Daily Shaarli
January 3, 2021
MIT How to Speak, IAP 2018
Instructor: Patrick Winston
View the complete course: https://ocw.mit.edu/how_to_speak
Patrick Winston's How to Speak talk has been an MIT tradition for over 40 years. Offered every January, the talk is intended to improve your speaking ability in critical situations by teaching you a few heuristic rules.
00:16 - Introduction
03:11 - Rules of Engagement
04:15 - How to Start
05:38 - Four Sample Heuristics
10:17 - The Tools: Time and Place
13:24 - The Tools: Boards, Props, and Slides
36:30 - Informing: Promise, Inspiration, How To Think
41:30 - Persuading: Oral Exams, Job Talks, Getting Famous
53:06 - How to Stop: Final Slide, Final Words
56:35 - Final Words: Joke, Thank You, Examples
Explore Joe Grand’s life journey as a hardware hacker. Known as Kingpin, his curiosity has been manipulating electronic devices since the 1980s. Learn more about his hacker lifestyle and get a glimpse inside Joe’s mind as he explains how hacking, technology and engineering fuels his passion.
GitHub has just beta-released GitHub CLI, an open-source tool that allows developers to work with issues and pull requests from the command line. Written in Go, GitHub CLI can be installed on Linux, macOS, and Windows.
Using GitHub CLI, developers will be able to list open issues and filter them based on assignee, label, and state; to create pull requests; to check out pull requests locally; to view the status of your work, and more.
I also use a tool called Storm, which helps you add SSH connections to your SSH config, so you don’t have to remember them all. Y
For bureaucratic reasons, a colleague of mine had to print, sign, scan and send by email a high number of pages. To save trees, ink, time, and to stick it to the bureaucrats, I wrote this script.
It's just been one security disaster after another for Intel the last few years. Meltdown, Spectre variant after variant and this week the "Microarchitectural Data Sampling" aka Zombieload attack have all required performance-degrading fixes and workarounds. There is no way around turning hyperthreading off to be safe from MDS/Zombieload and this is a rather high performance-price to pay. So what if you don't want to?
Disabling SMT/HyperThreading to get full protection against MDS/Zombieload on top of the mitigation code for "meltdown", several "spectre" variants and other security-issues discovered on Intel CPUs is a high price to pay for security on Intel CPUs. The total performance-penalty in many workloads is adding up. Unfortunately there is no safe and secure way around the performance-penalties - so you may want to..
A wonderful, whimsical journey through the pioneering space-race graphics of the former Soviet Union
This otherworldly collection of Soviet space-race graphics takes readers on a cosmic adventure through Cold War-era Russia. Created against a backdrop of geopolitical uncertainty, the extraordinary images featured, taken from the period's hugely successful popular-science magazines, were a vital tool for the promotion of state ideology. Presenting more than 250 illustrations - depicting daring discoveries, scientific innovations, futuristic visions, and extraterrestrial encounters - Soviet Space Graphics unlocks the door to the creative inner workings of the USSR.
hey are all around us. Secret conspiracies are everywhere. In Illuminati, you increase your wealth and power to take over the world until only YOU reign supreme.
Now, this classic game of conspiracy and world conquest has been updated to include current events and up-to-date references! Illuminati is for two to six players and contains 110 cards with new card back designs. It features new art created by Lar deSouza, known for his 2008 Shuster Award-winning online comic Least I Could Do.
As a winner of the Origins Award for Best Science Fiction Boardgame, Illuminati is one of the all-time greats. Now that it has been modernized for the 21st century, you'll wonder whether it's really only a game as you scheme your way to world domination!
You stuffed command shell with aliases, tools and colors but you lose it all when using ssh. The mission of xxh is to bring your favorite shell wherever you go through ssh without root access and system installations.
If you like the idea of xxh click star on the repo and tweet now.
