Have a nice day.
Have a nice day.
We are pleased to announce the launch of our brand new website!
We hope you find the new website fresh and modern; we worked hard to make sure it contains valuable information to assist you.
We invite you to view the new website and let us know your thoughts.
For any questions, suggestions, feedback or comments, please contact us.
For programming and computer science, data structures are the main subject. It is utilized in nearly all fields of computer science.
In this post, I will describe the data structures that are crucial for data science and programming, as well as what data structures mean in general.
In computer science, a data structure is a data organization, management, and storage format that enables efficient access and modification according to Wikipedia.
If this term seems complicated, let me clarify. These are structures that can store, organize and help us modify multiple data.
Lists, dictionaries, and arrays are simple data structures present in all programming languages. Although their syntax varies, their logic stays the same, so you can …
I used to often work with DNS in one of my previous jobs. So I have always had a long running interesting in DNS. Most recently I have been looking into Rust. I wanted to see how easy it might be to use rust to access DNS records, one; because rust is said to be fast, and also because it’s a safe programming language.
This will be a brief write up at my attempt to use trust-dns-resolver to do MX record lookups and subsequently host address lookups.
Warning: This code is not intended to be used in production. You should review and adjust to your own needs.
First we will need to create our development environment.
Apache Kafka is written with Scala. Thus, the most natural way is to use Scala (or Java) to call Kafka APIs, for example, Consumer APIs and Producer APIs. For Python developers, there are open source packages available that function similar as official Java clients.
This article shows you how to use kafka-python package to consume events in Kafka topics and also to generate events.
The code snippets in the following examples requires Kafka brokers. If you don’t have a Kafka system to work with, try to configure one on Windows 10 following this guide:
Install and Run Kafka 2.6.0
Python ⅔ is required to run the sample code. In my system, Python version is 3.8.4 (x64 bit).
This demonstrates how to push a tag (or branch, etc) to a remote Git repository from within a Pipeline job. The authentication step may vary between projects. This example illustrates injected credentials and also username / password authentication.
Based on Stackoverflow answer at
http://stackoverflow.com/questions/33570075/tag-a-repo-from-a-jenkins-workflow-script Injected credentials gist at
The Git user name and email must be configured on the agent running the build to be able to commit changes / create a tag. If no user is configured in the agent environment, the following error would appear when committing / pushing changes:
*** Please tell me who you are. shell> git config --global user.email "[email protected]" shell> git config --global user.name "Your Name"
The user …
Bridging data types between the database and a programming language is such a foundational feature of most database-backed applications that many developers overlook it, until it doesn’t work. For many of my Rust-based applications I have been enjoying sqlx which strikes the right balance between “too close to the database”, working with raw cursors and buckets of bytes, and “too close to the programming language”, magic object relational mappings. It reminds me a lot of what I wanted Ruby Object Mapper to be back when it was called “data mapper.” sqlx can do many things, but it’s not a silver bullet and it errs on the side of “less magic” in many cases, which leaves the developer to deal with …
Go 1.16 Release Candidate 1 was announced recently and the most exciting feature for me in this release is the new “embed” package which allows you to embed a file contents as part of the Go application binary.
This ability so far was most easily available via using various third party packages and they worked great. You could also use
go generate to roll out your own solution, if needed. However, now having this facility in the form of a standard library package is great news.
Let’s see how we can use it. I will keep this post updated as the 1.16 release evolves.
If you have Go installed already, run:
$ go get golang.org/dl/go1.16rc1 …
Completing coding challenges is a great way to learn. They also help with many skills needed to become a better developer and get better results at job interviews.
While completing coding challenges online, you will:
With the pandemic, online interviews with small coding challenges are the norm. Being acquainted with this type of problem and with online code editors will remove part of the interview’s complexity (and stress).
Here is a list of websites with coding challenges that would be great for candidates to practice on. In no specific order:
This site has …
Choosing between the various types of proxy services and other anonymous browsing methods can be confusing. We have answered some frequently asked questions about free proxies, paid proxies and VPNs to help clarify what they are and when you should use each one.
A proxy service is an intermediary between your browser and the web, allowing you to access websites via a different IP address, thus acting as if you are in any country and on any device.
With a proxy service, the requests for websites you visit and the actions you take on them are routed through a different IP in order to stimulate a different geolocation, device or browser, giving you transparency and …
In early 2020, when international travel was still a responsible thing one could do, I gave a talk on “what makes a license successful” at FOSDEM in Brussels. I then wrote a blog post about it, got some writer’s block, and never finished it. But recent interest in the topic, and specifically on what lawyers can (or can’t) contribute to the success of a license, made me decide to dust it off and hit publish. You can think of this post as the questions I would ask, and the advice I would give, to anyone seeking to promote new, innovative licenses, of any sort.
Tidelift believes that the best way to increase the use (and profitability) of open …
Create, Manage & Convert SSL Certificates with OpenSSL
One of the most popular commands in SSL to
manage the SSL Certificates is OpenSSL.
There will be many situations where you have to deal with OpenSSL in various ways, and here I have listed them for you as a handy cheat sheet.
In this article, I will talk about frequently used OpenSSL commands to help you in the real world.
Some of the abbreviations related to certificates.
Note: SSL/TLS operation course would …
Like many of you, I am a software developer. For the past few years, I’ve been working with Python, both at work, and writing small hobby projects at home.
One of the most common things I do with Python is write Linux services/daemons. A linux daemon is a program, in our case written in Python, that runs in a loop, usually by SystemD, and only exits when it receives a kill signal.
A few months ago, I decided to teach myself Rust, and after reading the Rust book (which I highly recommend), and watching lots of youtube videos, I tried to write a Rust Linux daemon.
Part of the process was figuring out how to handle kill signals in …
In this article we will discuss:
Malicious actors are constantly scanning the web looking for weak points of access and corporate vulnerabilities they can exploit. HBO, Xerox, Garmin, ExecuPharm and several hospital systems and local governments across the US and the world have fallen victim to ransomware attacks. According to the FBI, 2019 saw 467,361 reports of such attacks with cumulative losses reaching in excess of $3.5 billion.
Here are the most common ways in which fraudsters hold corporations at ‘digital gunpoint’:
In this instance, cybercriminals …