Digging into Data Availability with Ismail Khoffi from Celestia – ZK Podcast This week Anna and Tarun chat with Vasiliy Shapovalov from Lido and Felix Lutsch of Chorus One about liquid staking on the ETH2 Proof of Stake consensus chain. Vasiliy explains Ethereum’s unique PoS validator setup and how liquid staking behaves on this ...
Anomaly Detection in Machine Learning In this article, you will read about different types of outliers and machine learning techniques that help to find anomalies. Learn how you can apply ML anomaly detection techniques to fraud prevention, medical diagnosis, and more.
New in Visual Studio Code v1.63: Theme Previewing, Notebook Improvements, More -- Visual Studio Magazine The regular monthly update to Visual Studio Code (November 2021 edition, v1.63) lets developers preview themes before using them, improves notebook functionality and provides a new Java welcome experience, along with much more.
The HTTP of the Metaverse — Roderick's Debug Diary VR needs its own protocol. To make the Metaverse, or Spatial Web, we must create the native, open protocol that allows VR sites to work like websites.
Using clojure.spec.alpha with babashka If you want to use clojure.spec.alpha with babashka, upgrade to 0.7.0 or newer and use babashka/spec.alpha as a library.
on building with a squad post #5. I’ve spent the past half-year building with wonderful people I re/met on the internet. Our squad consists of a site, private Discord server, and a multisig wallet. With them we’ve developed a practice of building in the open and are in the midst ...
The three types of development Author: Chloé LourseyreEditor: Peter Fordham This week we’ll discuss a serious topic affecting the developer community. This touches several languages, but the C++ community is one …
Cubic Bézier: from math to motion - Maxime Heckel's Blog A deep dive into the math behind Bézier curves, from simple linear interpolations to Cubic Bézier and how they are used to describe motion. This article introduces the concepts underneath cubic-bezier and easing timing functions that are used in CSS and F...
Zero-day in ubiquitous Log4j tool poses a grave threat to the Internet Minecraft is the first, but certainly not the last, app known to be affected.
Secure how your servers connect to the Internet today The vulnerability disclosed yesterday in the Java-based logging package, log4j, allows attackers to execute code on a remote server. We’ve updated Cloudflare’s WAF to defend your infrastructure against this 0-day attack.
GitHub - cshum/imagor: Fast, Docker-ready image processing server written in Go and libvips, with Thumbor URL syntax Fast, Docker-ready image processing server written in Go and libvips, with Thumbor URL syntax - GitHub - cshum/imagor: Fast, Docker-ready image processing server written in Go and libvips, with Thu...
December 10, 2021 Software architecture and design is a skill. You can develop it over time with experience. Everyone on a team can help even if it's simply asking questions t...
UniFi Controller security concern (zero-day Log4j exploit) I see that the UniFi Controller software uses Java and the Log4j framework for logging (as of this writing, Log4j 2.13.3 is used by UniFi Controller ("UniFi Network Application") version 6.5.53).
Smaller & Faster Blazor WebAssembly apps with Runtime Relinking in .NET 6 The new support for runtime relinking has made Blazor WebAssembly apps smaller and faster to download. In this demo, Daniel Roth will show how runtime relink...
Inside the log4j2 vulnerability (CVE-2021-44228) In this post we explain the history of this vulnerability, how it was introduced, how Cloudflare is protecting our clients. We will update later with actual attempted exploitation we are seeing blocked by our firewall service.
Cloud Services - Amazon Web Services (AWS) Amazon Web Services offers reliable, scalable, and inexpensive cloud computing services. Free to join, pay only for what you use.
How many lines of code you need for a C# app? | One Dev Question With .NET 6, how many lines of code do you need to create a C# app? Kathleen Dollard says the answer is 1. Yes 1..NET Blog: https://msft.it/6010X984I.NET Con...
Digging into the .NET Dictionary implementation… I had dug into the implementation of the .NET dictionary because of this issue. More specifically, I wanted to know what kind of collision handling system is...