Blazing fast terminal client for git written in Rust
Features
Fast and intuitive keyboard only control
Context based help (no need to memorize tons of hot-keys)
Inspect, commit, and amend changes (incl. hooks: commit-msg/post-commit)
Stage, unstage, revert and reset files and hunks
Stashing (save, apply, drop, and inspect)
Push to remote
Branch List (create, rename, delete)
Browse commit log, diff committed changes
Scalable terminal UI layout
Async input polling
Async git API for fluid controlWe had the chance to see quite a bit of clusters in our years of experience with kubernetes (both managed and unmanaged - on GCP, AWS and Azure), and we see some mistakes being repeated. No shame in that, we’ve done most of these too!
I’ll try to show the ones we see very often and talk a bit about how to fix them.
The SSH agent is a central part of OpenSSH. In this post, I’ll explain what the agent is, how to use it, and how it works to keep your keys safe. I’ll also describe agent forwarding and how it works. I’ll help you reduce your risk when using agent forwarding, and I’ll share an alternative to agent forwarding that you can use when accessing your internal hosts through bastions.
In this paper, I explore the rise and fall of Gopher as the dominant protocol for file search and retrieval over the Internet. After its creation in 1991 at the University of Minnesota, use of Gopher exploded. The popular press lauded it as an important step beyond File Transfer Protocol (FTP), in terms of both usability and ease of implementation. The growth of Gopher was soon overshadowed, however, by the World Wide Web. A major milestone is this direction was the release of the Mosaic graphical browser by the University of Illinois National Center for Supercomputing Applications [NCSA] in 1993.
But most striking is her prediction that pandemic profiteering with seriously destabilize our society: "If America enters the next wave of coronavirus infections “with the wealthy having gotten somehow wealthier off this pandemic by hedging, by shorting…"
"And we come out of our rabbit holes and realize, ‘Oh, God, it’s not just that everyone I love is unemployed and can’t make mortgage payments or rent payments, but now all of those jerks that were flying around in private helicopters are now flying on private jets."
"…And they own an island that they go to and they don’t care whether or not our streets are safe,’ then I think we could have massive political disruption.”
Easy to use and install.
Multiple cursors.
Common keybindings (Ctrl-s, Ctrl-c, Ctrl-v, Ctrl-z, …).
Sane defaults.
Splits and tabs.
Extremely good mouse support.
Cross-platform (it should work on all the platforms Go runs on).
Plugin system (plugins are written in Lua).
Built-in diff gutter.
Simple autocompletion.
Persistent undo.
Automatic linting and error notifications.
Syntax highlighting for over 130 languages.
Color scheme support.
True color support (set the MICRO_TRUECOLOR environment variable to 1 to enable it).
Copy and paste with the system clipboard.
Small and simple.
Easily configurable.
Macros.
Common editor features such as undo/redo, line numbers, Unicode support, soft wrapping, …
The Unix philosophy lays emphasis on building software that is simple and extensible. Each piece of software must do one thing and do it well. And that software should be able to work with other programs through a common interface – a text stream. This is one of the core philosophies of Unix which makes it so powerful and intuitive to use.
In this post though, I would like to show some examples of this philosophy in action – of how one can use different unix tools together to accomplish something powerful.
Awk crunches massive data; a High Performance Computing (HPC) script calls hundreds of Awk concurrently. Fast and scalable in-memory solution on a fat machine.
We often find ourselved required to route traffic from external sources towards internal services deployed to a Kubernetes cluster. There are several ways of doing this, but the most common is to use the Service resource, or, for HTTP(S) workloads, the Kubernetes Ingress API. The latter is finally going to be marked GA in K8s 1.19, so let’s take this opportunity to review what it can offer us, what alternatives there are, and what the future of ingress in general could be in upcoming Kubernetes versions.
How to expose applications in Kubernetes
Usually, we use the Service resource to expose an application internally or externally: define an entry point for the application which automatically routes distributed traffic to available pods. Since pods tend to come and go – the set of pods running in one moment in time might be different from the set of pods running that application at some later point – the Service resource groups them together with a label selector.
