Learn Google Apps Script with this Beginner guide. See how to extend Google Sheets, Google Docs and other Workspace apps with Google Scripts.| www.benlcollins.com
Rails LTS: Continue to receive security updates - stay on your Rails version for as long as you like. Find out everything about our prices and plans.| Rails LTS
Introduction Originally written by Leslie Lamport, sourced from here. It’s hard to find out about the use of TLA⁺ in industry. Companies usually don’t talk about their engineering process, and any specifications they write are almost always proprietary. I happened to have contacts at Intel and Amazon who were willing to describe how they used TLA⁺, and Amazon even published a couple of papers about it. And of course, I know about much of the TLA⁺ use at Microsoft. I learned about it...| TLA+ Foundation
Report an issueopen_in_new| Bazel
Report an issueopen_in_new| Bazel
Report an issueopen_in_new| Bazel
Report an issueopen_in_new| Bazel
Report an issueopen_in_new| Bazel
“Strategies? Will you talk about Bazel’s strategy for world domination 🙀?” No… not exactly that. Dynamic execution has been quite a hot topic in my work over the last few months and I am getting ready to publish a series of posts on it soon. But before I do that, I need to first review Bazel’s execution strategies because they play a big role in understanding what dynamic execution is and how it’s implemented.| Julio Merino (jmmv.dev)
Why| bedrockdb.com
Tempo is designed to be a robust trace id lookup store whose only dependency is object storage (GCS/S3).| Grafana Labs
1. Introduction| Android Open Source Project
今天看 antirez 写了一篇有关客户端缓存设计的想法:《Client side caching in Redis 6》(文章比较难懂,如果先看 Ben 演讲,理解起来 antirez 这篇博客会轻松一些)。antirez 认为,redis 接下来的一个重点是配合客户端,因为客户端缓存显而易见的可以减轻 redis 的压力,速度也快很多。大公司或多或少都有实现这种应用端缓存的机制,antirez 想通过 server 端的一些设计来减少客户端缓...| www.kawabangga.com
I was working on a problem recently when I thought to myself “what if I could cause read operations on file X to actually come from file…| Medium
Rails LTS (Long-term support) ensures the security of your application with fast, reliable updates long after the official end-of-life of your Ruby on Rails version.| Rails LTS
Industrial Use of TLA+| lamport.azurewebsites.net
Node.js® is a free, open-source, cross-platform JavaScript runtime environment that lets developers create servers, web apps, command line tools and scripts.| nodejs.org
Node.js® is a JavaScript runtime built on Chrome's V8 JavaScript engine.| nodejs.org
There are many free (and even more paid) tools to help shift-left security. These includeSAST, Secret Scanners, and Dependency scanners| Spectral
Did you know that Go 1.2 will ship with a built in test coverage tool ? The tool is integrated into go test and works similarly to the profiling tool, producing an output file which is interpreted by a second command.| Dave Cheney
This paper provides quantitative data that, in many cases, open source software / free software is equal to or superior to their proprietary competition. The paper examines market share, reliability, performance, scalability, scaleability, security, and total cost of ownership; it also comments on non-quantitative issues and unnecessary fears.| dwheeler.com
A technical talk about the structure and details of the new, low-latency Go garbage collector.| go.dev
Learn how to save changes made within DevTools to your source files.| Chrome for Developers
About Microservices.io| microservices.io
About Microservices.io| microservices.io
Each bug has a free-form single line text entry box for adding tags and status information. This wiki page is dedicated to collect a comprehensive list of whiteboard tags used in the Mozilla project.| wiki.mozilla.org
Explore open healthcare API and SDK built by developers, for developers. Leverage health data, an electronic health record (EHR), practice management, and medical billing platform for your use.| www.drchrono.com
Node.js® is a JavaScript runtime built on Chrome's V8 JavaScript engine.| nodejs.org
This article covers the technical requirements and details for implementing EPT on Intel based hypervisors.| Reverse Engineering
Linux provides different namespaces to isolate processes from each other. For example, a typical Kubernetes pod runs within a network namespace to isolate the network identity and a PID namespace to isolate the processes. One Linux namespace that was left behind is the user namespace. This namespace allows us to isolate the user and group identifiers (UIDs and GIDs) we use inside the container from the ones on the host.| Kubernetes
Using kubeadm, you can create a minimum viable Kubernetes cluster that conforms to best practices. In fact, you can use kubeadm to set up a cluster that will pass the Kubernetes Conformance tests. kubeadm also supports other cluster lifecycle functions, such as bootstrap tokens and cluster upgrades. The kubeadm tool is good if you need: A simple way for you to try out Kubernetes, possibly for the first time. A way for existing users to automate setting up a cluster and test their application.| Kubernetes
Testing for accessibility lets you experience your app from the user's| Android Developers
FreeBSD Google Summer of Code Ideas| wiki.freebsd.org
The official WebDriver JavaScript bindings from the Selenium project. Latest version: 4.33.0, last published: 19 days ago. Start using selenium-webdriver in your project by running `npm i selenium-webdriver`. There are 1135 other projects in the npm registry using selenium-webdriver.| npm
Securing Rails ApplicationsThis guide describes common security problems in web applications and how to avoid them with Rails.After reading this guide, you will know: How to use the built-in authentication generator. All countermeasures that are highlighted. The concept of sessions in Rails, what to put in there and popular attack methods. How just visiting a site can be a security problem (with CSRF). What you have to pay attention to when working with files or providing an administration in...| Ruby on Rails Guides
