3905
JVM JIT optimization techniques - Advanced Web Machinery
An overview of JVM JIT optimization techniques and fun with measurements.
java 
9 hours ago
Practical Dependent Types in Haskell: Type-Safe Neural Networks (Part 1) · in Code
It seems these days like programming with dependent types in Haskell (and its advantages) is moving slowly but steadily to the mainstream of Haskell programming. In the current state of Haskell education, dependent types are often considered topics for advanced Haskell users. However, I can foresee a day where the ease of use of modern Haskell libraries relying on dependent types forces programming with dependent types to be an integral part of normal intermediate (or even beginner) Haskell education. There are more and more and more and more great resources and tutorials and introductions to integrating dependent types into your Haskell every day. The point of this series is to show more some practical examples of using dependent types in guiding your programming, and to also walk through the why and high-level philosophy of the way you structure your Haskell programs. It’ll also hopefully instill an intuition of a dependently typed work flow of exploring how dependent types can help your current programs. The intended audience of this post is for intermediate Haskell programmers in general, with no required knowledge of dependently typed programming. I should also point out that I’m no expert — I’m still in the process of learning this all, myself :) The first project in this series will build up to a type-safe artificial neural network implementation with back-propagation training.
haskell 
3 days ago
OpenBSD/loongson on the Lemote Yeeloong 8101B - Cambus.net
Running the OpenBSD/loongson port on a Lemote Yeeloong 8101B
unix 
6 days ago
HOWTO: WPA2-Enterprise with FreeRadius | The FreeBSD Forums
In this tutorial you will be able to successfully set up a home wireless network using FreeBSD and WPA2-Enterprise option on your wireless router....
admin  security 
6 days ago
Turn a $60-$120 router into an Enterprise class wireless router with OpenWRT | Jack of All I.T. on WordPress.com
Enterprise Wireless Security and You! Enterprise Wireless is all about security. If you had customer transactions going over a wireless network, you'd want to be sure your data was protected from hackers. Unfortunately, Enterprise security typically involves expensive access point hardware, a radius server, and a complicated configuration. But, it doesn't have to be hard!…
security  admin 
7 days ago
Our best practices are killing mobile web performance · molily
Web performance rules invented for desktop web access need be revised for the mobile era.
webdev 
8 days ago
Best Practices for Using the Vary Header | Fastly
Vary is one of the most powerful HTTP response headers. Used correctly, it can do wonderful things. Unfortunately, this header is frequently used incorrectly, which can lead to abysmal hit ratios. Worse still, if it's not used when it should be, the wrong content could be delivered.
webdev 
10 days ago
Eliza Gauger, it’s a good question and im not sure hwat the...
it’s a good question and im not sure hwat the answer is. i like to rag on lead designers as much as anyone else, mostly because they’re convenient figureheads to accept blame, and they usually dress...
culture 
12 days ago
10 thousand times faster Swift — Medium
I guess this blog post is irrelevant for most App developers, as the performance optimisations, or rather pitfalls which I will discuss in…
swift 
12 days ago
Caching Tutorial for Web Authors and Webmasters
Covers the how's and why's of Web caching for people who publish on the Web. With FAQs.
12 days ago
Top 10 dumb mistakes to avoid with C++ 11 smart pointers - A CODER'S JOURNEY
I love the new C++ 11 smart pointers. In many ways, they were a godsent for many folks who hate
14 days ago
Lambda expression comparison between C++11, C++14 and C++17 – Oscar Forner's personal website
In this post I talk about what has been added in the C++ standard regarding lambda expressions since they were introduced in C++11.
14 days ago
DDos Mitigation - Using NGINX to Prevent DDoS Attacks | NGINX
Learn about the features in NGINX and NGINX Plus that make them a valuable part of a solution for DDoS attack mitigation
security  networking 
16 days ago
Giant Bags of Mostly Water by Konstantin Ryabitsev
Securing your infrastructure by securing your humans.
security 
21 days ago
Why specs matter
Most developers are morons, and the rest are assholes. I have at various times counted myself in both groups, so I can say this
23 days ago
Our brain uses statistics to calculate confidence, make decisions | Neuroscientist News
The brain produces feelings of confidence that inform decisions the same way statistics pulls patterns out of noisy data -
24 days ago
Myths and Legends about Integer Overflow in Rust | Huon on the internet
Integer overflow detection/handling in Rust is sometimes misunderstood.
rust 
4 weeks ago
The future of loading CSS - JakeArchibald.com
Chrome is intending to change the behaviour of in , which allows for better ways to load CSS
webdev 
4 weeks ago
Caching best practices & max-age gotchas - JakeArchibald.com
How to get the most out of caching without nasty race conditions
webdev 
4 weeks ago
UDP for games – security (encryption and DDoS protection) - IT Hare on Soft.ware
Quote:"Yes, you DO need to encrypt your UDP traffic. And no, using UDP is NOT a valid excuse to skip encryption"Another Quote:"Personally, I prefer to think of it as of insurance - when I'm paying my premiums in hope that my money will go to waste."[→]
networking 