Service resources are broken down by type for more versatile usage. The three most commonly used types are ClusterIP, NodePort and LoadBalancer. Each provides a different way of exposing the service and is useful in different situations.
This is not a fork. This is a repository of scripts to automatically build Microsoft's vscode repository into freely-licensed binaries with a community-driven default configuration.
Whatfiles is a Linux utility that logs what files another program reads/writes/creates/deletes on your system. It traces any new processes and threads that are created by the targeted process as well.
Rationale:
I've long been frustrated at the lack of a simple utility to see which files a process touches from main() to exit. Whether you don't trust a software vendor or are concerned about malware, it's important to be able to know what a program or installer does to your system. lsof only observes a moment in time and strace is large and somewhat complicated.
In The Art of Gathering, Priya Parker argues that the gatherings in our lives are lackluster and unproductive—which they don't have to be. We rely too much on routine and the conventions of gatherings when we should focus on distinctiveness and the people involved. At a time when coming together is more important than ever, Parker sets forth a human-centered approach to gathering that will help everyone create meaningful, memorable experiences, large and small, for work and for play.
Drawing on her expertise as a facilitator of high-powered gatherings around the world, Parker takes us inside events of all kinds to show what works, what doesn't, and why. She investigates a wide array of gatherings—conferences, meetings, a courtroom, a flash-mob party, an Arab-Israeli summer camp—and explains how simple, specific changes can invigorate any group experience.
The result is a book that's both journey and guide, full of exciting ideas with real-world applications. The Art of Gathering will forever alter the way you look at your next meeting, industry conference, dinner party, and backyard barbecue—and how you host and attend them.
If sherried single malt is very much your thing, then GlenDronach is a name you should get to know very well. The distillery resides in the Highlands, busily working away on some incredible expressions, with sherried malt sitting at the core of many of them. This particular dram, The GlenDronach 12 Year Old, is allowed to age in a combination of Oloroso and Pedro Ximénez casks from Spain, resulting in generous helpings of dried fruit and Christmas spice running through it. Bottled without chill-filtration or additional colouring, you can expect great stuff from this approachable single malt.
The goto shell utility allows users to navigate to aliased directories and also supports autocompletion.
How it works
Before you can use goto, you need to register your directory aliases. For example:
goto -r dev /home/iridakos/development
then change to that directory, e.g.:
goto dev
goto.gif
goto demo
Autocompletion in goto
goto comes with a nice autocompletion script—whenever you press the Tab key after the goto command, Bash or Zsh will prompt you with suggestions of the aliases that are available:
Accenture released its Technology Vision 2020 report with a call for corporations to build trust as they develop new services for a "post-digital" population that has moved beyond the wow-factor with new technologies and understands the dystopian possibilities in an unplanned future.
Featured
It's not a total backlash against tech but a love/hate relationship that Accenture dubs a "tech-clash."
A nice feature I’ve become used to in the last year is a so-called “smart directory changer” that keeps track of the directories you change into, and then lets you jump to popular ones quickly, using fragments of the path to find the right location.
There is quite some prior art in this, such as autojump, fasd or z, but I could not resist building my own implementation of it, optimized for zsh.
An IT-etymology/linuxguistics page for people wondering "how come the package yasysmand-cling has such a strange name?"
Giving cryptic names to software is a well-established UNIX tradition, and the explanations are often missing from the documentation, either because the developers imagine it's obvious (usually wrongly) or because they think nobody cares (and here they're usually right, or it would turn up as FAQ material).
textadventures.co.uk is a community of interactive fiction game makers and players.
All games here are either playable in your web browser, or as an app for your smartphone or tablet. Almost all are free, and you can even make your own, using our free software - Quest or Squiffy.
John Chu is a “sherpa”—a paid guide to online role-playing games like the popular Call to Wizardry. For a fee, he and his crew will provide you with a top-flight character equipped with the best weapons and armor, and take you dragon-slaying in the Realms of Asgarth, hunting rogue starships in the Alpha Sector, or battling hordes of undead in the zombie apocalypse.
