Best of Hacker News — July 2022
- 1
- 2
Hacker News·4y
pocketbase/pocketbase: Open Source realtime backend in 1 file
PocketBase is an open source Go framework/toolkit that enables you to build your own custom app specific business logic. It embeds a realtime subscriptions database with backed-in files and users management. It has a simple REST-ish API and comes with unit and integration tests.
- 3
Hacker News·4y
Learn Vim the Simple Way
.css-1ydpsmy {display:flex;-webkit-align-items:flex-start;-moz-box-align: Flex;-ms-flex- align: Flex-start. .css-da5oxk{overflow:visible;height:100%;}.css-8w41o5{--chakra-wrap-x-spacing:0.5rem;--chakra-wrap-y-spaces: 0.5 Rem;--wrap-X-Spacing:calc(var( --chakria-warp-x) / 2);--wrake-Y- Spacing:
- 4
Hacker News·4y
codecrafters-io/build-your-own-x: Master programming by recreating your favorite technologies from scratch.
This repository is a compilation of well-written, step-by-step guides for re-creating our favorite technologies from scratch. It's a great way to learn. Submissions welcome, just send a PR.Table of Contents: Build your own 3D Renderer, BitTorrent Client, Node.js bot, and more.
- 5
Hacker News·4y
tabler/tabler: Tabler is free and open-source HTML Dashboard UI Kit built on Bootstrap
Tabler is a premium and open source dashboard template with a responsive and high-quality UI. Preview Tabler is fully responsive and compatible with all modern browsers. The only requirement is basic HTML and CSS (and some Liquid) knowledge.
- 6
Hacker News·4y
Holograms, light-leaks and how to build CSS-only shaders
@media (max-width:512px. .spec-example{margin:50px 0;display:flex;justify-content:space-between;gap:2.5rem}.spec- example__fixed,. spec-example__static{flex:1;border:20px solid #fff;height:30rem;background-image:linear- gradient(to bottom,#000 20%,#3c5e6d 35%,#f4310e,#f58308 80%,#000)}.frame--leak .specular{z-index:0;mix-blend-mode:color-dodge; background-color
- 7
- 8
Hacker News·4y
Algorithms by Jeff Erickson
This web page contains a free electronic version of my self-published textbook Algorithms. It also includes other lecture notes I have written for various theoretical computer science classes. Anyone is welcome to download, print, use, copy, and/or distribute anything on this page, either electronically or on paper.
- 9
Hacker News·4y
Why do so many brands change their logos and look like everyone else?
The trend in logo design that started around 2017-2018. Many iconic fashion companies ditched their recognizable logos and switched to a bland and very similar version of a sans serif font. The purpose of a logo is to be instantly recognizable, different, memorable, and, if possible, to refer to the brand’s values.
- 10
- 11
Hacker News·4y
Logging in Python like a PRO 🐍🌴
Most people don't know what to log, so they decide to log anything thinking it might be better than nothing, and end up creating just noise. I'll try to give meaningful examples, and provide a flexible rule of thumb that should be used when logging for ANY application you're ever going to build.
- 12
Hacker News·4y
TikTok is “unacceptable security risk” and should be removed from app stores, says FCC
FCC commissioner Brendan Carr called on Apple and Google to remove TikTok from their app stores. Carr cited several incidents as evidence that TikTok has been dodgy about its data collection practices. Michael Beckerman, VP, Head of Public Policy, Americas at TikTok, refuted a large chunk of the FCC’s claims.
- 13
Hacker News·4y
How a fake job offer took down the world’s most popular crypto game
A senior engineer at Axie Infinity was duped into applying for a job at a company that, in reality, did not exist. The engineer downloaded spyware to infiltrate Ronin’s systems. From there, hackers were able to attack and take over four out of nine validators on the Ronin network.
- 14
Hacker News·4y
What Comes After Git
Git was born from the collaboration problems in the Linux kernel. Nearly a decade later, new problems arose when Kubernetes (the operating system of the cloud) brought open-source collaboration to a new level. Will a new version control system (or something that solves similar problems) spring up?
- 15
Hacker News·4y
jorgef/engineeringladders: A framework for Engineering Managers
The framework allows software engineering managers to have meaningful conversations with their direct reports around the expectations of each position and how to plan for the next level in their career ladder. The Manager's Path: Camille Fournier does an excellent job at describing the expectations and challenges of many engineering positions. Dick Grote explains in simple terms how to define job responsibilities.
- 16
Hacker News·4y
Emoji Kitchen Browser
This page lets you browse the delightful combinations of Emoji Kitchen, available in Gboard for Android. All credit goes to the Emoji kitchen team for the care they put into emoji, standards, and imaginary creatures. Source code: on GitHub. For more information on Gboard, visit the Gboard website.
- 17
Hacker News·4y
What they don't teach you about sockets
TCP does its best to get data to the other application, but in the event of a disconnect we effectively lose all of it. Developers need to decide how their application reacts to unexpected disconnects. This might not be as idiomatic on Linux, but it gives me a bit more control as an application developer.
- 18
Hacker News·4y
How Did REST Come To Mean The Opposite of REST?
REST is short for REpresentational State Transfer. Roy Fielding used the term to describe the network architecture of the world wide web. He was describing the web as it existed at that time, with HTML being exchanged over HTTP as people "surfed the web" Today, when someone uses the term REST, they are nearly always discussing a JSON-based API.
- 19
- 20
Hacker News·4y
LanguageTool
The European Union and the European Regional Development Fund (ERDF) support this project by providing funding. They support the development of error detection algorithms in multilingual texts, and thedevelopment of our browser add-ons and website. Supported by the Ministry of Social Affairs, Health, Integration, and Consumer Protection.
- 21
Hacker News·4y
tylertreat/comcast: Simulating shitty network connections so you can build better systems.
Comcast is a tool designed to simulate common network problems like latency, bandwidth restrictions, and dropped/reordered/corrupted packets. It works by wrapping up some system tools in a portable(ish) way. On BSD-derived systems such as OSX, we use tools like ipfw and pfctl to inject failure. On Linux, we using iptables and tc . Comcast is merely a thin wrapper around these controls.
- 22
Hacker News·4y
We Don't Do That Here
The phrase "we don't do that here" is a way to say no: "that doesn't work for me" It turns out talking about diversity, inclusion, and even basic civil behavior can be controversial in technical spaces. If no one has told you yet, as your career progresses you will eventually become We don’t do that.”
- 23
Hacker News·4y
mgunyho/tere: Terminal file explorer
Tere is a terminal file explorer. It allows you to navigate to a folder efficiently using a TUI, and then prints the path to that folder when you exit. It is not a file manager, it can only be used to browse folders, not to create, rename or delete them.
- 24
Hacker News·4y
Teams is KILLING my Mac Every Day
Teams is murdering my MacBook Pro 16" i9 with 16GB RAM every day. It causes serious lags and randomly decides when it wants to share the screen successfully. Other times, it just shows screen but no audio or vice versa. It's infuriating and I've lost my patience!
- 25
Hacker News·4y
Google Fires Blake Lemoine, Engineer Who Called Its AI Sentient
Blake Lemoine said he believes Google's LaMDA conversational technology is sentient. Lemoine shared the news of his firing in a taping of Big Technology Podcast on Friday. Google confirmed Lemoine’s dismissal and shared the following statement with Big Technology:“As we share in our AI Principles , we take the development of AI very seriously and remain committed to responsible innovation. So, it’t regrettable that despite lengthy engagement on this topic, Blake still chose to persistently violate clear employment and data security policies. We will continue our careful development of language models, and we wish Blake well”