Best of Hacker NewsJuly 2022

  1. 1
    Article
    Avatar of hnHacker News·4y

    Defensive CSS

  2. 2
    Article
    Avatar of hnHacker News·4y

    pocketbase/pocketbase: Open Source realtime backend in 1 file

    PocketBase is an open source Go framework/toolkit that enables you to build your own custom app specific business logic. It embeds a realtime subscriptions database with backed-in files and users management. It has a simple REST-ish API and comes with unit and integration tests.

  3. 3
    Article
    Avatar of hnHacker News·4y

    Learn Vim the Simple Way

    .css-1ydpsmy {display:flex;-webkit-align-items:flex-start;-moz-box-align: Flex;-ms-flex- align: Flex-start. .css-da5oxk{overflow:visible;height:100%;}.css-8w41o5{--chakra-wrap-x-spacing:0.5rem;--chakra-wrap-y-spaces: 0.5 Rem;--wrap-X-Spacing:calc(var( --chakria-warp-x) / 2);--wrake-Y- Spacing:

  4. 4
    Article
    Avatar of hnHacker News·4y

    codecrafters-io/build-your-own-x: Master programming by recreating your favorite technologies from scratch.

    This repository is a compilation of well-written, step-by-step guides for re-creating our favorite technologies from scratch. It's a great way to learn. Submissions welcome, just send a PR.Table of Contents: Build your own 3D Renderer, BitTorrent Client, Node.js bot, and more.

  5. 5
    Article
    Avatar of hnHacker News·4y

    tabler/tabler: Tabler is free and open-source HTML Dashboard UI Kit built on Bootstrap

    Tabler is a premium and open source dashboard template with a responsive and high-quality UI. Preview Tabler is fully responsive and compatible with all modern browsers. The only requirement is basic HTML and CSS (and some Liquid) knowledge.

  6. 6
    Article
    Avatar of hnHacker News·4y

    Holograms, light-leaks and how to build CSS-only shaders

    @media (max-width:512px. .spec-example{margin:50px 0;display:flex;justify-content:space-between;gap:2.5rem}.spec- example__fixed,. spec-example__static{flex:1;border:20px solid #fff;height:30rem;background-image:linear- gradient(to bottom,#000 20%,#3c5e6d 35%,#f4310e,#f58308 80%,#000)}.frame--leak .specular{z-index:0;mix-blend-mode:color-dodge; background-color

  7. 7
    Article
    Avatar of hnHacker News·4y

    NASA’s Webb Delivers Deepest Infrared Image of Universe Yet

  8. 8
    Article
    Avatar of hnHacker News·4y

    Algorithms by Jeff Erickson

    This web page contains a free electronic version of my self-published textbook Algorithms. It also includes other lecture notes I have written for various theoretical computer science classes. Anyone is welcome to download, print, use, copy, and/or distribute anything on this page, either electronically or on paper.

  9. 9
    Article
    Avatar of hnHacker News·4y

    Why do so many brands change their logos and look like everyone else?

    The trend in logo design that started around 2017-2018. Many iconic fashion companies ditched their recognizable logos and switched to a bland and very similar version of a sans serif font. The purpose of a logo is to be instantly recognizable, different, memorable, and, if possible, to refer to the brand’s values.

  10. 10
    Article
    Avatar of hnHacker News·4y

    prose.sh

    Prose is an open-source blogging platform. There is no installation, signup is as easy as SSH'ing into our CMS. Publish your posts with one command. No ads, zero tracking, no platform lock-in. Subscriptions via RSS. 100% open source.

  11. 11
    Article
    Avatar of hnHacker News·4y

    Logging in Python like a PRO 🐍🌴

    Most people don't know what to log, so they decide to log anything thinking it might be better than nothing, and end up creating just noise. I'll try to give meaningful examples, and provide a flexible rule of thumb that should be used when logging for ANY application you're ever going to build.

  12. 12
    Article
    Avatar of hnHacker News·4y

    TikTok is “unacceptable security risk” and should be removed from app stores, says FCC

    FCC commissioner Brendan Carr called on Apple and Google to remove TikTok from their app stores. Carr cited several incidents as evidence that TikTok has been dodgy about its data collection practices. Michael Beckerman, VP, Head of Public Policy, Americas at TikTok, refuted a large chunk of the FCC’s claims.

  13. 13
    Article
    Avatar of hnHacker News·4y

    How a fake job offer took down the world’s most popular crypto game

    A senior engineer at Axie Infinity was duped into applying for a job at a company that, in reality, did not exist. The engineer downloaded spyware to infiltrate Ronin’s systems. From there, hackers were able to attack and take over four out of nine validators on the Ronin network.