Chu’s new client, the pseudonymous Mr. Jones, claims to be a “wealthy, famous person” with powerful enemies, and he’s offering a ridiculous amount of money for a comprehensive tour of the world of virtual-reality gaming. For Chu, this is a dream assignment, but as the tour gets underway, he begins to suspect that Mr. Jones is really North Korean dictator Kim Jong-un, whose interest in VR gaming has more to do with power than entertainment. As if that weren’t enough to deal with, Chu also has to worry about “Ms. Pang,” who may or may not be an agent of the People’s Republic of China, and his angry ex-girlfriend, Darla Jean Covington, who isn’t the type to let an international intrigue get in the way of her own plans for revenge.
What begins as a whirlwind online adventure soon spills over into the real world. Now Chu must use every trick and resource at his disposal to stay one step ahead—because in real life, there is no reset button.
What follows doesn’t pretend to be some kind of “definitive guide” or “last word”, on the contrary, it’s aimed at people who have little or no experience with SDR but want to try putting together a decent station without paying an arm and a leg.
The idea of writing this came to me after reading a number of messages and discussions on various online groups/forums, in a lot of cases, someone bought an SDR (usually the ones coming with a telescopic whip antenna), and after connecting it was expecting it “just to work” or, better said, pretending that the SDR connected to that whip (usually placed on a table right near the computer) could receive ANY POSSIBLE signal, including transmissions coming from the “dark side of the moon.” 🙂 Those folks got scared by the fact that the SDR “didn’t work” and decided to give up; now, this short “guide” should allow anyone to setup what’s needed to have a working SDR
My self-imposed limitations for this project/experiment were the following:
The whole setup shouldn’t cost more than 150 Euros so that, if after trying the SDR one doesn’t like it, (s)he won’t have paid $$$, otherwise, if (s)he decides to keep it, the resulting station will allow for further expansion/improvement
The available space was considered to be that of an apartment, that is, no large field to put up huge wire antennas or to raise towers, the limit was the one of a balcony (in my home) that is 8 meters (max antenna length) by 3 meters (available height) by 2 meters (balcony width)
The whole setup should be simple and straightforward, no need to solder components or to build special types of antennas
Given the current Covid-19 sheltering, most components should be available online, while for others one may arrange with whatever is locally available (e.g. duct tape)Map lets you process each line from stdin with a command of your choice. For example:
Note that the command must be wrapped in single quotes to prevent the variable from being expanded by the shell.
There are many ways to accomplish what you can do with map, including find, xargs, awk, and shell for-loops. The approach taken by map is extremely pragmatic and allows me to express concisely what I want. Given the fact that it's designed as a filter, it can operate on any kind of list, not only lists of files.
The problem that prompted me to think about map was the following: given a list of files, I wanted to execute two commands on each. Here's how you can do it with different tools:
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
Give your video calls a makeover, with this selection of over 100 empty sets from the BBC Archive.
Who hasn't wanted to host a pub quiz from the Queen Vic, conduct a job interview from the confines of Fletch's cell, or catch up with friends and family from the bridge of the Liberator in Blake's 7?
wget -r -l inf -H -nH --cut-dirs=2 --include-directories '/archive/sets/','/archive/sets/' -A jpg,jpeg https://www.bbc.co.uk/archive/empty_sets_collection/zfvy382
This article will teach you how to create and use these five types of aliases:
Simple Aliases
Suffix Aliases
Functions for Aliases With Parameters
Global Aliases
Operating system specific aliasesLast month, I wrote an article sharing seven Rust-powered command-line utilities.
Those are modern and fast tools you can use every day with your terminal.
Since publishing that original article, I’ve been searching for more Rust-powered command-line utilities, and I discovered more gems that I’m excited to share with you today.
These tools will help you be productive with your terminal work.
