This article introduces the first release of ‘Lash#Cat9’, a different kind of command-line shell. A big change is that it is communicating with the display server directly, instead of b…
This article continues the long-lost series on how to migrate away from terminal protocols as the main building block for command-line and text-dominant user interfaces. The previous ones (Chasing …
In this post, I’ll show you why 99% of Javascript code are less readable than they should be thanks to developers refusing to communicate their intention.
const the world Before ES6, there was no way to declare constants so people used to do this:
var PI = 3.14; Now when you get fired, your successor will read this code and figure out that PI should never be reassigned.
But as from ES6, everthing is a constant:
Haskell may not be a language in the same way that French, Swahili, or Quechua are languages, but language both spoken and coded regardless have much in common. However, traditional languages are much better adapted for speech than they are to writing; after all, we humans have been speaking for far longer than we have been writing. Language has been shaped enormously by what is and is not easy to convey with the sounds our mouths make, and text is at best a very lossy technique for recording those sounds, even if the content conveyed by tone, cadence, and emotion is largely lost.
Many offices and public settings are putting up clear plexiglas barriers to insulate staff from the spread of disease. While we can easily see through these partitions, it ends up creating a lot of…
IBM builds Diamondback tape library for enterprise and cloud hyperscalers – Blocks and Files
Big Blue is active afresh in the archive-storing tape library business, with its Diamondback product for web-scale enterprises and hyperscalers, claimed to be the industry’s densest library. IBM says it has 1.8x more petabytes per square foot compared to competitor tape storage and is specifically targeted at Google, Microsoft, AWS and Meta (Facebook). We’re told they […]
Caliptra: Building Cloud Security from the Chip up
The Open Compute Project (OCP), which brings open source methods and collaboration to the data center, has introduced Caliptra, an open specification for a silicon Root-of-Trust (ROT).
All memory accesses in a BPF program are
statically checked for safety using the
verifier, which analyzes the program in its
entirety before allowing it to run. While this allows BPF programs to
safely run in kernel space, it restricts how that program is able to use
pointers. Until recently, one such constraint was that the size of a memory
region referenced by a pointer in a BPF program must be statically known
when a BPF program is loaded. A recent
patch set by Joanne Koong enhances BPF to support loading programs with
pointers to dynamically sized memory regions.
I hear it all the time from chart purists. “I love the streamgraph!” and “Word clouds are the best!” and “I wish there was an easy way to combine a streamgraph and wor…
Why an architecture with three Availability Zones is better than the one with two Availability Zones?
A couple of months back a customer asked why we are proposing a three Availability Zone (AZ in short) architecture instead of two. Their main point was which failure modes 3 AZs guard against that …
A Memory Safe Implementation of the Network Time Protocol
Folkert and the team at Tweede golf are helping us to build a memory safe NTP implementation. We asked them to share their experience in this blog post. Thank you for your partnership and contributions, Tweede golf team!
Josh Aas, Head of ISRG’s Prossimo project For the last few months we at Tweede golf have been working on implementing a Network Time Protocol (NTP) client and server in rust.
URL monitoring made easy: self-hosted open-source tool for checking your website availability
Learn website monitoring best practices in this post. Setup your own HotHost monitor in minutes which has free notifications to Slack, Telegram, Email and is a fast-to-setup lightweight alternative to Nagios, Zabix and other website monitoring tools
HTTP does a pretty good job staying out of everyone's way. If you're reading this article, there's a solid chance it was delivered to you
over HTTP. Even if you're reading this ...
How DoorDash Governs Its Infrastructure with Open Policy Agent
Aftera DoorDash engineer creates a GitHub pull request, Atlantis runs a Terraform plan and passes the plan file to conftest, which evaluates the OPA policy based on the Terraform plan, then comments the output to the PR.