Something you didn't know about functions in bash
http://www.catonmat.net/blog/bash-functions/ [www.catonmat.net]
2017-04-01 22:23
Writing functions without braces.
random
Something you didn't know about functions in bash
http://www.catonmat.net/blog/bash-functions/ [www.catonmat.net]
2017-04-01 22:23
Writing functions without braces.
Method Dispatch in Swift
https://www.raizlabs.com/dev/2016/12/swift-method-dispatch/ [www.raizlabs.com]
2016-12-06 20:55
Knowing how method dispatch works is vital when writing performant code, and can illuminate some of the confusing behavior found in Swift.
There’s quite a lot too it. Long article.
A Thanksgiving Carol: How Those Smart Engineers at Twitter Screwed Me
http://blog.erratasec.com/2017/11/a-thanksgiving-carol-how-those-smart.html [blog.erratasec.com]
2017-11-24 23:03
So here’s the thing, and there’s no getting around it: my mom was right, on all particulars. She had done nothing, the computer had done it to her. It’s Twitter who is at fault, having continued to resend that confirmation email every couple months for six years.
802.11n MIMO support in OpenBSD -current
http://marc.info/?l=openbsd-tech&m=148139822902340&w=2 [marc.info]
2016-12-12 04:40
The net80211 stack and iwm(4) driver now support MIMO in -current.
Laws and Sausages
https://www.smbc-comics.com/comic/laws-and-sausages [www.smbc-comics.com]
2018-08-08 17:26
Windows Command-Line: Introducing the Windows Pseudo Console (ConPTY)
https://blogs.msdn.microsoft.com/commandline/2018/08/02/windows-command-line-introducing-the-windows-pseudo-console-conpty/ [blogs.msdn.microsoft.com]
2018-11-11 05:08
In this, the fourth post in the Windows Command-Line series, we’ll discuss the new Windows Pseudo Console (ConPTY) infrastructure and API - why we built it, what it’s for, how it works, how to use it, and more.
California's bad IoT law
https://blog.erratasec.com/2018/09/californias-bad-iot-law.html [blog.erratasec.com]
2018-09-11 22:38
It’s based on the misconception of adding security features. It’s like dieting, where people insist you should eat more kale, which does little to address the problem you are pigging out on potato chips. The key to dieting is not eating more but eating less. The same is true of cybersecurity, where the point is not to add “security features” but to remove “insecure features”. For IoT devices, that means removing listening ports and cross-site/injection issues in web management. Adding features is typical “magic pill” or “silver bullet” thinking that we spend much of our time in infosec fighting against.
The Go runtime scheduler's clever way of dealing with system calls
https://utcc.utoronto.ca/~cks/space/blog/programming/GoSchedulerAndSyscalls [utcc.utoronto.ca]
2019-12-08 18:34
One of Go’s signature features is goroutines, which are lightweight threads that are managed by the Go runtime. The Go runtime implements goroutines using a M:N work stealing scheduler to multiplex goroutines on to operating system threads. The scheduler has special terminology for three important entities; a G is a goroutine, an M is an OS thread (a ‘machine’), and a P is a ‘processor’, which at its core is a limited resource that must be claimed by an M in order to run Go code. Having a limited supply of Ps is how Go limits how many things it will do at once, so as to not overload the overall system; generally there is one P per actual CPU that the OS reports (the number of Ps is GOMAXPROCS).
source: HN
The SCRAM Authentication Protocol
https://www.cleeus.de/w/blog/2018/02/13/The_SCRAM_Authentication_Protocol.html [www.cleeus.de]
2018-03-05 17:27
A better CRAM-MD5. Interesting to consider, probably would not use in production.
source: solar
A Brief History of NeXT
http://lowendmac.com/2014/full-circle-a-brief-history-of-next/ [lowendmac.com]
2016-11-06 20:50
Modern garbage collection
https://medium.com/@octskyward/modern-garbage-collection-911ef4f8bd8e [medium.com]
2016-12-20 17:40
A critique of sorts of Go’s decision to prioritize latency. A good summary of challenges in garbage collection, but I’m not sure it does much to rebut the assertion that people really do care a lot about latency.
OpenBSD vmm/vmd Update
https://www.openbsd.org/papers/asiabsdcon2017-vmm-slides.pdf [www.openbsd.org]
2017-03-13 17:18
Better CPU support, better guest support, better configuration.
source: L
Tuesday Shouldn't Change The Narrative
http://slatestarcodex.com/2016/11/07/tuesday-shouldnt-change-the-narrative/ [slatestarcodex.com]
2016-11-07 18:24
If it all comes down to a rainstorm in Philly, does that count as a political mandate from the people?
If there’s some Z that you will believe only if Trump wins but not if Hillary wins, then I suggest you seriously reconsider what thought process has led you to decide that you will flip your views on politics and society depending on whether or not there’s a rainstorm or a 2% polling error or whatever.
ECS LIVA Z Fanless Dual-LAN Apollo Lake UCFF PC Review
http://www.anandtech.com/show/11229/ecs-liva-z-duallan-apollo-lake-ucff-pc-review [www.anandtech.com]
2017-03-30 20:11
This fanless Apollo Lake system targets the low-end market segment, and aims to differentiate itself by supporting two LAN ports.
At $180, could be a decent entry level firewall.
Nintendo’s Resurgence Was the Best Tech Story of 2017
https://www.theringer.com/2017/12/7/16746390/nintendo-2017-switch-snes-classic-wii-u [www.theringer.com]
2017-12-12 04:24
After years of annoying gimmicks, the gaming legend offered the simple pleasures we desperately needed
source: HN
MacOS monitoring the open source way
https://blogs.dropbox.com/tech/2018/04/4696/ [blogs.dropbox.com]
2018-06-01 17:01
Let’s say a machine in your corporate fleet gets infected with malware. How would you detect it? How could you find out what happened on the machine? What did the malware do? Did it steal your browser’s passwords? What network connections did the malware make? Was it looking for crypto currency? By having good telemetry and a good host monitoring solution for your machines you can collect the context necessary to answer these important questions.
Bringing service workers to Google Search
https://web.dev/google-search-sw/ [web.dev]
2019-06-21 15:25
The story of what shipped, how the impact was measured, and the tradeoffs that were made.
Quite long. Considers a variety of aspects.
Bill Ackman's Big Triumph Becomes His Big Problem
https://www.bloomberg.com/view/articles/2017-06-27/bill-ackman-s-big-triumph-becomes-his-big-problem [www.bloomberg.com]
2017-06-29 00:09
But every once in a while, a securities class-action suit comes along that combines high stakes, serious legal issues and potentially astronomical damages. A case called “In Re Allergan Inc Proxy Violation Securities Litigation” is one such lawsuit. It should be getting a lot more attention than it is.
I Gave a Bounty Hunter $300. Then He Located Our Phone
https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile [motherboard.vice.com]
2019-01-10 00:50
T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country.
Senators call for investigation: https://motherboard.vice.com/en_us/article/j5z74d/senators-harris-warner-wyden-fcc-investigate-att-sprint-tmobile-bounty-hunters
AT&T to stop: https://motherboard.vice.com/en_us/article/nepab8/att-stop-selling-location-data-tmobile-sprint-microbilt-zumigo
How the CIA used Crypto AG encryption devices to spy on countries for decades
https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/ [www.washingtonpost.com]
2020-02-11 23:16
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.
But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages.
source: HN