In short: modern Linux systems (since Linux 2.6.30, released in 2009) already use relatime, which should give you a really fast performance boost. That means you don't need to tweak your /etc/fstab file and can rely on the relatime kernel default.
But if you're looking to tweak your system to get maximum performance, disabling atime is still a valid option in 2020.
This performance tweak might not be very noticeable on very fast modern drives (like NVME or a fast SSD), but there's still a little boost there.
As so much technology is forgotten once it is superseded, this is a celebration of machines, industrial design and techno-utopianism of an era in the not-so-distant past. Conceived as a visual sourcebook of the most popular, most powerful and most idiosyncratic computers to grace our workspaces, this timely publication offers a reflection on how far we’ve come and a nostalgic look at a time when digital worlds could be contained in a box and turned off, rather than ever-present in our lives.
Home Computers opens with a scene-setting retrospective by computer and gaming writer Alex Wiltshire. The book’s heart is a series of specially commissioned photographs that capture details of switches and early user-interface design, letterforms and logos, and the quirks that set one computer off from another. Images are complemented by a potted history of each device, the inventors or personalities behind it, and its innovations and influences.
5G ist ja auch nur ein Feigenblatt, wenn man immer noch kein Bock auf FTTH hat.
This post shares some ideas about working with cronjobs, to help make common tasks more easy for both junior and senior sysadmins.
This is choose, a human-friendly and fast alternative to cut and (sometimes) awk
Features
terse field selection syntax similar to Python's list slices
negative indexing from end of line
optional start/end index
zero-indexed
reverse ranges
slightly faster than cut for sufficiently long inputs, much faster than awk
regular expression field separators using Rust's regex syntax
Rationale
The AWK programming language is designed for text processing and is extremely capable in this endeavor. However, the awk command is not ideal for rapid shell use, with its requisite quoting of a line wrapped in curly braces, even for the simplest of programs:
awk '{print $1}'
Likewise, cut is far from ideal for rapid shell use, because of its confusing syntax. Field separators and ranges are just plain difficult to get right on the first try.
It is for these reasons that I present to you choose. It is not meant to be a drop-in or complete replacement for either of the aforementioned tools, but rather a simple and intuitive tool to reach for when the basics of awk or cut will do, but the overhead of getting them to behave should not be necessary.
e Expert*innen des Panels wiesen damals darauf hin, dass Big Data im Gesundheitswesen eine immer größere Rolle spielt und beklagten, dass diese Entwicklung von Politik und Öffentlichkeit zu wenig beachtet wird, obwohl sie ein hohes Maß an Regulierung (und öffentlicher Debatte) erfordern würde, damit die Vorteile des massenhaften Sammelns von Daten in der Bevölkerung genutzt und die Gefahren von Datenmissbrauch und Überwachung vermieden werden können.
ForgeRock provides digital identity management through its primary product, the ForgeRock Identity Platform.[17][18] The ForgeRock Identity Platform includes Access Management (based on the OpenAM open source project), Identity Management (based on the OpenIDM open source project), Directory Services (based on the OpenDJ open source project), and Identity Gateway (based on the OpenIG open source project).[19] ForgeRock Access Management provides access management, ForgeRock Directory Services is an LDAP directory service, ForgeRock Identity Management is used for identity management, and ForgeRock Identity Gateway provides an identity gateway for web traffic and application programming interfaces (APIs).[9][20] ForgeRock also offers a Profile and Privacy Management Dashboard for compliance with the EU General Data Protection Regulation (GDPR) and provides support for the User-Managed Access (UMA) 2.0 standard.[21]
Highland Park 12 Year Old remains one of the gold- standard malts for other distillery bottlings to aspire to. With a delicious sweetness (heather-honey is their preferred description) and a warming, silky mouthfeel, this is a whisky that never lets you down. "The greatest all-rounder in the world of malt whisky". Michael Jackson, Michael Jackson's Malt Whisky Companion
This bottling has been replaced by Highland Park Viking Honour
The entry level bottling from Scotland's most northerly distillery, Highland Park, aged for 12 years with plenty of citrus and green notes.