It's okay to be contrary, but you need to be consistently contrary: Going against the ambient character set In Windows, you declare your character set preference implicitly by defining or not defining the symbol UNICODE before including the windows.h header file. (Related: TEXT vs. _TEXT vs. _T, and UNICODE vs. _UNICODE.) This determines whether undecorated fun...
Cloudflare One helps optimize user connectivity to Microsoft 365 Cloudflare One partners with Microsoft to optimize user connectivity to Microsoft 365
Turning a MacBook into a Touchscreen with $1 of Hardware We turned a MacBook into a touchscreen using only $1 of hardware and a little bit of computer vision.
Code Maze Weekly #105 - Code Maze Issue #105 of the Code Maze weekly. Check out what’s new this week and enjoy the read. .NET and C# .NET 6 Has Arrived: Here Are A Few of My Favorite Things [daveabrock.com] What’s your favorite thing in .NET 6? Fastest way to enumerate a List<T> [www.mezi...
CVE-2021-44228 - Log4j RCE 0-day mitigation A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021 that results in remote code execution (RCE). This vulnerability is actively being exploited and anyone using Log4j should update to version ...
Bring your own functions to Azure Static Web Apps Azure Static Web Apps APIs are supported by two possible configurations: managed functions and bring your own functions. This post is about using your existing functions in Azure Static Web apps. Bring your own functions is only available in the Azure Sta...
Weekly Update 273 3D Printed Moon Lamp; New Profile Pics; Children’s Toy Surveillance Camera; Gravatar Scraped Data; 50% Off 1Password
Paramount Plus - Stream Live TV, Movies, Originals, Sports, News, and more Watch thousands of episodes of your favorite shows on any device. Paramount+ includes on-demand and live content from CBS, BET, Comedy Central, Nickelodeon, MTV, VH1, and more.
Your First Microservice in .NET 6 Microservices are here to stay. In this article, we’ll explore some valuable features available on the .NET platform and create our first microservice.
Announcing PowerShell Crescendo Release Candidate (RC) Announcing Crescendo 0.9.0 Release Candidate (RC) We are pleased to announce the Release Candidate (RC) of PowerShell Crescendo, a framework to rapidly develop PowerShell cmdlets for native commands, regardless of platform. The release candidate is now av...
The Miracle of IQueryAttributable This knocked me out. Let’s say you have a value in one view model, and when you navigate to another page you want that value in the new page’s view model. Enter IQueryAttributable. (tou…
r/dotnet - .NET History Timeline. --- It's not finished yet, so if you find errors or have suggestions please comment here or via the link below that contains the interactive graphic. (https://time.graphics/pt/line/593132) 166 votes and 46 comments so far on Reddit
RCE 0-day exploit found in log4j, a popular Java logging package | LunaSec Given how ubiquitous this library is, the impact of this vulnerability is quite severe. Learn how to patch it, why it's bad, and more in this post.
The New Stack's Top Kubernetes Stories of 2021 - The New Stack A look at the top stories that have influenced Kubernetes readers in 2021.
Rocket League & coding rig for a work colleague Check out DamianEdwards's completed build on PCPartPicker! Ryzen 9 5900X 3.7 GHz 12-Core, GeForce RTX 2060 SUPER 8 GB Founders Edition, Eclipse P360A ATX Mid Tower, ...
Introducing stack graphs | The GitHub Blog Precise code navigation is powered by stack graphs, a new open source framework that lets you define the name binding rules for a programming language.
A New Chapter for HashiCorp As we officially enter the public markets, we plan to continue to do what we think we do best: solving problems for our end users.
Chrome Users Beware: Manifest V3 is Deceitful and Threatening Manifest V3, Google Chrome’s soon-to-be definitive basket of changes to the world of web browser extensions, has been framed by its authors as “a step in the direction of privacy, security, and performance.” But we think these changes are a raw deal for u...