Found 49605 bookmarks
Newest
NUMA policy and memory types [LWN.net]
NUMA policy and memory types [LWN.net]
Non-uniform memory access (NUMA) systems have an architecture that attaches memory to "nodes" within the system. CPUs, too, belong to nodes; memory that is attached to the same node as a CPU will be faster to access (from that CPU) than memory on other nodes. This aspect of performance has important implications for programs running on NUMA systems, and the kernel offers a number of ways for user space to optimize their behavior. The NUMA abstraction is now being extended, though, and that is driving a need for new ways of influencing memory allocation; the multi-preference memory policy patch set is an attempt to meet that need.
·lwn.net·
NUMA policy and memory types [LWN.net]
New Study Shows That Lidding I-5 Is More Than Possible — It's a Good Idea - Slog - The Stranger
New Study Shows That Lidding I-5 Is More Than Possible — It's a Good Idea - Slog - The Stranger
A few years ago, transportation planners with the state of Washington came up with a great idea: Let’s demolish all of the buildings in the middle of Seattle and build a giant freeway so suburban commuters can drive into the city instead of having to take gross public transit. And then they did it. Seattle existed before I-5 was built, and it’ll exist after it’s gone. But in the meantime, we’re going to have to...
·thestranger.com·
New Study Shows That Lidding I-5 Is More Than Possible — It's a Good Idea - Slog - The Stranger
A Trilemma for “Taxation is Theft”-Libertarians | Radical Classical Liberals
A Trilemma for “Taxation is Theft”-Libertarians | Radical Classical Liberals
Claiming that taxation is theft is an effective way to signal that you think of yourself as a libertarian of the more radical, uncompromising, and possibly more Rothbard-inspired sort. But are ther…
·radicalclassicalliberals.com·
A Trilemma for “Taxation is Theft”-Libertarians | Radical Classical Liberals
Building a Raspberry Pi-based Cyberdeck #PiDay #RaspberryPi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
Building a Raspberry Pi-based Cyberdeck #PiDay #RaspberryPi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
Кибердек (Cyberdeck) RA01 is a custom-made wearable computer, inspired by classic cyberpunk science fiction. Cyberdecks are fictional devices, common for the cyberpunk genre. It seems to me that th…
·blog.adafruit.com·
Building a Raspberry Pi-based Cyberdeck #PiDay #RaspberryPi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
What’s the Biggest Gap in Kubernetes Storage Architecture? – The New Stack
What’s the Biggest Gap in Kubernetes Storage Architecture? – The New Stack
Year over year, Kubernetes consistently ranks among the most-loved platforms on Stack Overflow’s Developer Survey. It’s not hard to understand why. It offers easy scaling, great stability and reliability, works across many different environments. In short, it offers all the features that developers love. Where it starts to lose its luster, however, is in production.…
·thenewstack.io·
What’s the Biggest Gap in Kubernetes Storage Architecture? – The New Stack
Microsoft just blew up the only reason you can't use a Linux desktop | ZDNet
Microsoft just blew up the only reason you can't use a Linux desktop | ZDNet
For almost 30 years, the number one reason Windows users have given for not running Linux is they couldn't run their programs on it. Now that Windows 365 Cloud PC is almost here that excuse has just been blown to bits.
·zdnet.com·
Microsoft just blew up the only reason you can't use a Linux desktop | ZDNet
How 10 Old TV Networks Went Off the Air
How 10 Old TV Networks Went Off the Air
Analyzing the complicated state of affairs, and the long goodbyes, that come when one TV network or cable channel replaces another. Here are 10 examples.
·tedium.co·
How 10 Old TV Networks Went Off the Air
Give Love, Get Love | Gapingvoid
Give Love, Get Love | Gapingvoid
We, as humans, like to categorize. It makes the world easier to digest. We fit the people around us into labels: users, coworkers, competitors.
·gapingvoid.com·
Give Love, Get Love | Gapingvoid
On proper handling of buffers in COM and RPC methods | The Old New Thing
On proper handling of buffers in COM and RPC methods | The Old New Thing
Suppose you have a function method that accepts a sized buffer in the form of a pointer plus a length. How defensive do you need to be about validating the parameters? A customer wanted to know, “How can I validate that caller passed a buffer of the declared size?
