4395
✨Implementing "Save For Offline" with Service Workers | Una Kravets Online✨
Thoughts about front-end development and design. And probably other ramblings by Una Kravets.
webdev 
14 hours ago
Creating Non-Rectangular Headers | CSS-Tricks
Over at Medium, Jon Moore recently identified "non-rectangular headers" as a tiny trend. A la: it's not crazy popular yet, but just you wait, kiddo. We're talking about headers (or, more generally, any container element) that have a non-rectangular shape. Such as trapezoids, complex geometric shapes, rounded/elliptical, or even butt-cheek shaped.
css  design  svg 
14 hours ago
ZorroSVG - Put a Mask on it
ZorroSVG - Put a Mask on it. The transparency of PNGs for the file size of JPEGs.
webdev  svg  tools 
14 hours ago
Do responsive sites have to be so tall on mobile? | Viget
Height is often overlooked in responsive design. On mobile, pages can get pretty long. Should we address this?
design 
14 hours ago
pts.blog: How to make smaller C and C++ binaries
This blog post presents several techniques to make the binaries resulting from C or C++ compilation smaller with GCC (or Clang). Please note...
c 
yesterday
Haskell Exists: Ten example uses of Monads
In this “monad tutorial” we are not going to learn what monads are, how they are implemented or how they work internally. Instead we are goi...
haskell 
3 days ago
The Nokia N9 Alarm Clock – Nition
I want to talk about the Nokia N9 alarm clock application because it’s a really nice example of thoughtful, functional design – and because it’s only on the N9, so a lot of people…
design 
3 days ago
The ICANN mafia has taken my site hostage for 2 days now
This is an short story on how ICANN acts like mafia and has taken my site Nomad List hostage for 2 days now. Here’s how my site used to look: Here’s how it has looked for the past few days: Here’s a short story on how that happened My domain registrar for Nomad List is ...
4 days ago
The Ultimate Question of Programming, Refactoring, and Everything | Intel® Software
Yes, you've guessed correctly - the answer is "42". In this article you will find 42 recommendations about coding in C++ that can help a programmer avoid a lot of errors, save time and effort. The author is Andrey Karpov - technical director of "Program Verification Systems", a team of developers, working on PVS-Studio static code analyzer.
c 
4 days ago
straw camera is an analogue lens made from 32000 drinking straws
each straw has its own density and hue, and the analogue camera gives a straight indexical rendering of whatever is placed directly in front of it.
4 days ago
AnC - VUSec
Address Space Layout Randomization Address space layout randomization or ASLR in short is a first line of defense against attackers targeting Internet users. ASLR randomizes the location of an application’s code and data in the virtual address space in order to make it difficult for attackers to leak or manipulate the data or reuse the … Continue reading AnC →
security 
8 days ago
PostgreSQL worst practices, version FOSDEM PGDay 2017 by Ilya Kosmode…
This talk is prepared as a bunch of slides, where each slide describes a really bad way people can screw up their PostgreSQL database and provides a weight - h…
postgres 
9 days ago
Is PostgreSQL good enough?
tldr; you can do jobs, queues, real time change feeds, time series, object store, document store, full text search with PostgreSQL. How to,...
postgres 
9 days ago
Here's What TfL Learned From Tracking Your Phone On the Tube
EXCLUSIVE! Giz UK can exclusively reveal some of the amazing things that TfL discovered by tracking the wifi on our mobile devices.
10 days ago
Disc Rot: What Happens When Discs Die
CDs were sold to consumers as these virtually indestructible platters, but the truth, as exemplified by the disc rot phenomenon, is more complicated.
10 days ago
Make Phoenix Even Faster with a GenServer-backed Key Value Store
Skip adding another dependency and leverage GenServer and Erlang Term Storage to build an in-memory key-value store for even faster Phoenix applications.
elixir  erlang 
11 days ago
Production psql Prompts | OpenSCG
I deal with lots of production. When you're dealing with multiple production machines, it's important to know many things: Who you are What you're connected to Where you are Why you are connected When you are connected Most prompts don't give
postgres 
11 days ago
Designing a Business Card in LaTeX
In 2017, I will graduate from Ghent University. This means starting a professional career, either in academia or in industry. One of the first things that ca...
latex 
11 days ago
50 Bytes of Code That Took 4 GB to Compile | Random ASCII on WordPress.com
While doing evil things with macros and the inline assembler (trying to run a weird test whose purpose is not really relevant) I managed to write a program that caused Visual Studio’s C++ compiler to allocate 4 GB of memory and then die. Not bad for a program that can easily fit into a single…
12 days ago
Error Handling in Elixir Libraries | Michał Muskała
There was an interesting discussion yesterday on the Elixir Slack about how libraries should handle errors. This is a more thought-through and elaborate expression on my views on the matter. In the post, I’ll present an idealised version of how I think a public API for functions that may produce errors should look like.
elixir 
12 days ago
Let’s talk about CFI: clang edition | Trail of Bits Blog on WordPress.com
Our previous blog posts often mentioned control flow integrity, or CFI, but we have never explained what CFI is, how to use it, or why you should care. It’s time to remedy the situation! In this blog post, we’ll explain, at a high level, what CFI is, what it does, what it doesn’t do, and…
