The USE Method provides a strategy for performing a complete check of system health, identifying common bottlenecks and errors. For each system resource, metrics for utilization, saturation and errors are identified and checked. Any issues discovered are then investigated using further strategies.
This is an example USE-based metric list for Linux operating systems (eg, Ubuntu, CentOS, Fedora). This is primarily intended for system administrators of the physical systems, who are using command line tools. Some of these metrics can be found in remote monitoring tools.
Journalists watch out—you may be unintentionally revealing sources.
Unlike previous text fingerprinting techniques, zero-width characters are not removed when formatting is removed from text
TL;DR:
- List Resizing : the backing array is grown by approximately 12% (in Java ArrayList grows by 50% when expanded2 and in Ruby, Array grows by 100%). The Python implementation optimizes for memory usage over speed. Another reason to preallocate Python lists when possible.
- Inserting at the beginning of a list takes linear time. Sometimes, better use Deques which trade constant time insert and remove from both ends in exchange for constant time indexing.
By Russel Cohen
designed for microservices, cloud native and container-based (Docker, K8s, Mesos) architectures. Underlying technology is a distributed tracing system.
- Provide high performance Java agent, no need to CHANGE any application source code.
Only increase extra 10% cpu cost in 5000+ tps application, even when collect all traces. - Manual instrumentation
- As an OpenTracing supported tracer
- Use @Trace annotation for any methods you want to trace.
- Integrate traceId into logs for log4j, log4j2 and logback.
- HTTP/2
- TLS 1.3
- DOH: DNS over HTTP
- QUIC: a candidate replacement for the TCP protocol
since Google has already deployed QUIC in the Chrome browser and on its sites, it already accounts for more than 7% of Internet traffic.
Also mention this creepy & fascinating attack : http://codebutler.com/firesheep
Canary tokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves.)
Embeddable in :
- fake URLs ending in .html, .js, .php...
- emails to detect if you are spied on
- files in the cloud
- as file watchs do detect spies on filesystems
- desktop.ini for Windows directories or zip files
- MSSQL & MYSQL
- Word / PDF documents
- a JS resource is used elsewhere
Speed, reproducibility, easy rollbacks, and predictability is what we strive for when deploying our diverse Python applications. And that’s what we achieved by leveraging virtual environments and Linux system packages.
eslint rules from airnbnb to validate ReactJS code
Bosun is an open-source, MIT licensed, monitoring and alerting system by Stack Exchange. It has an expressive domain specific language for evaluating alerts and creating detailed notifications. It also lets you test your alerts against history for a faster development experience.
Our mission is to remove the pain of handling servers, application stacks, software dependencies and databases.
Focus on your app development and deploy it in 2 minutes. No server to manage, hosting becomes instant and easy!
Looks very similar to Heroku
Checklists pour:
- Qualité Web
- Rendu sur mobile
- SEO
- Performances
- Eco-conception
This project contains pytudes—Python programs for perfecting programming skills.
Some are in Jupyter (IPython) notebooks, some in *.py files.
Simple charts based on jQuery & Raphaël
GitHub-inspired simple and modern charts for the web with zero dependencies.
Urchin is a portable shell program that runs a directory of Unix-style programs and produces pretty output. It is normally used for testing shell programs, where each test case corresponds to a single file in the directory that Urchin runs.
StoryMapJS is a free tool to help you tell stories on the web that highlight the locations of a series of events. It is a new tool, yet stable in our development environment, and it has a friendly authoring tool.
I often hear people who are happy because PyPy makes their code 2 times faster or so. Here is a short personal story which shows PyPy can go well beyond that.
Contraintes cadeau bonus:
- imposer qu'un numéro de sécurité sociale commence soit par 1, soit par 2
- limiter le sexe administratif à deux options
- attribuer automatiquement "Mlle" à une femme non mariée
- imposer que "M." est lié à un numéro de sécu en 1 ou un sexe M
- obliger une femme mariée à donner un nom de jeune fille
- ne pas demander le nom d'usage d'un homme marié
- imposer qu'une femme ne peut être mariée qu'à un homme
- imposer qu'un enfant ait un papa et une maman
- considérer que les responsables légaux d'un enfant sont ses parents
- limiter à deux le nombre de parents d'un enfant
few realize how absolutely devastating and omnipresent this vulnerability can be