The only problem with Python 3’s str is that you don’t grok it
I’ve found myself explaining Python 3’s str to people online more and more often lately. There’s this ridiculous claim about that Python 3’s string handling is broken or somehow worse than Python 2,...
View ArticleLearn ClojureScript in a Cloud IDE
By Zach Oakes on January 13th, 2017I used to be perplexed by people who didn't want to try ClojureScript due to the tooling. The ClojureScript crowd has rightly noted that modern JavaScript tooling is...
View ArticleCodec 2 700C
508 Resource Limit Is Reached The website is temporarily unable to service your request as it exceeded resource limit. Please try again later.
View ArticleAfter 1 minute on my modem (2016)
Since I temporarily have HN's attention with this side blog of mine, can I suggest one simple tweak:Please, please, if your site requires AJAX to work at all, then retry failed AJAX queries. Use...
View ArticleU.S. Reviewing Proposed Design of Miniaturized Nuclear Power Plant
NuScale power wants to build modular nuclear reactors small enough to fit on the back of a truck. NuScale hide captiontoggle caption NuScale Nuclear power plants are typically hulking structures made...
View ArticleI Turned a Routine Traffic Ticket into a Constitutional Trial
The traffic-camera ticket: like a parking ticket, it looks lawful enough. When they receive one, most people simply write the check. It seems like the sensible and law-abiding thing to do.But this is...
View ArticleZhou Youguang, creator of the Pinyin writing system, has died
Image copyrightGetty ImagesImage caption Zhou Youguang was born is 1906 during the Qing DynastyChinese linguist Zhou Youguang, who created the writing system that turns Chinese characters into words...
View ArticleDocker 0-Day Stopped Cold by SELinux
A new CVE, (CVE-2016-9962), for the docker container runtime and runc were recently released. Fixed packages have been prepared and shipped for RHEL as well as Fedora and Centos. This CVE reports that...
View ArticleGlobal sea ice records broken again
Sabbatical or not, records must be reported (like I did last year, here and here, albeit a month later).According to NSIDC data, the Global sea ice area record for lowest minimum has just been broken,...
View ArticleWindows on GitHub
This repo contains the samples that demonstrate the usage patterns for the Desktop Conversion Extensions, which is a bridge that enables you to convert your classic desktop application (like Win32,...
View ArticleRust by Example
Rust is a modern systems programming language focusing on safety, speed, and concurrency. It accomplishes these goals by being memory safe without using garbage collection.Rust by Example (RBE) is a...
View ArticleProgramming in the early days of the computer age
15 January 2017From the section TechnologyShareShare this withEmailShare this with EmailFacebookShare this with FacebookMessengerShare this with MessengerMessengerShare this with MessengerTwitterShare...
View ArticleBus Drivers Working in Silicon Valley Struggle to Afford Rent
Silicon Valley is a shining beacon of American success, home to some of the most profitable and innovative companies in the world, including Google, Facebook, PayPal, Oracle and Apple. Many employees...
View ArticleMastering Bash and Terminal
If there is one tool that every developer uses regardless of language, platform, or framework it's the terminal. If we are not compiling code, executing git commands, or scp-ing ssl certificates to...
View ArticleDebian 8.7 released
The Debian project is pleased to announce the seventh update of its stable distribution Debian 8 (codename jessie). This update mainly adds corrections for security problems to the stable release,...
View ArticleCracking the 12+ Character Password Barrier, Literally
First a quick background of these attack methods:Combo Attack: all words in two dictionaries are appended to each other.EXAMPLEdictionary1.txt dictionary2.txtpass => password, passpass, passlionword...
View ArticleThe Line of Death
When building applications that display untrusted content, security designers have a major problem— if an attacker has full control of a block of pixels, he can make those pixels look like anything he...
View ArticleThe Case for Ubuntu Phone
There are times in standard social interactions where people ask what you do professionally, which means I end up talking about Ubuntu and specifically Ubuntu Phone. Many times that comes down to the...
View ArticleWhat are the books banned in camp Guantanamo
January 11th 2017 will mark 15 years of injustice at Guantánamo Bay. The US authorities have held a total of 779 prisoners in this notorious detention facility, including at least 15 children. Now, 55...
View ArticleThe Trouble with Quantum Mechanics
Eric J. HellerThe physicist Eric J. Heller’s Transport XIII (2003), inspired by electron flow experiments conducted at Harvard. According to Heller, the image ‘shows two kinds of chaos: a random...
View Article