4 weeks ago
Long Compile Time in Swift? Could be the Literal Parsing Bug
Be aware of Swift's inability to efficiently parse and compile simple Dictionary/Array literals. The compilation time grows exponentially with each line.
swift 
4 weeks ago
The BSD family of operating systems | GeekLAN
At OSHUG #46 I was given the opportunity to present the BSD’s to a group of open source hardware enthusiast & speak about why this family of operating systems would benefit the person run…
unix 
5 weeks ago
The AAduino – Johan Kanflo
I have been using Nathan Chantrell’s Tiny328 for quite some time as my swiss army knife ISM radio node. Now I wanted a more slim ISM node as my setup with a Tiny328 on a breadboard is not ver…
hardware 
5 weeks ago
Row Level Security with PostgreSQL 9.5
Release 9.5 of PostgreSQL delivers many new features like upsert, new JSONB functions, new GROUPING functions, and more. While some of these like upsert or JSONB may be useful to many people, a number of these new features really...
postgres  security 
5 weeks ago
Dan Grover | Chinese Mobile App UI Trends
A summary of common idioms and visual language found in Chinese smartphone apps.
design 
5 weeks ago
A Man Gets Revenge on Noisy Neighbors With an Arduino System That Automatically Blasts Loud Music Back at Them
A man sought revenge against his noisy neighbors by building an Arduino system that blasts loud music back at them automatically. The system uses a microphone to detect when the neighbors play loud…
fun 
6 weeks ago
nanomsg postmortem and other stories | Sealed Abstract
nanomsg was a once-bright alternative to ZeroMQ. The project had a lot going for it: It was a rewrite by the original author. It was a rewrite in C, and there were really solid technical arguments …
6 weeks ago
Design scenarios—and how thrilled users ruin them « User Experience Design Training & Consulting–UX Design Edge
Scenario-based design is the best tool we have for designing great products that our customers will love, yet all too often I see scenarios that are completely useless. A common mistake is for a sc…
design 
6 weeks ago
Intuitive UI: What the heck is it? « User Experience Design Training & Consulting–UX Design Edge
For any UX project, it’s almost a sure thing that a top goal is to have an “intuitive UI.” Given this, it’s reasonable to ask what it means for a UI to be intuitive. Surprisingly, nobody really kno…
design 
6 weeks ago
Don’t design like a programmer, part 3 « User Experience Design Training & Consulting–UX Design Edge
I’ve got a great response to my original “Don’t design like a programmer” post, but the consistent feedback has been to show good designs too. In this post, I present an improved …
design 
6 weeks ago
Don’t design like a programmer, part 2 « User Experience Design Training & Consulting–UX Design Edge
I’ve got a great response to my original “Don’t design like a programmer” post, but the consistent feedback has been to show good designs too. In this post, I will outline a proce…
design 
6 weeks ago
Don’t design like a programmer « User Experience Design Training & Consulting–UX Design Edge
I sometimes say that UI looks like it was “designed by a programmer” to describe a class of UI design mistakes that programmers are particularly prone to make. Read this post to learn how to …
design 
6 weeks ago
Voronoi Diagrams on the GPU – Ryan Kaplan
Software Engineer at Figma. Previously at Dropbox. Studied Math/CS at Brown University.
6 weeks ago
A white-label slide deck | Alice Bartlett
The website of Alice Bartlett. Front-end developer and internet person
6 weeks ago
Understanding typing judgments
A blog mostly on math, physics, and computer science.
pl  math 
6 weeks ago
GitHub’s CSP journey - GitHub Engineering
We shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
security 
6 weeks ago
Aligning text smartly in CSS
Have you ever thought of aligning text smartly in CSS? You must try now. No there is no CSS property text-align:smart or smartly but can achieved by CSS easily.
css 
7 weeks ago
A Simple Web Developer's Guide To Color – Smashing Magazine
In this article, you won’t see a single color wheel. Instead it shows you a simple color selection workflow that you can use in your next web project.
design 
7 weeks ago
Полезные трюки PostgreSQL / Хабрахабр
В мануале есть всё. Но чтобы его целиком прочитать и осознать, можно потратить годы. Поэтому один из самых эффективных методов обучения новым возможностям...
postgres 
7 weeks ago
Zenity на службе у системного администратора / Хабрахабр
Задумала как-то одна компания перейти на ПО свободное. И скачали себе линукс на все компьютеры, и сервер с дисками заморскими поставили, и учетные записи для...
admin  unix 
7 weeks ago
Memory Leaks are Memory Safe | Huon on the internet
Memory unsafety and memory leaks are distinct concepts, despite their names. Languages that are merely memory safe (both Rust and GC-reliant managed ones) have no guarantee of preventing memory leaks.
7 weeks ago
Terrible choices: MySQL | ionel's codelog
The terrible pitfalls I've gotten myself into while using MySQL — I've used MySQL for a while now, and there were lots of surprising things I needed to cater for. This is from a Django and MySQL 5.5 perspective ...
mysql 
7 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs erlang fun gc git golang graphics hardware haskell java javascript latex math music mysql nethack networking ocaml photoshop php pl postgres privacy prolog python redis ruby rust scala security smalltalk svg swift talk tools typography unicode unix via:macdrifter via:sunpig via:tlockney video vim webdev windows zfs

Copy this bookmark:



description:


tags: