Bookmarks (3751)

  • screenshot

    How does Linux's display work?

    How does Linux's display work? Linux has an amazing yet frustrated at the same time about...

  • I replaced Google Analytics with a web server running on my phone

    I replaced Google Analytics with a web server running on my phone Your phone is a...

  • Race Conditions/Concurrency Defects in Databases: A Catalogue

    Race Conditions/Concurrency Defects in Databases: A Catalogue Categorize concurent transaction issue: Dirty Read, Dirty Write, Read...

  • What's a key exchange?

    What's a key exchange? Key exchange is fundamental in any secure connection, at some point it...

  • screenshot

    Building Cloudflare TV from scratch

    Building Cloudflare TV from scratch Cloudflate TV is like a TV show where you tune in...

  • Inside Code Signing

    Inside Code Signing This is probably a post for mobile dev. However, most of time the...

  • screenshot

    Improving performance with SIMD intrinsics in three use cases

    Improving performance with SIMD intrinsics in three use cases SIMD (Single Instruction Multiple Data) is an...

  • screenshot

    A completed game and a tutorial to build it step by step

    A completed game and a tutorial to build it step by step A replayable arcade shooter...

  • screenshot

    Building Domain Driven Microservices

    Building Domain Driven Microservices touched upon various concepts, strategies, and design heuristics to consider when we...

  • Bitcoin from scratch - Part 1

    Bitcoin from scratch - Part 1 Understanding the fundamental building blocks(😉) of Bitcoin can be daunting...

  • screenshot

    Barebones WebGL in 75 lines of code

    Barebones WebGL in 75 lines of code

  • screenshot

    MobileNetv2-YOLOv3-SPP Darknet

    MobileNetv2-YOLOv3-SPP Darknet

  • Scaling Linux Services: Before accepting connections

    Scaling Linux Services: Before accepting connections When writing services that accept TCP connections, we tend to...

  • screenshot

    How does Packet filtering and IPTables work?

    How does Packet filtering and IPTables work? Explain how IPTables, Chains and Rules work together.

  • Containers from first principles

    Containers from first principles Dig into container. Docker image are just tar file with some meta...

  • Beginner’s Guide To Abstraction

    Beginner’s Guide To Abstraction In The Pragmatic Programmer, Andrew Hunt and David Thomas introduced the DRY...

  • Types of Indexes in PostgreSQL

    Types of Indexes in PostgreSQL B-Tree index is the default index. But you know we have...

  • The Double-Bang (!!) Operator And A Misunderstanding Of How JavaScript Handles Truthy / Falsy Values

    The Double-Bang (!!) Operator And A Misunderstanding Of How JavaScript Handles Truthy / Falsy Values I...

  • screenshot

    SCALING THE HOTTEST APP IN TECH ON AWS AND KUBERNETES

    SCALING THE HOTTEST APP IN TECH ON AWS AND KUBERNETES Hey email app is getting a...

  • screenshot

    SSH Emergency Access with certificates

    SSH Emergency Access with certificates A guide to setup SSH authentication with certificates instead of pub...

  • Reshaping JSON with jq

    Reshaping JSON with jq teaches how to use the command-line utility jq to filter and parse...

  • screenshot

    Real-World Cryptography

    Real-World Cryptography The author wants it to be the best book in this field. It’s free...

  • Performance/Avoid SQLite In Your Next Firefox Feature

    Performance/Avoid SQLite In Your Next Firefox Feature This is an 2014 document of FireFox project to...

  • The Definitive Guide to Linux System Calls

    The Definitive Guide to Linux System Calls If you ever use chown, chmod, or even doing...

  • screenshot

    Reading files the hard way

    Reading files the hard way But what is a file, really? And what does reading a...