This page summarizes the INSERT ... ON CONFLICT UPDATE patch. This feature is popularly known as "UPSERT".| wiki.postgresql.org
NEW (nobody) in Firefox Build System - General. Last updated 2022-10-10.| bugzilla.mozilla.org
GSoC 2020 on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.| owasp.org
TRAMP (Transparent Remote Access, Multiple Protocols) is a package for editing remote files, similar to AngeFtp or efs. Whereas the others use FTP to connect to the remote host and to transfer the files, TRAMP uses a remote shell connection (rlogin, telnet, ssh). It can transfer the files using rcp or a similar program, or it can encode the file contents (using uuencode or base64) and transfer them right through the shell connection.| www.emacswiki.org
Benchmarks, Competitions, Datasets, Leaderboards, Machine Learning, ML4Sys, MLSys| SIGARCH
This document details the deprecation policy for various facets of the system. Kubernetes is a large system with many components and many contributors. As with any such software, the feature set naturally evolves over time, and sometimes a feature may need to be removed. This could include an API, a flag, or even an entire feature. To avoid breaking existing users, Kubernetes follows a deprecation policy for aspects of the system that are slated to be removed.| Kubernetes
This blog introduces a new alpha feature in Kubernetes 1.29. It provides a configurable approach to define how Service implementations, exemplified in this blog by kube-proxy, handle traffic from pods to the Service, within the cluster. Background In older Kubernetes releases, the kube-proxy would intercept traffic that was destined for the IP address associated with a Service of type: LoadBalancer. This happened whatever mode you used for kube-proxy. The interception implemented the expected...| Kubernetes
Documentation for The Julia Language.| docs.julialang.org
Go support for Protocol Buffers| pkg.go.dev
One feature that has been requested for a very long time landed in Elasticsearch and is available in the 1.1.0 release: the ability to count unique values for a particular field. There are lots of int...| Elastic Blog
RESOLVED (kathleen.a.wilson) in CA Program - CA Certificate Root Program. Last updated 2022-11-14.| bugzilla.mozilla.org
The Lyra Visualization Design Environment (VDE) beta| idl.cs.washington.edu
V8 v7.4 supports JavaScript execution without allocating executable memory at runtime.| v8.dev
This manual describes common security problems in web applications and how to avoid them with Rails.After reading this guide, you will know: All countermeasures that are highlighted. The concept of sessions in Rails, what to put in there and popular attack methods. How just visiting a site can be a security problem (with CSRF). What you have to pay attention to when working with files or providing an administration interface. How to manage users: Logging in and out and attack methods on all l...| Ruby on Rails Guides
GloVe: Global Vectors for Word Representation| nlp.stanford.edu
Embarking on a branch prediction odyssey| xania.org
(You can read all my OpenVMS articles by clicking the picture above)| raymii.org
History haiku kigo season words saijiki Daruma WKD amulets talismans Edo happiness Japanese culture| darumapilgrim.blogspot.com
Edo town and Edo Jidai History haiku kigo season words saijiki Daruma WKD amulets talismans| omamorifromjapan.blogspot.com
Neste tutorial, você aprenderá primeiro o básico do Markdown - uma sintaxe de marcação fácil de ler e escrever para texto simples - bem como Pandoc, uma ferramenta de linha de comando que conver...| programminghistorian.org
The Kubernetes community has been signing their container image-based artifacts since release v1.24. While the graduation of the corresponding enhancement from alpha to beta in v1.26 introduced signatures for the binary artifacts, other projects followed the approach by providing image signatures for their releases, too. This means that they either create the signatures within their own CI/CD pipelines, for example by using GitHub actions, or rely on the Kubernetes image promotion process to ...| Kubernetes
The third article covers use-after-free exploitation. Starting from the PoC, it will explain what is needed to exploit UAF in ring-0, how to do a reallocation and gain an arbitrary call primitive. The core concept section focuses on the memory management subsystem (SLAB allocator).| blog.lexfo.fr
A note| leanpub.com
JSON-RPC 2.0 Specification| www.jsonrpc.org
IT’S TIME TO BUILD TOGETHER. Why now is the time for communal genius, and how to create it.| Packy McCormick
PageSpeed Insights (PSI) reports on the user experience of a page on both mobile and desktop| Google for Developers
LWN.net needs you!| lwn.net
May 12, 2020| lwn.net
Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows the creation of stateful copies of a running container without the container knowing that it is being checkpointed. The copy of the container can be analyzed and restored in a sandbox environment multiple times without the original container being aware of it. Forensic container checkpointing was introduced as an alpha feature in Kubernetes v1.25. How does it work? With the help of CRIU it is possib...| Kubernetes
I’m trying to read all the good writing about software design. This is very easy because not very much has been written: it turns out that i...| www.pathsensitive.com
There are lots of edge cases I hadn't considered, and it's very inconsistent between browsers. Here's what I found…| jakearchibald.com
Using ZAP during the development process is now easier than ever. We are proud to present the Jenkins plugin, it extends the functionality of the ZAP security tool into a CI Environment. The process explained A Jenkins CI Build step initializes ZAP Traffic flows (Regression Pack) through ZAP (Web Proxy) ZAP modifies requests to include Vulnerability Tests Target Application/Server sends Response back through ZAP ZAP sends reporting data back to Jenkins Jenkins publishes and archives the repor...| ZAP
How ZAP baseline and GitHib actions can help to automate the security testing| ZAP