This article assumes familiarity with Dijkstra's shortest path algorithm. For a refresher, see [1]. The code assumes open Core is in effect and is online here.| Shayne Fletcher
Ever since I discovered that it’s sometimes possible to extract the x/y values of the points/circles/diamonds appearing in a graph, within a pdf, I have been trying to automate the process.| The Shape of Code
Have you ever imagined a world without connections? Think about your social media full of random unknown people in your follow recommendations, maps not showing the shortest direction between two destinations, or file imports turning into a mess of unrelated modules after compiling. This would be hard even to imagine,| Hexmos Journal
This treemap shows the 10 largest economies in the world, including California which is the 4th largest, and has the smallest population.| Engaging Data
A dominator tree can be used to compute natural loops. For every node H in a post-order traversal of the dominator tree (or the original CFG), find all predecessors that are dominated by H. This identifies all back edges. Each back edge T->H identifies a natural loop with H as the header. Perform a flood fill starting from T in the reversed dominator tree (from exiting block to header) All visited nodes reachable from the root belong to the natural loop associated with the back edge. These no...| MaskRay
Yes, this is a Mandelbrot fractal with three heads. No cloning needed, just multiply z to the power of four and proceed as usual. Well all this and so much more contains the latest release of Juliagraph 0.7. Intro here. All I wrote about the Cellgraph and Harmonograph applies again, more features, better controls and ... you can cruise the fractal by mouse.| blogs.perl.org
I wrote a post in February 2025 looking at what the Wikibase ecosystem (might) look like, according to the data that had at that point been collected on wikibase.world. Now that data has had some t…| addshore
With the Harmonograph you can create beautiful and individual images within a few clicks. It's painting by pendulum. I already gave here an introduction. So let me just explain what is new:| blogs.perl.org
This dataviz visualizes the admissions rates for different majors in the University of California campuses %| Engaging Data
Cellgraph 0.7 is out. (I introduced it here.) And I will tell you about the great new features in the next paragraph and how it helps you to play with logical structures and deepen your understanding of them. But first please let me mention the why! | blogs.perl.org
In this guide, I’ll show you a fully automated way to generate eye-catching social media graphics and drive more traffic to your Ghost blog posts with absolutely no coding required.| LayeredCraft
Cris’ Image Analysis Blog: theory, methods, algorithms, applications| www.crisluengo.net
In this blog post, we explore some neat examples of graph computations using Raku. These examples are designed to be concise, straightforward, and compelling, showcasing the capabilities of Raku an…| Raku for Prediction
I thought it would be fun to re-work an old design of mine, the Mayflower Lace scarf, in a different yarn and hook size than originally used. I came across a tutorial I had forgotten about making when I pulled up the pattern... I immediately felt like deleting the post because it's so horrible, but I think I'll leave it up just in case you want to check out the old way I made| Crochet is the Way
Play with an interactive spirograph that animates your drawing and lets you vary the drawing parameters and then share your creations| Engaging Data
Search technology remains one of the major challenges in computer science, with few commercial products capable of searching effectively. Before the rise of Large Language Models (LLMs), powerful search capabilities weren't considered essential, as they didn't contribute directly to user experience. However, as the LLMs began to gain popularity, a powerful built-in retrieval system became required to apply LLMs to enterprise settings. This is also known as Retrieval-Augmented Generation (RAG)...| ragflow.io
The workflow of a naive RAG system can be summarized as follows: the RAG system does retrieval from a specified data source using the user query, reranks the retrieval results, appends prompts, and sends them to the LLM for final answer generation.| RAGFlow Blog
You can play new daily Digits puzzles Calculate the solution to any digits puzzle This tool lets you view all of the potential solutions to a Digits puzzle. Enter the goal number and the five starting numbers separated by a comma like “1,2,3,4,5” and hit the “Calculate Solutions” button to see all of the possibleRead More| Engaging Data
Daily graph showing a live look at current California electricity generation by type of power plant and fuel source.| Engaging Data
In this article I will be showing you how you can automatically have Microsoft Teams set its presence to Do Not Disturb, or any other presence, based on events in your Outlook Calendar. I also looked into leveraging Power Automate but it began to require premium connectors and at that cost, going the serverless automation| The Lazy Administrator
Monitoring Azure AD (Entra ID now) application secret expirations in an enterprise is a critical aspect of maintaining robust security and ensuring uninterrupted service. When application secrets expire without timely renewal, it can disrupt business operations by causing application failures. Proactive management of application secret expirations helps enterprises avoid last-minute issues, enabling a more secure| The Lazy Administrator
The Microsoft Graph Command Line Interface (CLI) is a powerful and versatile tool that enables developers and IT professionals to manage their Microsoft 365 services efficiently. Beta and v1.0.| The Lazy Administrator
Previously, if you wanted to find a user's last successful sign-in to your Microsoft 365 tenant using the Microsoft Graph REST API, you would have to iterate through Entra ID sign-in logs. With new recent additions to the Microsoft Graph API Beta Endpoint, you can now return the UTC value just by parsing the user| The Lazy Administrator
Azure AD Privileged Identity Management makes it possible to configure activation and expiration settings on a per-role basis. This is very powerful since the 90+ Azure AD roles provides varying levels of permissions in your tenant. The PIM-portal currently provides little to no bulk-management of roles and you basically need to go in and configure … Continue reading Automatic Azure AD PIM Role Micromanagement Based on Role Impact→| Daniel Chronlund Cloud Security Blog
Ransomware has been the major cyber threat the last couple of years, and it still is! But a new trend I see is the rise of wiper malware, which basically tries to destroy your data, instead of encrypting it. This could be used as part of extortion, but we’ve all seen the recent news of … Continue reading The Threat of Microsoft 365 Wiper Malware→| Daniel Chronlund Cloud Security Blog
I noticed a section on the Features in development page that talks about a change coming on April 1st, which is not very far away (and an interesting place to put “we’re going to break …| Out of Office Hours
TL;DR Use codegraph to visualize| 200ok - Accelerating Publishing
puppet is a popular configuration-management tool. Puppet’s basic model is declarative: You define a set of “resources” and the state they should be in. A “resource” can be basically anything that might be managed on a server: file on disk, a user account, a provisioned database instance, a running service, … Puppet compiles the input puppet configuration into a “catalog” with all the defined resources, and creates a dependency graph: e.g. before the MySQL service can be start...| Accidentally Quadratic
Background A developer at a customer recently asked me: “I have a custom API protected by Entra ID. Can you allow me to grant admin consent to my own APIs, without needing to contact an Entra ID ad…| Microsoft Security Solutions
The Task| blogs.perl.org
I released Juliagraph an interactive fractal painter for Julia and Mandelbrot types of fractal. | blogs.perl.org
The percentage of virus tests that show positive results ("positivity") is an indicator of the percentage of the total infections that is being identified| Steve McConnell
There's a New York Times article today that makes some comments about percentage of positive tests in each state. It's quite critical, and I think it| Steve McConnell