How to Implement Decentralized Storage Using Docker Extensions
In part one of this two-part series, we discussed the intersection of Web3 and Docker at a conceptual level. Now, it’s time to get our hands dirty and review practical examples involving decentralized storage. ⌘ Read more
3 strategies for consolidating your toolkit and boosting productivity
Explore how GitHub Enterprise can help you transform your software engineering organization and practices. ⌘ Read more
Best practices on rolling out code scanning at enterprise scale
Learn best practices on how to roll out centrally managed, developer-centric application security with a third party CI/CD system like Jenkins or ADO. ⌘ Read more
there are actually six hindrances: the original five and thinking about how to practically dovetail the shortest brainfuck quine
Transform your software engineering practices with GitHub Enterprise
Go beyond knowing GitHub as the home of open source and explore how GitHub Enterprise can help you transform your software engineering organization and practices. ⌘ Read more
JMP: Privacy and Threat Modelling
One often hears people ask if a product or service is “good for privacy” or if some practice they intend to incorporate is “good enough” for their privacy needs. The problem with most such questions is that they often lack the necessary context, called a threat model, in order to even begin to understand how to answer them. Understanding your own threat model (and making any implicit model you carry more explicit to yourself) is one of the most important steps you can take to im … ⌘ Read more
JMP: Privacy and Threat Modelling
One often hears people ask if a product or service is “good for privacy” or if some practice they intend to incorporate is “good enough” for their privacy needs. The problem with most such questions is that they often lack the necessary context, called a threat model, in order to even begin to understand how to answer them. Understanding your own threat model (and making any implicit model you carry more explicit to yourself) is one of the most important steps you can take to im … ⌘ Read more
Paul Schaub: Using Pushdown Automata to verify Packet Sequences
As a software developer, most of my work day is spent working practically by coding and hacking away. Recently though I stumbled across an interesting problem which required another, more theoretical approach;
An OpenPGP message contains of a sequence of packets. There are signatures, encrypted data packets and their accompanying encrypted session keys, compressed data and literal data, the latter being the packet … ⌘ Read more
Join us for OctogatosConf 2022
Live on September 15, 2022, with talks by industry experts in Spanish, Portuguese, and English, on topics including software development, security, technical project management, community, open source, professional development and best practices. ⌘ Read more
In Case You Missed It: Docker Community All-Hands
Get highlights the 6th Docker Community All-Hands, including the latest releases, best practices, and links to all of the talks on YouTube. ⌘ Read more
Dino: Stateless File Sharing: Base implementation
The last few weeks were quite busy for me, but there was also a lot of progress.
I’m happy to say that the base of stateless file sharing is implemented and working.
Let’s explore some of the more interesting topics.
File hashes have some practical applications, such as file validation and duplication detection.
As such, they are part of the [metadata element](https://xmpp.org/extensio … ⌘ Read more
i think in practice people were most convinced by timelines, if not arguments, then observations abt progress.
6 strategic ways to level up your CI/CD pipeline
From incorporating accessibility testing to implementing blue-green deployment models, here are six practical and strategic ways to improve your CI/CD pipeline. ⌘ Read more
Google’s ‘fast track to surveillance’ sparks backlash from European consumer groups over ‘deceptive’ practices
The Regional consumer organisation BEUC accused Google of using ‘deceptive design, unclear language, misleading choices and missing information’ for extensive data collection. ⌘ Read more
G7 summit statement will take aim at ‘challenge China poses’, US national security adviser says
Beijing’s non-market economic practices, approach to debt and human rights actions set to be addressed in communique issued from meeting in Germany. ⌘ Read more
Prosodical Thoughts: Modernizing XMPP authentication and authorization
We’re excited to announce that we have received funding, from the EU’s
NGI Assure via the NLnet Foundation, to work on
some important enhancements to Prosody and XMPP. Our work will be focusing on
XMPP authentication and authorization, and bringing it up to date with current
and emerging best practices.
What kind of changes are we talking about? Well, there are a few aspects we
are planning to work on. Let’s start with “authent … ⌘ Read more
US: China ‘engages in unfair trade practices’ but tariffs serve ‘no strategic purpose’
Treasury Secretary Janet Yellen said China ‘engages in range of unfair trade practices’ but ‘the tariffs we inherited, some serve no strategic purpose’. ⌘ Read more
Australia’s China bias and colonial blinkers mean it fails to see big picture for Pacific islands’ development
Canberra had chosen symbolic gestures and feeble investments over more practical initiatives now being offered by Beijing to Pacific island nations. Australia must shed its colonial mindset and stop claiming to always have the moral high ground over China. ⌘ Read more
The way we wed: How Indian brides are reinventing ceremonies to push for gender equality
Modern brides are doing away with practices such as looking sad as they leave their families, and changing their surnames after marriage. ⌘ Read more
https://gigamonkeys.com/book/ Practical Common Lisp
Can polar bears survive climate change? Scientists see hopeful signs with discovery of new group
The species is threatened by the loss of sea ice, but an isolated population found in Greenland suggests they could change their hunting practices to adapt. ⌘ Read more
GitHub Achieves ISO/IEC 27001:2013 Certification!