c 
14 days ago
Rustler - Safe Elixir and Erlang NIFs in Rust
Natively Implemented Functions, more commonly known as NIFs, are not a new thing in Erlang. They have been around for several years, and are commonly used fo...
erlang  rust 
14 days ago
The 68 things the CLR does before executing a single line of your code (*) · Performance is a Feature!
Because the CLR is a managed environment there are several components within the runtime that need to be initialised before any of your code can be executed. This post will take a look at the EE (Execution Engine) start-up routine and examine the initialisation process in detail.
dotnet 
15 days ago
Why should *hard* be secure enough? Information and non-invertibility
The guarantees provided by hashes are of critical importance for security. One of the major points of hashes is, of course, their non-invertibility. However...
math 
16 days ago
Code your own QuickCheck | Deque on WordPress.com
In the next posts, we will go through a small implementation challenge. The goal will be to implement our own limited version of QuickCheck, the famous generative testing framework of Haskell. Whether or not you do know about the concept of generative testing, I advice you to have a look at the original publication of…
haskell 
19 days ago
Do not TIP!
Projects and texts by Tom Jennings; technological history and culture.
20 days ago
Apple’s Icons Have That Shape for a Very Good Reason
If you haven’t been immersed in iOS interface design, you might look at Apple’s icons and think that they’re just a rounded square or a…
design 
21 days ago
Understanding the Critical Rendering Path
When a browser receives the HTML response for a page from the server, there are a lot of steps to be taken before pixels are drawn on the screen. This sequence the browsers needs to run through for the initial paint of the page is called the "Critical Rendering Path"
webdev 
22 days ago
Why Didn’t the Dream of a Laptop Upgrade Slot Take Off? | Motherboard
With PCMCIA (also known as PC Card), it was easy to upgrade our old laptops. Now, though, the tech has been relegated to a depressing bureaucratic fate.
23 days ago
Erlang is a hoarder | Andy Skelton on WordPress on WordPress.com
One day you set aside a shoebox to store newspaper clippings. Suddenly you are trapped under an avalanche of whole newspapers and wondering how long your body will lie there before anyone misses you. That is what kept happening to my Erlang apps. They would store obsolete binary data in memory until memory filled up.…
erlang 
24 days ago
Why Every Element of SOLID is Wrong // Speaker Deck
Five minute Ignite-style talk from PubConf London 2016
25 days ago
Java is Unsound: The Industry Perspective – Hacker Noon
Recently Nada Amin and I discovered that Java and Scala are unsound. We submitted the finding and related discussion to OOPSLA, an academic…
4 weeks ago
What Happens When You Mix Java with a 1960 IBM Mainframe - The New Stack
As an engineer for the U.S. Digital Service, Marianne Bellotti has encountered vintage mainframes that are still being used in production — sometimes even powering web apps. Last month she entertained a San Francisco audience with tales about some of them, in a talk called “7074 says Hello World,” at Joyent’s “Systems We Love” conference. Created under the …
4 weeks ago
TypeScript 2.1: Mapped Types | Marius Schulz
TypeScript 2.1 introduced mapped types, a powerful type system feature which allows you to create new types from existing ones by transforming properties.
4 weeks ago
Building a Kafka that doesn’t depend on ZooKeeper – The Hoard – Medium
How Jocko builds in service discovery and consensus with Serf and Raft and not depend on ZooKeeper.
4 weeks ago
How quickly can you remove spaaaces from a string? – Daniel Lemire's blog
Related Posts: Variable-length strings can be expensive Intel will add deep-learning instructions to its processors How fast is tabulation-based hashing? The downsides of…
4 weeks ago
How Do I Declare A Function Pointer in C?
Fucking Function Pointers: Examples for declaring function pointers in C
c 
4 weeks ago
GitHub’s post-CSP journey - GitHub Engineering
Last year we shared some details on GitHub’s CSP journey. A journey was a good way to describe it, as our usage of CSP significantly changed from our initial release nearly four years ago to where we ended up last year. It wasn’t until then that we felt our policy was relatively stable and, while we were not foolish enough to call it “done,” we found the policy was refined enough to focus on protections beyond what CSP offered.
security  webdev 
4 weeks ago
Stepping into math: Open-sourcing our step-by-step solver
The first open-source project that teaches math step-by-step
5 weeks ago
getmail frequently-asked questions (FAQs) (version 4)
"Why did you write getmail? Why not just use fetchmail?

Short answer: … well, the short answer is mostly unprintable. The long answer is … well, long"
5 weeks ago
Demystifying Flask-SQLAlchemy | Derrick Gilland
It seems that one of the biggest questions around Flask-SQLAlchemy is how to use SQLAlchemy models outside of a Flask application. Several questions have been posted on sites like Stackoverflow and Re
python 
5 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs erlang fun gc gimp git golang graphics hardware haskell java javascript latex math music mysql nethack networking ocaml photoshop php pl postgres privacy prolog python redis ruby rust scala security smalltalk svg swift talk tools typography unicode unix via:bfin via:gohai via:macdrifter via:sunpig via:tlockney video vim webdev windows zfs

Copy this bookmark:



description:


tags: