136 private links
Have you ever wanted a theme tune to play as you enter the room? Perhaps the imperial march, a pop hit or Super Mario’s Jolly Roger Bay. Well now you can thanks to the Human presence triggered music player – a small box which will wait for your arrival and serenade you when you step in trough the door and switch the lights on!
It’s designed for service rooms but has applications for all kinds of locations and establishments. The music is stored on an SD card, which can be selected by pressing the knob – which also controls the volume when turned. You might like to have some relaxing music to accompany a deep bath or something to get you pumped up for the home gym – whatever you choose it’s an unusual and ingenious device. Simply let it play out or turn off the lights to stop the music!
User-friendly, colorful output
Adjusts to your terminal's width
Sort the results according to your needs
Groups & filters devices
Can conveniently output JSON
In this course, students will learn to develop complex system-level software in the C programming language while gaining an intimate understanding of the Unix operating system (and all OS that belong to this family, such as Linux, the BSDs, and even Mac OS X) and its programming environment.
Topics covered will include the user/kernel interface, fundamental concepts of Unix, user authentication, basic and advanced I/O, fileystems, signals, process relationships, and interprocess communication. Fundamental concepts of software development and maintenance on Unix systems (development and debugging tools such as "make" and "gdb") will also be covered.
Students are expected to have a good working knowledge of the C programming language, have written non-trivial programs before, and to be able to competently use a Unix system with a command-line shell interface. All coursework will be done exclusively on a Unix system from the command-line. This is not an introduction to using Unix!
The modern day implementation of UUIDs can be tied back to RFC 4122 which introduced 5 different approaches for generating these identifiers. We’ll take a look at each one and we’ll step through the implementation details of Version 1 & Version 4 in a moment.
So you've heard of this thing called cgroups, and you are interested in finding out more. Perhaps you caught mention of it while listening to a talk about containerization. Maybe you were looking into Linux performance tuning, or perhaps you just happened to be traversing your file system one day and discovered /sys/fs/cgroups. Either way, you want to learn more about this functionality that has been baked into the kernel for quite some time. So sit back, grab some popcorn, and prepare to (hopefully) learn something you may not have known before.
Using the Awk programming language, you can manipulate or extract data, generate reports, match patterns, perform calculations, and more, with great flexibility. Awk allows you to accomplish somewhat difficult tasks with a single line of code. To achieve the same results using traditional programming languages such as C or Python would require additional effort and many lines of code.
You still generate a public-private key pair for each developer. However, you don’t upload the public keys to your servers.
Instead, you sign the public keys with a so-called certificate authority (CA) key which you generate before. This signing simply generates a third certificate file which you give back to the developer and they put it inside of their .ssh/ folder next to the private and public key.
On the servers, you simply tell the server the public key of your CA and the server can detect if a user has a properly signed certificate and only allows access to the developers who have such a signed certificate.
Today in some versions of Linux ls puts single quotes around file names which contain white space likely in order to have those paths easier to copy and paste, but it does so only if !isatty().
I’m not a great fan of changing a program’s well-known behaviour, specially in a case such as with GNU ls which already uses an environment variable for coloring output; it would likely have been easy to augment that for the file name quoting.
It used to be simpler to teach. (But I don’t really teach Unix beginners any more.) :-)
A load testing tool capable of performing real-time analysis, inspired by vegeta and jplot.
Changes in behavior
The message that a binary file matches is now sent to standard error
and the message has been reworded from "Binary file FOO matches" to
"grep: FOO: binary file matches", to avoid confusion with ordinary
output or when file names contain spaces and the like, and to be
more consistent with other diagnostics. For example, commands
like 'grep PATTERN FILE | wc' no longer add 1 to the count of
matching text lines due to the presence of the message. Like other
stderr messages, the message is now omitted if the --no-messages
(-s) option is given.
Two other stderr messages now use the typical form too. They are
now "grep: FOO: warning: recursive directory loop" and "grep: FOO:
input file is also the output".
The --files-without-match (-L) option has reverted to its behavior
in grep 3.1 and earlier. That is, grep -L again succeeds when a
line is selected, not when a file is listed. The behavior in grep
3.2 through 3.4 was causing compatibility problems.
