In the evening I noticed a cast-off exoskeleton next to the burrow
of the Ephebopus cyanognathus I keep. In the evening I took some
photos of the molt.
It's burrow is partially in the substrate and partially a tower it
made with silk, substrate, and dead leaves.
Troubleshooting a stuck process
I was recently troubleshooting an issue where a process seemed to be
stuck, not making any progress. Eventually I was able to track down
the problem, but along the way I found a few quick ways to start
gathering information about a running process.
Welcome to the third part of this series aimed to help you unleash a
power never seen on Earth using the Almighty Vim. If you don’t
understand what’s happening in this article, I recommend you to read
the previous ones of the series first:
We've been experimenting with breaking up employees into random
groups (of size 4) and setting up video hangouts between them. We're
doing this to replace the serendipitous meetings that sometimes
occur around coffee machines, in lunch lines or while waiting for
the printer. And also, we just want people to get to know each
Which lead to me writing some code. The core of which is divide n
elements into groups of at least size g minimizing the size of each
group. So, suppose an office has 15 employees in it then it would
be divided into three groups of sizes 5, 5, 5; if an office had 16
employees it would be 4, 4, 4, 4; if it had 17 employees it would be
4, 4, 4, 5 and so on.
In this post I’ll compare and contrast my experiences writing the
same program in Haskell and PureScript. The application I built was
“real” enough to have some interesting design challenges. They
The world of web animations has become a sprawling jungle of tools
and technologies. Libraries like GSAP and Framer Motion and React
Spring have sprung up to help us add motion to the DOM.
The most fundamental and critical piece, though, is the humble CSS
transition. It's the first animation tool that most front-end devs
learn, and it's a workhorse. Even the most grizzled, weathered
animation veterans still reach for this tool often.
There's a surprising amount of depth to this topic. In this
tutorial, we'll dig in and learn a bit more about CSS transitions,
and how we can use them to create lush, polished animations.
In many Go APIs, especially modern ones, the first argument to
functions and methods is often
context.Context. Context provides
a means of transmitting deadlines, caller cancellations, and other
request-scoped values across API boundaries and between
processes. It is often used when a library interacts — directly or
transitively — with remote servers, such as databases, APIs, and the
Nginx is the web server powering one-third of all websites in the
world. Detectify Crowdsource
has detected some common Nginx misconfigurations that, if left
unchecked, leave your web site vulnerable to attack. Here’s how to
find some of the most common misconfigurations before an attacker
The introduction of the @font-face CSS at-rule allowed web
designers to specify custom fonts with which to display text. By
2011, all major browsers supported it. This gave birth to the idea
that fonts composed of pictograms, like Wingdings, could be used in
place of raster images on the web. Considering that real SVG support
across all major browsers didn't become stable until early 2020,
icon fonts were the defacto way to add vector-based icons on your
But icon fonts on the web were fundamentally flawed from the
beginning. And now, with full SVG support at our disposal, it's time
to put a stop to their use, once and for all.
You probably know about using the up and down arrow keys to scroll
through your Bash history, but did you know that there's a lot more
to Bash history than just repeating commands? There is much more to
the story. Or, should that be much more to the history? In either
case, the history command is one of those obscure commands that is
powerful and handy to know on at least a basic level. This article
will take the mystery out of Bash history to make it a more friendly
A surprisingly common problem in both application development and
analysis is: given an input name, find the database record it most
likely refers to. It's common because databases of names and people
are common, and it's a problem because names are a very irregular
The page "Falsehoods Programmers Believe About
covers some of the ways names are hard to deal with in
programming. This post will ignore most of those complexities, and
deal with the problem of matching up loose user input to a database
7 Best Python Code Review Tools Recommended by Developers
With software development teams growing in size, many developers
utilize static code analysis tools to mitigate code smells and find
bugs and vulnerabilities. While code correctness cannot be
automated, code quality maintenance can be made possible through
these static code analysis tools. It helps Teams to identify bugs
and anti-patterns in the early stage of development.
Static code analysis tools analyze the code on every commit or pull
request and point out potential code-quality, security, and style
issues before the reviewer points them out. In this article, we will
be reviewing 7 of the renowned Python code review tools as your
perfect fit, which will make your decision-making process easier for
choosing the best one.
I was just reading an article in which a poor soul was trying really
hard to explain to the reader what a monad is and failing miserably
because he himself did not truly understand it. Out of mostly a
desire to help him, I thought it might make sense to write an
article that allows people to understand the intuition behind
monads first without going into crazy functional language syntax.
Git is my buddy: Effective Git as a solo developer
At this point, most developers use Git as a tool for
collaboration. We have our rote-learned commands to pull, commit,
and push. And of course, there's that one
coworker who knows a bit more about Git
than everyone else, who helps get us back on track whenever our
local repos end up in a strange state.