GitHub’s Information Security Management System (ISMS) has been certified against ISO 27001:2013, an internationally recognized standard for security program best practices. ⌘ Read more
Best practices to keep your projects secure on GitHub
These days software is subject to an ever-changing threat landscape. Check out the many ways you can keep your projects secure on GitHub today. ⌘ Read more
i think posting about personal meditation practice on the EA forum is bad, because personal meditation practice is as relevant to EA as advice on seducing people.
Why everyone should be concerned about Ontario’s critical race theory bill
How to Build a Bike Generator with Control Panel
We built a pedal-powered generator and controller, which is practical to use as an energy source and exercise machine in a household — and which you can integrate into a solar PV system. We provide detailed plans to build your own, using basic skills and common hand tools. ⌘ Read more
whether cryptocurrencies are more or less likely to be stable during a multipolar ai takeoff depends on whether our current cryptography is “endgame” or not, i.e. whether it’s in practice basically uncrackable by any advanced actor
Encoding and escaping untrusted data to prevent injection attacks
Practical tips on how to apply OWASP Top 10 Proactive Control C4. ⌘ Read more
The Impacts of an Insecure Software Supply Chain
Today, software regularly integrates open-source code from third-party sources into applications. While this practice empowers developers to create more capable software in a shorter time frame, it brings with it the risk of introducing inadequately vetted code. How aware are we of the security of our open-source code? Most of us use pip or npm […]
The post [The Impacts of an Insecure Software Supply Chain](https://www.docker.com/blog/the-im … ⌘ Read more
Pluriverse instead of Metaverse
This artifact is a follow-up to A Declaration of the Interdependence of Cyberspace, where we introduce the term “pluriverse” and apply it to cyberspace. After the creation of the Declaration, its core stewards were joined by others who were moved by the vision of that artifact, and together, formed Verses. We are a multidisciplinary arts and research collective co-imagining, practicing, and building a commonly-held digital future. ⌘ Read more
DockerCon: What Makes a Successful CFP Submission
The DockerCon 2022 Call for Papers is now open! DockerCon is one of the largest developer events in the world, with over 80,000 developers registering for each of the last two events. At the core of DockerCon is the chance for members of the community to share their tips, tricks, best practices and real-world experiences […]
The post [DockerCon: What Makes a Successful CFP Submission](https://www.docker.com/blog/dockercon-what-makes-a-succe … ⌘ Read more
This is like my 5rh day at it. I suck at words and spelling. So this is good practice.
Guest Blog: Deciding Between Docker Desktop and a DIY Solution
Guest author Ben Hall is the lead technical developer for C# .NET at gov.uk (a United Kingdom public sector information website) and a .NET Foundation foundation member. He worked for nine years as a school teacher, covering programming and computer science. Ben enjoys making complex topics accessible and practical for busy developers. Deciding Between Docker […]
The post [Guest Blog: Deciding Between Docke … ⌘ Read more
Day 16 of Advent of Code is so confusing that I will not finish today’s puzzle. I wonder if yesterday was my last day with Advent of Code, or will the puzzles become more understandable and easier again in the next few days? Maybe I’m just more the practical type. I like programming, but such complex algorithms are not really my thing. And in the end, Advent of Code is supposed to be fun… ⌘ Read more
@movq@www.uninformativ.de I always understood it as good practice to early catch hardware errors.
GitHub’s guide to Hacktoberfest 2021
Giving back to open source projects is a great way to practice skills you don’t get to use in your day job. Check out ways to get involved! ⌘ Read more
Revised enterprise DPA with new standard contractual clauses
As part of GitHub’s strong commitment to developer privacy, we are excited to announce updates to our privacy agreements in line with new legal requirements and our own robust data protection practices. ⌘ Read more
reading: starting forth. possible practice, puzzle, game, eventually dance? | gemini://compudanzas.net/forth.gmi
Secure Software Supply Chain Best Practices ⌘ Read more…
https://dabeaz-course.github.io/practical-python/Notes/Contents documentation python
Bookmarking this to read over a few more times. https://dave.cheney.net/practical-go/presentations/qcon-china.html #practical #GO
Viral Visualizations : How Coronavirus Skeptics Use Orthodox Data Practices to Promote Unorthodox Science Online ⌘ Read more…
Thanks to a pointer from Richard Miller, got screen rotation working on my Pi 4s. Makes this absurdly wide display more practical.
Trying to move things with your mind might be good meditation practice.
Nbdev: A literate programming environment that democratizes software engineering best practices ⌘ https://github.blog/2020-11-20-nbdev-a-literate-programming-environment-that-democratizes-software-engineering-best-practices/
DevOps best practices Q&A: Automated deployments at GitHub ⌘ https://github.blog/2020-10-22-devops-best-practices-qa-automated-deployments-at-github/
Best practices for using Docker Hub for CI/CD ⌘ https://www.docker.com/blog/best-practices-for-using-docker-hub-for-ci-cd/
Remote Education: A series of best practices for online campus communities ⌘ https://github.blog/2020-09-10-remote-education-a-series-of-best-practices-for-online-campus-communities/