Windows Dynamic Link Libraries to Linux
This repository contains a library that allows native Linux programs to load and call functions from a Windows DLL.
windows  dll 
12 weeks ago
Principal Component Analysis explained visually
Principal component analysis (PCA) is a technique used to emphasize variation and bring out strong patterns in a dataset. It's often used to make data easy to explore and visualize.
statistics  visualization 
12 weeks ago
OWASP Mobile Security Testing Guide
The MSTG is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS).
mobile  security  books  pentest 
12 weeks ago
ELF Hello World Tutorial - Ciro Santilli
Introductory analysis of a simple example of the Executable and Linkable File format.
assembly  binary  linux  ELF 
may 2017
A TCP proxy to simulate network and system conditions for chaos and resiliency testing
testing  http  proxy  networking 
may 2017
Sameer Ajmani's answer to Where does Go's concurrency (CSP) fall short? - Quora
A look at Go’s concurrency approach as compared to other languages from the manager of the Go team at Google.
golang  concurrency  CSP 
may 2017
Alternative Patterns for Method Overloading in Go
An overview of 3 approaches to deal with Go’s lack of method overloading: a functional way, an OO-style way, and a ‘JavaScript’-esque way. Functional options are also worth considering.
may 2017
Why golang garbage-collector not implement Generational and Compact gc? - Google Groups
A solid response from Ian Lance Taylor on the pros and cons of different garbage collection methods.
golang  gc 
may 2017
calculates the number of people in the vicinity using the approximate number of smartphones as a proxy (since ~70% of people have smartphones nowadays). A cellphone is determined to be in proximity to the computer based on sniffing WiFi probe requests. Possible uses of howmanypeoplearearound include: monitoring foot traffic in your house with Raspberry Pis, seeing if your roommates are home, etc.
RaspberryPi  smarthome  wifi  automation  mobile 
may 2017
Tufte CSS
Tufte CSS provides tools to style web articles using the ideas demonstrated by Edward Tufte’s books and handouts. Tufte’s style is known for its simplicity, extensive use of sidenotes, tight integration of graphics with text, and carefully chosen typography.
typography  css  webdesign 
may 2017
Go Walkthrough by Ben Johnson
A series of walkthroughs to help you understand the Go standard library better.
golang  primer 
may 2017
debug-me - secure remote debugging
Debugging a problem over email/irc/BTS is slow, tedious, and hard. The developer needs to see the your problem to understand it. Debug-me aims to make debugging fast, fun, and easy, by letting the developer access your computer remotely, so they can immediately see and interact with the problem. Making your problem their problem gets it fixed fast.

A debug-me session is logged and signed with the developer's GnuPG key, producing a chain of evidence of what they saw and what they did. So the developer's good reputation is leveraged to make debug-me secure.
ssh  debug  remote  infosec  chainOfEvidence 
may 2017
Get started | Learning Music (Beta)
In these lessons, you'll learn the basics of music making. No prior experience or equipment is required; you'll do everything right here in your browser.
may 2017
SQL Notebook
SQL Notebook is a free Windows app for exploring and manipulating tabular data. It is powered by a supercharged SQLite engine, supporting both standard SQL queries and SQL Notebook-specific commands. Everything you need to answer analysis questions about your data, regardless of its format or origin, is built into SQL Notebook.
database  sql  sqlite 
may 2017
Kubernetes clusters for the hobbyist
This guide answers the question of how to setup and operate a fully functional, secure Kubernetes cluster on a cloud provider such as DigitalOcean or Scaleway. It explains how to overcome the lack of external ingress controllers, fully isolated secure private networking and persistent distributed block storage.
may 2017
Things to Use Instead of JWT | Kevin Burke
What should you be using instead of JWT? That depends on your use case.
may 2017
Open source load testing tool for more flexible performance testing
k6 is an open-source load testing tool for testing the performance of your systems. It’s built with Go and JavaScript to integrate well into your development workflow, so you can stay on top of performance without fuzz.
testing  performance  http 
may 2017
Ultimate Android Reference
The goal of this project is to provide a hand-picked collection of Android libraries, tools, open-source projects, books, blogs, tutorials - you name it.