·devblogs.microsoft.com·
On proper handling of buffers in COM and RPC methods | The Old New Thing
Pininfarina Concept Car With No Side Doors; You Enter From the Back - Core77
Pininfarina Concept Car With No Side Doors; You Enter From the Back - Core77
We've seen some weird cars where you enter through the front of the vehicle: The Microlino The Dodge Deora Now Pininfarina has unveiled a sexy new "virtual" electric concept car, the Teorema, with the opposite approach. You enter from the back. The roofline swings forward on hinges, raising
·core77.com·
Pininfarina Concept Car With No Side Doors; You Enter From the Back - Core77
Authorize Better: Istio Traffic Policies with OPA, Styra DAS – The New Stack
Authorize Better: Istio Traffic Policies with OPA, Styra DAS – The New Stack
Cloud native tooling for authorization is an emerging trend poised to revolutionize the way we approach this oft-neglected part of our applications. Open Policy Agent (OPA) is the leading contender to become a de-facto standard for applying policies to many different systems, from workloads running on Kubernetes to requests passing through Istio. In this article…
·thenewstack.io·
Authorize Better: Istio Traffic Policies with OPA, Styra DAS – The New Stack
Domain-Driven Refactoring: Procedural Beginnings
Domain-Driven Refactoring: Procedural Beginnings
Posts in this series: IntroProcedural BeginningsLong MethodsExtracting Domain ServicesAs part of the red-green-refactor TDD process, the second step of making the test pass means we write the simplest (but still correct) code that can possibly work that flips our test from red to green. For me, this means in an
·jimmybogard.com·
Domain-Driven Refactoring: Procedural Beginnings
I don't have time for this sh...
I don't have time for this sh...
Talking about HTTP request timeouts, a not so interesting subject
·turtle-techies.com·
I don't have time for this sh...
The original source for the 1981 masterpiece “Defender” is now on Github! #Gaming #Arcade « Adafruit Industries – Makers, hackers, artists, designers and engineers!
The original source for the 1981 masterpiece “Defender” is now on Github! #Gaming #Arcade « Adafruit Industries – Makers, hackers, artists, designers and engineers!
The original source for Eugene Jarvis and Sam Dicker’s 1981 masterpiece “Defender” has been put on GitHub this week! The source code can be assembled into an executable that you c…
·blog.adafruit.com·
The original source for the 1981 masterpiece “Defender” is now on Github! #Gaming #Arcade « Adafruit Industries – Makers, hackers, artists, designers and engineers!
A plan for ‘wrong’ | Seth's Blog
A plan for ‘wrong’ | Seth's Blog
Infallibility is a difficult model for forward motion. It’s likely that you’re going to make an error. That you will make choices based on things you don’t know, perhaps should ha…
·seths.blog·
A plan for ‘wrong’ | Seth's Blog
A tale of two waters | Crosscut
A tale of two waters | Crosscut
Seattle is about 40% water, but not all of our bodies of water are created equal. Sixty years ago, Lake Washington was cleaned at the expense of the Duwamish River and the residents who rely on it. Decades of pollution have left a largely immigrant and Indigenous community to bear the environmental burden.
·crosscut.com·
A tale of two waters | Crosscut
Copycat industrialism | Seth's Blog
Copycat industrialism | Seth's Blog
“Let’s make more!” 99.99% of what’s produced and sold is a copy or variation of something that was already made and sold. That’s the power of industry to shape our wor…
·seths.blog·
Copycat industrialism | Seth's Blog
Monitor your home's temperature and humidity with Raspberry Pis and Prometheus | Opensource.com
Monitor your home's temperature and humidity with Raspberry Pis and Prometheus | Opensource.com
Data is beautiful. As a #CitizenScientist, I enjoy gathering data and trying to make sense of the world around me. At work, we use Prometheus to gather metric data from our clusters, and at home, I use Prometheus to gather data from my hobbies. This article explores how to take an application—a Python script that gathers temperature and humidity data from a sensor—and instrument it to provide data in a model that Prometheus can gather.
·opensource.com·
Monitor your home's temperature and humidity with Raspberry Pis and Prometheus | Opensource.com