Aleksander Cynarski

564 Added | 6 Magazines | 2 Likes | 4 Following | 43 Followers | @paramah | My brain is my enemy...

Go's work-stealing scheduler

Sun, Jul 16, 2017<p>Go scheduler’s job is to distribute runnable goroutines over multiple worker OS threads that runs on one or more processors. In …

Programming

Raw sockets in Go: Link layer

January 31, 2015<p>Posted in Software at 21:55 by graham<p>Continuing our dive into the Internet Protocol Suite from Go (See part 1 Raw sockets in Go: IP …

Linux

New Save-Data HTTP header tells websites to reduce their data usage

Some users are okay with a slightly degraded user experience and lower image quality in exchange for lower data usage and costs savings. There …

Web Design

Dockerizin

Dockerizing Node and Connecting Multiple Containers<p>This blog post is part of the course <i>Node in Production with Docker and AWS</i> at Node University.<p>In …

DevOps

Cliques of Neurons Bound into Cavities Provide a Missing Link between Structure and Function

1. Introduction<p>How the structure of a network determines its function is not well understood. For neural networks specifically, we lack a unifying …

Casbin

<b>Note</b>: The plugins and middleware based on Casbin can be found at: https://github.com/casbin<p>Casbin is a powerful and efficient open-source access …

envy

Automatically exposes environment variables for all of your flags.<p>Envy takes one parameter: a namespace prefix that will be used for environment …

Python Programming

Dvizz - A Docker Swarm Visualizer

Inspired by the excellent ManoMarks/docker-swarm-visualizer, Dvizz provides an alternate way to render your Docker Swarm nodes, services and tasks …

DevOps

Go Microservices blog series, part 9 - Messaging with RabbitMQ and AMQP

Välkommen till Callista Enterprise blogg - här finns tekniska artiklar, presentationer och nyheter om arkitektur och systemutveckling. Håll dig …

powerful open-source server solutions

DARPA Funds Development of New Type of Processor

The Defense Advanced Research Project Agency (DARPA) is building the world's first graph-analytics processor in its Hierarchical Identify Verify …

Big Data

Golang Pros and Cons for DevOps (Part 1 of 6): Goroutines, Panics, and Errors

We’ve lauded the merits of Google’s golang for DevOps applications here on in this blog, and we’ve also written a mini guide on getting started with …

Programming

PG-Strom

PG-Strom is a custom-scan provider module for the PostgreSQL database. It is designed to utilize GPU devices to accelarate sequential scan, hash- …

Shepherd

Tether

Tether is a JavaScript library for efficiently making an absolutely positioned element stay next to another element on the page. For example, you …

Odometer — Transition numbers with ease

How To Use<p>Add the js and a theme file to your page:<p>Any element with class name "odometer" will automatically be made into an Odometer! When you want …

Writing ARM Assembly (Part 1)

Introduction to ARM Assembly Basics<p>Welcome to this tutorial series on ARM assembly basics. This is the preparation for the followup tutorial series …

Programming

A million requests per second with Python

Is it possible to hit a million requests per second with Python? Probably not until recently.<p>A lot of companies are migrating away from Python and to …

Programming

Modeling Spelling Correction for Search at Etsy

IntroductionWhen a user searches for an item on Etsy, they don’t always type what they mean. Sometimes they type the query <i>jewlery</i> when they’re …

Data Science

Redirecting…

Linux Performance

hi-res: observability + static + perf-tools/bcc (svg) <br>slides: observability <br>slides: static, benchmarking, tuning <br>sar, perf-tools, bcc/BPF: <br>Images …

Polish Złoty Symbol — The Dialogue

Not that the Polish złoty needed a unique symbol at the moment, however, it will not do any harm to conduct graphical experiments from time to …

Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247

Sniffing GSM traffic with HackRF.

While my friend and colleague Simone was visiting our ZIMPERIUM – Enterprise Mobile Security TLV office, we got our hands on HackRF and hacked …

Linux

Project description and Frequently Asked Questions | Post

Subscribe to hear project updates and be notified when crowdfunding goes live!<p>What is this?<p>This is a smartphone, with a Raspberry Pi Zero at its …

How To Build Your Own Rogue GSM BTS For Fun And Profit

The last week I've been visiting my friend and colleque Ziggy in Tel Aviv which gave me something I've been waiting for almost a year, a brand new …

Linux

git-also

For a file in your git repository, prints other files that are most often committed together.<p>This is a demo of git-also applied on three.js …

Command-line

Redirecting…

Awesome Penetration Testing

A collection of awesome penetration testing resources.<p>Penetration testing is the practice of launching authorized, simulated attacks against computer …