Very good hints for me as a newby vim plugin writer.
Quelle: Writing Vim Plugins / Steve Losh
programming languages and surroundings
Very good hints for me as a newby vim plugin writer.
Quelle: Writing Vim Plugins / Steve Losh
What beautiful page! Done with pixiJS.
Quelle: Jetlag
Rx is not that hard, you could have invented it yourself.You’ve probably seen this tutorial I wrote some time ago. Too long? Alright. Rx is not that hard, …
Quelle: 2 minute introduction to Rx — Medium
Very good to understand an to the point introduction.
Comparisons and information for useful JavaScript-specific plugins
Quelle: davidosomething.com | Setting up Vim for JavaScript development
Answering a user question on IRC doesn’t scale, only one person and a few lurkers will benefit from it. Answering a user question on a mailing list scales a little better, since the answer is archived and can be searched for. What really scales is instead to improve the reference manual. Yes, you know, documentation.
Schön wenn man es es einfach auf den Punkt bringen kann.
http://cinema.arte.tv/de/artikel/der-kleine-topf-von-anatole-von-eric-montchaud
Code Reviews are a powerful not only to improve the quality of our code, but also to make our team mates’ life easier. Find out how to become a constructive Code Reviewer.
csstriggers,com came to my attention by supercharged
Gemeinsam finanzieren wir einen kleinen Traktor. Damit passen wir genau durch die Pflanzreihen, können junge Bäume freimähen und andere Forstgeräte daran anschließen. So ermöglichen wir eine optimale Entwicklung der gepflanzten Bäume.
Quelle: Ein kleiner Traktor für Aufforstungsprojekte – I Plant A Tree (betterplace.org)
Linus Torvalds created Linux, the operating system that dominates the online world. But a rift exists between Torvalds and security experts.
Quelle: The kernel of the argument over Linux’s vulnerabilities | The Washington Post
The recently revealed exploit that allows anyone to bypass the iPhone’s Activation Lock system is a rather simple process that requires adding just a singl
Quelle: How the iPhone Activation Lock hack works | Cult of Mac
that’s said before dinner came to be.” 3. What are your most vivid memories of school? This question might unlock tales from a one-room schoolhouse, or even a school in another country. Understanding how schools worked in the past can help younger questioners understand more about their present — and future. “I heard an interview last night with a dad who’s a cop talking to his daughter about how he struggled in school,” says Isay. Through their conversation, she got to see that bullying and the pressure to succeed are nothing new. “This question allows a young person to get out of their head and see the experience through someone else’s eyes,” says Isay. “That’s important when you’re sticking a toe in the waters of being an adult.” 4. How did you meet your wife/husband/partner? This question can give you a deeper understanding of where you came from. “People have great love stories,” says Isay. “But unless you’ve explicitly asked, there are often things people haven’t been comfortable talking about.” Isay remembers interviewing his great-uncle Sandy. “He told the story of his first date with my Aunt Birdie. He’s this quiet person, and he just came alive sharing this,” he says. “He had asked her to meet him on a stoop on 14th Street in New York City, but as he saw her walking down the street, he panicked. He tried to hi
“Host Managed Drive” is a vendor euphemism for “we don’t know how to make this faster, but we have this (non-standard) extension for ‘applications’ to… – Dave Chinner – Google+
Quelle: “Host Managed Drive” is a vendor euphemism for “we don’t know how to make this…
For the most common strength of Diffie-Hellman (1024 bits), it would cost a few hundred million dollars to build a machine, based on special purpose hardware, that would be able to crack one Diffie-Hellman prime every year.Would this be worth it for an intelligence agency? Since a handful of primes are so widely reused, the payoff, in terms of connections they could decrypt, would be enormous. Breaking a single, common 1024-bit prime would allow NSA to passively decrypt connections to two-thirds of VPNs and a quarter of all SSH servers globally. Breaking a second 1024-bit prime would allow passive eavesdropping on connections to nearly 20% of the top million HTTPS websites. In other words, a one-time investment in massive computation would make it possible to eavesdrop on trillions of encrypted connections.
Anton Kannemeyer – The Alphabet of Democracy – we make money not art.
saw this today in a museum and liked the way of bringing it to the point
A good infographic about what the NSU has done so far.
Why we should stop using Grunt & Gulp.
like this post about using the most suitable tool for solving your problem instead of following the trend. You don’t have to stop but maybe it is sometimes not necessary to start with complicated bloated tools at first.
You must be logged in to post a comment.