This project will try to showcase only the best, most popular and well-tested resources that you will actually need and find useful rather than overwhelming you with a plethora of low-quality ones.
android  primer  reference 
may 2017
Random: Probability, Mathematical Statistics, Stochastic Processes
Random (formerly Virtual Laboratories in Probability and Statistics) is a website devoted to probability, mathematical statistics, and stochastic processes, and is intended for teachers and students of these subjects. The site consists of an integrated set of components that includes expository text, interactive web apps, data sets, biographical sketches, and an object library.
math  probability  statistics 
may 2017
Why use Postgres (Updated for last 5 years) - Craig Kerstiens
in the last 4-5 years there’s been a lot of improvements and more reasons added to the list of why you should use Postgres. Here’s the rundown of the things that make Postgres a great database you should consider using.
may 2017
Visualizing Concurrency in Go · divan's blog
I want to show you my attempt to visualize common concurrency patterns using Go and WebGL. It more or less represents the way I see concurrent programs in my head.
concurrency  golang  visualization 
may 2017
Postal is a complete and fully featured mail server for use by websites & web servers. Think Sendgrid, Mailgun or Postmark but open source and ready for you to run on your own servers.
email  mail 
april 2017
real world example apps
TL;DR — See how the exact same real world blogging platform is built using React/Angular on top of Node/Rails/Django (and even more stacks coming soon). Yes, you can mix and match them, because they all adhere to the same API spec
api  http  webdev  reactjs  AngularJS  rest  node.js  django  rails  primer  learning  tutorial 
april 2017
Tamper Chrome
Tamper Chrome is a Chrome extension that allows you to modify HTTP requests on the fly and aid on web security testing.
chrome  security  http 
april 2017
PluotSorbet is a J2ME-compatible virtual machine written in JavaScript
J2ME  java  JavaScript 
april 2017
A DNS-protocol proxy for Google's DNS-over-HTTPS: allows you to run a server on your local network which responds to DNS queries, but requests records across the internet using HTTPS.
april 2017
Secrets of The Felix Bundle Plug-in Macros Revealed | David Valeri's Blog
This article discusses some strategies for managing package import versions using the Felix Bundle Plug-in and the versioning related macros.
april 2017
go tool trace - Tour of the go tool trace interface

Do you want to know what your Go program is really doing? go tool trace can show you: it visualizes all the runtime events over a run of your Go program, in exquisite detail. This under-documented tool is one of the most useful tools in the Go ecosystem for diagnosing performance problems such as latency, poor parallelisation, and contention.
april 2017
Iosevka is a slender monospace sans-serif and slab-serif typeface inspired by Pragmata Pro, M+ and PF DIN Mono, designed to be the ideal font for programming.
april 2017
Announcing Keyholder: Secure, shared shell access – Wikimedia Blog
The new software is a ssh-agent proxy that allows a group of trusted users to share an SSH identity without exposing the contents of that identity’s private key.
ssh  security 
march 2017
Colormind - the smart color palette generator
Colormind is a deep learning AI that knows color theory. It can generate color palettes from scratch, or it can take your input and intelligently fill in the blanks

Colormind can learn from photographs, movies, and popular art - generating color suggestions that fit the distinct visual style of those mediums.
color  design 
march 2017
Haskell Concepts in One Sentence
After years of dragging my feet I've been learning Haskell with the help of a few friends. Many Haskell concepts can be quite daunting so I decided to write one sentence summaries to simplify them for myself. These are not by any means complete but are useful as a jumping off point. This post draws inspiration from hemanth/functional-programming-jargon and the Standardized Ladder of Functional Programming.
functional  Haskell  primer  Programming  learning 
march 2017
Jessie Frazelle's Blog: Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs
The Design of Solaris Zones, BSD Jails, VMs and containers are very different
bsd  containers  docker  vm  jail  lxc 
march 2017
Into the symmetry: Critical vulnerability in JSON Web Encryption (JWE) - RFC 7516
tl;dr if you are using go-jose, node-jose, jose2go, Nimbus JOSE+JWT or jose4j with ECDH-ES please update to the latest version.
jwt  jwe  security 
march 2017
« earlier      
3d agile ai algorithm algorithms amazon analytics android angularjs animation api architecture assembly async audio authentication automation backup bash benchmark bestpractices bitcoin books bootstrap build c c++ canvas charts cheatsheet cli cloud cluster cms color compression concurrency containers copyright couchdb courses cpp cryptography css culture data database databases datamining datastructures debian debug deployment design designpatterns development diff distributed django dns docker documentation ebook editor education ejabberd email embedded encryption es6 exploit filesystem floss font framework freeculture functional fuse games gc git github gnu\linux golang google gpg gps gpu graph graphics graphs gui hardware hash haskell history howto html html5 http http2 icons ide image internet ipfs iptables ipv6 irc jabber java java8 javascript jquery json jvm jwt kafka kernel language latex learning libraries library linux llvm loadbalancing machinelearning maps markdown math messaging mobile monitoring music networking neuralnetworks nginx node.js nosql openpgp opensource openstreetmap optimization p2p papers password pdf pentest performance perl php png postgres postgresql primer privacy programming protocol proxy psychology publicdomain python python3 rails raspberrypi reactive reactjs reference regex rest rpc ruby rust sandbox scala science screencast search security sh shell software sql ssh ssl statistics storage styleguide svg sync sysadmin tcp terminal testing tex tls tools tor torrent tracking tunnel tutorial tutorials typography ui unicode unix ux video vim visualisation visualization vm web webdesign webdev websockets wiki windows wireless wysiwyg xmpp

Copy this bookmark: