The Life of a Data Byte: Be kind and rewind
A byte of data has been stored in a number of different ways through the years as newer, better, and faster storage media are introduced. A byte is a unit of digital information that most commonly refers to eight bits. A bit is a unit of information that can be expressed as 0 or 1, representing a logical state. Let’s take a brief walk down memory lane to learn about the origins of bits and bytes.
Things I Learnt from a Senior Software Engineer
Neil worked at Bloomberg for a year, sat next to a senior software engineer for a year. Here’s what he learned. Many topics: naming, dealing with legacy code , when thing goes wrong and more.
AWS Tagging Best Practices Guide
On AWS, tagging is a way to categorize resources for many reasons: billing analysis, grant permission. Examples of tag usages: this user can only access resources with this tag, or automated backup EBS volume with this tag. AWS is massive and if we don’t tag, we will very quickly end up with a big mess.
Inside a CODE RED: Network Edition
Basecamp, the maker of Ruby On Rails, suffered a few major outages this month and share the post mortem. I always love these posts because why we can learn from success, learning from failure is even more important because not many share their failure :-). An interesting part is that the chatops server that can be used to reconfigure the network is down/slow due to network being overload and they have to manually reconfigure the routers.
Unicode support. What does that actually mean
What is the uppercase of あ, a Japanese character? why ſecret == secret == Secret? When you upper-case groß you can get either GROß or GROSS? What is that mess? Let’s dig into the Unicode encoding world
To design and develop an interactive globe
What Shell Am I Using?
Finding the shell you’re actually using isn’t all that simple at first. You can find the location of the executable of the shell. You can find all the processes currently running with that shell name. But gathering information about the shell you’re typing all those commands in to find the shell you’re using requires a little more poking around. The two easiest solutions, on macOS at least, are lsof and fuser
The UNIX `who` command
In order to see what the who command is doing I could try to find the source code and dig into it. But I found it fun to use strace to check what the process was doing instead. Since we are expecting who to read system files, we can only focus on the open syscalls.
How to build a Handwriting Reader from scratch with Deep Learning
When I makes mobile check deposit and the bank mobile app detects the amount reliably, I’m amazed at that technology. That’s good use of tech to improve our life. In this article we will be learning about the task of handwritten text recognition, it’s intricacies and how we can solve it using deep learning techniques.
Code to read
a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks aims to be the easy-to-use, all-in-one solution for finding secrets, past or present, in your code.
A free group video call app with screen sharing.
It is built using WebRTC, so all your video chat is peer-to-peer. Group video call is achieved using WebRTC mesh
provides Windows Hello™ style authentication for Linux. Use your built-in IR emitters and camera in combination with facial recognition to prove who you are.
A rewriting web proxy for testing interactions between your browser and external sites. Works with ruby + rspec.
Puffing Billy is like webmock or VCR, but for your browser.
a reasonably fast, minimal stack-based VM in C. It currently implements just enough functionality to do recursive Fibonacci
an intuitive find & replace CLI. Kind of like
an A/B testing backend using AWS Lambda/API Gateway + Redis.
a Scaleable A/B testing backend in ~100 lines of code (and for free*)
you describe the configuration of your application. werf build docker image and deploy to k8s
a lightweight but powerful SQL tool with a notebook interface
a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this