Tasting Note by The Chaps at Master of Malt
Nose: Fresh, clean and very aromatic. Floral notes abound the senses with a light grassiness. Notes of creamy Manuka honey and a touch of juicy citrus with cream and a well-balanced sweetness.
Palate: Rather full with a pleasant depth. Lurking somewhere in the substratum a grilled orange lies. Notes of granary toast and green tea with jasmine. A touch of sweetness.
Finish: Quite long with peppery spice and wood shavings.
“Code is law” is a form of regulation whereby technology is used to enforce existing rules. With the advent of Blockchain and Machine Learning, we are witnessing a new trend, whereby technology is progressively taking the upper-hand over these rules.
This release adds support for FIDO/U2F hardware authenticators to
OpenSSH. U2F/FIDO are open standards for inexpensive two-factor
authentication hardware that are widely used for website
authentication. In OpenSSH FIDO devices are supported by new public
key types "ecdsa-sk" and "ed25519-sk", along with corresponding
certificate types.
ssh-keygen(1) may be used to generate a FIDO token-backed key, after
which they may be used much like any other key type supported by
OpenSSH, so long as the hardware token is attached when the keys are
used. FIDO tokens also generally require the user explicitly authorise
operations by touching or tapping them.
After RTFM’ing, I realized, under the hood, systemd just runs mount command to mount the specified partition with the specified mount options listed in the mount unit file. Basically, you need to specify the following options in your unit file:
What= a partition name, path or UUID to mount
Where= an absolute path of a directory i.e. path to a mount point. If the mount point is non-existent, it will be created
Type= file system type. In most cases mount command auto-detects the file system
Options= Mount options to use when mounting
In the end, you can convert your typical fstab entry such as this:
UUID=86fef3b2-bdc9-47fa-bbb1-4e528a89d222 /mnt/backups ext4 defaults 0 0
to:
[Mount]
What=/dev/disk/by-uuid/86fef3b2-bdc9-47fa-bbb1-4e528a89d222
Where=/mnt/backups
Type=ext4
Options=defaults
Paul Mason joined us in London to talk about his book PostCapitalism: A Guide to our Future. Recorded in December 2015, London.
Over the past two centuries or so, capitalism has undergone continual change - economic cycles that lurch from boom to bust - and has always emerged transformed and strengthened. Surveying this turbulent history, Paul Mason wonders whether today we are on the brink of a change so big, so profound, that this time capitalism itself, the immensely complex system by which entire societies function, has reached its limits and is changing into something wholly new.
A gentle admonishment to use shell scripts where appropriate accept that shell scripts will appear in your codebases and to lean heavily on automated tools, modern features, safety rails, and best practices whenever possible.
We decided to use Terraform to configure our services. It lets you describe states of the infrastructure you want in plain text and takes care of calling the providers' API to provision some cloud resources. Resources and data are defined through .tf files and the generated state is stored by Terraform in a .tfstate file (local or in the cloud as we will see later on). It also permits to have an overview of what changes we are going to make using the plan subcommand.
A s font that fing censors bad language automatically
It’s able to detect the words f, s, p, t, w, c and dozens more, but with a special exemption for “Scunthorpe”; that town has suffered enough.
The cat (short for concatenate) command is one of the most frequently used flexible commands on Linux and Unix-like operating systems. Say hello to bat Linux command, which is a cat command written in Rust programming language. The bat command comes with syntax highlighting, git integration, and works as is a drop-in cat command replacement. Let us see how to install bat on Linux and Unix system for fun and profit.
I've built a physical <blink> tag!
This repo contains the original source-code for Microsoft's GW-BASIC interpreter, as of 1983.