  14. 14
    Article
    Avatar of hnHacker News·4y

    What Comes After Git

    Git was born from the collaboration problems in the Linux kernel. Nearly a decade later, new problems arose when Kubernetes (the operating system of the cloud) brought open-source collaboration to a new level. Will a new version control system (or something that solves similar problems) spring up?

  15. 15
    Article
    Avatar of hnHacker News·4y

    jorgef/engineeringladders: A framework for Engineering Managers

    The framework allows software engineering managers to have meaningful conversations with their direct reports around the expectations of each position and how to plan for the next level in their career ladder. The Manager's Path: Camille Fournier does an excellent job at describing the expectations and challenges of many engineering positions. Dick Grote explains in simple terms how to define job responsibilities.

  16. 16
    Article
    Avatar of hnHacker News·4y

    Emoji Kitchen Browser

    This page lets you browse the delightful combinations of Emoji Kitchen, available in Gboard for Android. All credit goes to the Emoji kitchen team for the care they put into emoji, standards, and imaginary creatures. Source code: on GitHub. For more information on Gboard, visit the Gboard website.

  17. 17
    Article
    Avatar of hnHacker News·4y

    What they don't teach you about sockets

    TCP does its best to get data to the other application, but in the event of a disconnect we effectively lose all of it. Developers need to decide how their application reacts to unexpected disconnects. This might not be as idiomatic on Linux, but it gives me a bit more control as an application developer.

  18. 18
    Article
    Avatar of hnHacker News·4y

    How Did REST Come To Mean The Opposite of REST?

    REST is short for REpresentational State Transfer. Roy Fielding used the term to describe the network architecture of the world wide web. He was describing the web as it existed at that time, with HTML being exchanged over HTTP as people "surfed the web" Today, when someone uses the term REST, they are nearly always discussing a JSON-based API.

  19. 19
    Article
    Avatar of hnHacker News·4y

    Release It's Alive!!! · popcorn-official/popcorn-android

  20. 20
    Article
    Avatar of hnHacker News·4y

    LanguageTool

    The European Union and the European Regional Development Fund (ERDF) support this project by providing funding. They support the development of error detection algorithms in multilingual texts, and thedevelopment of our browser add-ons and website. Supported by the Ministry of Social Affairs, Health, Integration, and Consumer Protection.

  21. 21
    Article
    Avatar of hnHacker News·4y

    tylertreat/comcast: Simulating shitty network connections so you can build better systems.

    Comcast is a tool designed to simulate common network problems like latency, bandwidth restrictions, and dropped/reordered/corrupted packets. It works by wrapping up some system tools in a portable(ish) way. On BSD-derived systems such as OSX, we use tools like ipfw and pfctl to inject failure. On Linux, we using iptables and tc . Comcast is merely a thin wrapper around these controls.

  22. 22
    Article
    Avatar of hnHacker News·4y

    We Don't Do That Here

    The phrase "we don't do that here" is a way to say no: "that doesn't work for me" It turns out talking about diversity, inclusion, and even basic civil behavior can be controversial in technical spaces. If no one has told you yet, as your career progresses you will eventually become We don’t do that.”

  23. 23
    Article
    Avatar of hnHacker News·4y

    mgunyho/tere: Terminal file explorer

    Tere is a terminal file explorer. It allows you to navigate to a folder efficiently using a TUI, and then prints the path to that folder when you exit. It is not a file manager, it can only be used to browse folders, not to create, rename or delete them.

  24. 24
    Article
    Avatar of hnHacker News·4y

    Teams is KILLING my Mac Every Day

    Teams is murdering my MacBook Pro 16" i9 with 16GB RAM every day. It causes serious lags and randomly decides when it wants to share the screen successfully. Other times, it just shows screen but no audio or vice versa. It's infuriating and I've lost my patience!

  25. 25
    Article
    Avatar of hnHacker News·4y

    Google Fires Blake Lemoine, Engineer Who Called Its AI Sentient

    Blake Lemoine said he believes Google's LaMDA conversational technology is sentient. Lemoine shared the news of his firing in a taping of Big Technology Podcast on Friday. Google confirmed Lemoine’s dismissal and shared the following statement with Big Technology:“As we share in our AI Principles , we take the development of AI very seriously and remain committed to responsible innovation. So, it’t regrettable that despite lengthy engagement on this topic, Blake still chose to persistently violate clear employment and data security policies. We will continue our careful development of language models, and we wish Blake well”