I finally got far enough in my build to show my progress on creating an AGC DSKY as per MIT's original drawings.
How to build a replica DSKY unit using an electroluminescent driver circuit and screen-printed conductive ink.
How can you be prepared for what's next when emerging trends constantly threaten to turn your strategic plan on its head? The world of business is experiencing a state of hyperchange influenced by global movements, disruptive technologies, political uprisings and new consumer expectations. If your world is turned upside down, will you know how to pivot and thrive, or will you be roadkill in the 'adapt or die' business race? Futuring is the art of anticipating and testing the trade-offs of different futures by making sense of key trends, signals and emerging patterns.
Innovative, geschmacklich exzellente Rezepte auf Gemüsebasis sind das Herzstück von Yotam Ottolenghis Küche. In diesem atemberaubenden neuen Kochbuch destillieren Yotam Ottolenghi und Co-Autorin Ixta Belfrage aus ihrem Wissen drei Faktoren, die den Geschmack formen, und präsentieren raffinierte Gemüsegerichte mit innovativen Zutatenkombinationen, die begeistern und inspirieren.
Ottolenghis FLAVOUR bietet einfache Alltagsrezepte, Gerichte mit Wow-Effekt bei geringem Aufwand sowie grandiose Menüs, die sich dennoch entspannt nachkochen lassen.
Yotam Ottolenghis neues Kochbuch bringt bei minimalem Aufwand maximalen Geschmack auf den Teller. Die 120 einfachen und schnellen Rezepte des Bestsellerautors werden zum Beispiel in weniger als 30 Minuten oder mit maximal zehn Zutaten absolut unkompliziert gemacht. Ob Lamm-Feta-Bällchen oder Harissa-Tofu, alle Kreationen sind natürlich wie gewohnt mit dem gewissen Etwas, orientalisch-raffiniert und aromastark. Das Ottolenghi-Kochbuch im innovativen, klaren Layout, opulent ausgestattet, mit übersichtlichen Icons und schöner Fotografie!
This is VT-100 and XTerm compatible video terminal implemented on the PIC32 microcontroller. It has a serial interface with TTL or RS-232 signal levels, input from a standard PS/2 keyboard, and output to a VGA monitor. There is also a USB interface that supports serial over USB and acts as a USB-to-serial converter.
With The Structure of Scientific Revolutions, Kuhn challenged long-standing linear notions of scientific progress, arguing that transformative ideas don’t arise from the day-to-day, gradual process of experimentation and data accumulation but that the revolutions in science, those breakthrough moments that disrupt accepted thinking and offer unanticipated ideas, occur outside of “normal science,” as he called it. Though Kuhn was writing when physics ruled the sciences, his ideas on how scientific revolutions bring order to the anomalies that amass over time in research experiments are still instructive in our biotech age.
This new edition of Kuhn’s essential work in the history of science includes an insightful introduction by Ian Hacking, which clarifies terms popularized by Kuhn, including paradigm and incommensurability, and applies Kuhn’s ideas to the science of today. Usefully keyed to the separate sections of the book, Hacking’s introduction provides important background information as well as a contemporary context. Newly designed, with an expanded index, this edition will be eagerly welcomed by the next generation of readers seeking to understand the history of our perspectives on science.
Over the years I’ve collected a rather messy ~/.ssh/config which resulted in some undesired behavior as a result of me misunderstanding how the config file prioritizes its options.
Today I investigated that.
In short, this is what I found:
Priority goes from top to bottom
Defaults MUST come last
Host specificity is NOT a factor of priority
Host sections can be specified multiple times
Multiple hostnames (and aliases) may be specified per section
Host sections apply to the name you use (not what it resolves to)
Did you know that #Unix groups have passwords? Apparently if you set one, you then have to use newgrp to log in to that group.
I have never seen anyone use unix group passwords.
There are some things to say about this, but the first thing you might wonder is why the newgrp command exists at all. The best answer is that it's mostly a Unix historical relic (or, to put it another way, a fossil).
JuliaMono is a monospaced typeface designed for programming in the Julia Programming Language and in other text editing environments that require a wide range of specialist and technical Unicode characters.