Is being released for historical reference/interest purposes, and reflects the state of the GW-BASIC interpreter source code as it was in 1983
Will not be modified - please do not submit PR's or request changes
Contains no build scripts, makefiles, or tools required to generate executable binaries, nor does it contain any pre-built binaries / executables
Before Prince of Persia was a best-selling video game franchise and a Jerry Bruckheimer movie, it was an Apple II computer game created and programmed by one person, Jordan Mechner. Mechner's candid and revealing journals from the time capture his journey from his parents' basement to the forefront of the fast-growing 1980s video game industry... and the creative, technical and personal struggles that brought the prince into being and ultimately into the homes of millions of people worldwide.
Now, Stripe Press celebrates Prince of Persia's 30th anniversary and enduring legacy with a hardcover collector's edition, annotated and lavishly illustrated with archival visuals illustrating stages of the game's creation.
New York Times bestselling author James Swallow delivers a thrilling, action-packed series with MI6 agent Marc Dane, a computer desk jockey who received an unexpected promotion to active field operative. Now, he experiences trials by fire in espionage as he fights for Queen and Country.
With DB you can very easily save, restore, and archive snapshots of your database from the command line. It supports connecting to different database servers (for example a local development server and a staging or production server) and allows you to load a database dump from one environment into another environment.
For now, this is for MySQL only, but it could be extended to be used with other database systems as well.Both Chomsky, King, and every other voice for justice and human rights would agree that the people need to act instead of relying on movement leaders. Whatever actions one can take—whether it’s engaging in informed debate with family, friends, or coworkers, writing letters, making donations to activists and organizations, documenting injustice, or taking to the streets in protest or acts of civil disobedience—makes a difference. These are the small individual actions that, when practiced diligently and coordinated together in the thousands, make every powerful social movement possible.
This looks like an interesting vim plugin: it gives you tips, as you type,
on how to improve/shorten the actions you're doing. It's like the Clippy
helper on Windows, but actually useful!
Would your command read well in a poem?
Ah, bitter chill it was!
The owl, for all his awk, was a-cold;
The gunicorn limp’d trembling through the frozen grass,
And silent was the yacc in woolly fold
—Paraphrased from John Keats, The Eve of St. Agnes
Hey it’s just a rule of thumb, but notice how the command AssetCacheTetheratorUtil (added to macOS in 2017) would never fly here.
On 11 June 2020, the United Nations Secretary-General announced the issuance of his report, Roadmap for Digital Cooperation, during the Thematic Debate organized by the President of the 74th Session of the United Nations General Assembly, on the impact of rapid technological change on the achievement of the Sustainable Development Goals and targets. The Secretary-General’s Roadmap responded to the recommendations of his High-Level Panel on Digital Cooperation on key issues such as digital connectivity, digital inclusion, human rights, artificial intelligence, and trust and security.
This tool is a rewrite of ngxtop to make it easier to install and hopefully run faster. For those unfamiliar with the ngxtop, it is a tool that helps you parse NGINX access logs and print various statistics from them regardless of format. It is currently not as feature complete as the original version but it should have enough functionality to be usable.
Last January, the BBC released the first episode of a true-crime style podcast called The Case of Charles Dexter Ward. Created by Julian Simpson, this story took a Serial-esque approach to a locked room mystery involving an American man who disappeared from an asylum in England. But as the story progresses, it quickly becomes apparent that there's something darker going on.
That "something darker" would be the fact that it's a loose adaptation of The Curious Case of Charles Dexter Ward by HP Lovecraft. Simpson's podcast version takes the initial Lovecraftian premise — a person of privilege uncovers some hidden knowledge that inevitably connects back to ancient evil Elder Gods — and spins an updated modern tale that spans the Atlantic Ocean. Simpson cleverly weaves in English folklore and the occultism of Aleister Crowley as the journalist narrators travel back-and-forth between England and Rhode Island.
China and India are the countries with the highest densities of CCTV surveillance cameras in urban areas. Chennai, India has 657 cameras per square kilometer, making it the number one city in the world in terms of surveillance.
London is the only non-Asian city to crack the list with 399 CCTV cameras per square kilometer.