But what if I told you that Git can be a valuable tool without ever
setting up a remote repository? I'm not just talking about having a
working version of your code base to roll back to if you mess
something up, although there's that too. Used correctly, Git can
help to structure your work, identifying gaps in your test coverage
and minimizing dead code.
Wouldn't it be nice if more JSON tools supported a truly pretty
JSON format? Demand options for truly pretty JSON now! Viva la
If only it were that easy. JSON format has become wildly popular
over the last decade easily passing XML as the format of choice. For
us humans JSON is much easier to read than XML if the JSON is
properly formatted. Sadly most tools for viewing or formating JSON
seem to be stuck on one of two formats. One format is the single
line format and the other is a simple expanded format. There are
other options though with some tools.
One tool that offers more options is the oj application which is
part of the golang OjG
package. The oj application will be used to illustrate the range
of JSON formats from the ugly up to the beauty of pretty
JSON. Follow along and try out your favorite JSON sample on each
A couple of weeks ago, I got bored and decided to come up with a
list of things that have bothered me when trying to run software to
get things done. These might be reliability concerns, or development
issues, or really anything else that bothered me at the time. This
was actually pretty illuminating.
Go is not an easy programming language. It is simple in many ways:
the syntax is simple, most of the semantics are simple. But a
language is more than just syntax; it’s about doing useful
stuff. And doing useful stuff is not always easy in Go.
JWCC is a minimal extension to the widely used JSON file format with
(1) optional commas after the final element of arrays and objects
and (2) C/C++ style comments. These two features make it more
suitable for human-editable configuration files, without adding so
many features that it’s incompatible with numerous other (deliberate
and accidental) existing JSON extensions.
If you are a backend developer like me, logging is the window to
your application. Unlike in the frontend, there’s not much to see
except from some logging messages. Here are some of my personal
guidelines I use when I write logs.
A DomainKeys Identified Mail (DKIM) record is a piece of text that
you can add to your Domain Name System (DNS). The record is a
special key that gives email providers (such as Gmail or Outlook) a
way to verify if an email was created by the owner of a
domain. Email providers can check each email received against this
record to see if it is likely to be spam or forged.
Setting up DKIM will help reduce the chances of your emails being
categorized as spam, and help others build confidence that the
contents of your emails have come from you, without being tampered
Go is a common and well-suited tool for writing HTTP servers. This
post discusses the route a typical HTTP request takes through a Go
server, touching upon routers, middleware and other related issues
Seize the day: Training your brain to get stuff done
You stare at a pile of notes and your list of to-dos continues to
increase every day. The number of impending deadlines is
overwhelming so you attempt to sit down and work. However, your
brain would rather inspect that random mark on your wall than be
productive. You get a notification, open it, and suddenly you are
riding the procrastination train again. Sounds familiar? You are
Almost exactly one year ago I quit my job to create a Haskell
startup as a solo developer. I had about 20 ideas, but eventually
settled on the idea of dependency project health tracking with
This post describes the experience and evaluates Haskell and its
Inheritance is an object oriented feature which allows us to reuse
logic by defining parent classes that pass on certain behavior to
In this article, we’ll cover some examples of inheritance with
Python, the use of the super() function, and some practical
examples of inheritance through the use of mixins. The focus will be
more on understanding the complexities of multiple inheritance.
What security does a default OpenBSD installation offer?
In this text I will explain what makes OpenBSD secure by default
when you install it. Do not take this for a security analysis, but
more like a guide to help you understand what is done by OpenBSD to
have a secure environment. The purpose of this text is not to
compare OpenBSD to others OS but to say what you can honestly
expects from OpenBSD.
There are no security without a threat model, I always consider the
following cases: computer stolen at home by a thief, remote attacks
trying to exploit running services, exploit of user network clients.
In UNIX-based programming, we often talk about shells, terminals,
and the command line interfaces. Bash is probably the most
well-known, but there are other widely-used options as well, such as
Zsh or the Z shell. Read on to learn more about Zsh and some tips
and tricks to optimize your development.
It’s no secret that data cleaning is a large portion of the data
analysis process. When using pandas, there are multiple techniques
for cleaning text fields to prepare for further analysis. As data
sets grow large, it is important to find efficient methods that
perform in a reasonable time and are maintainable since the text
cleaning process evolves over time.
This article will show examples of cleaning text fields in a large
data file and illustrates tips for how to efficiently clean
unstructured text fields using Python and pandas.
In the morning I was pleasantly surprised by Rodrigo on Facebook. In a
comment he let me know that a species of short-tailed whipscorpion had
been named after me back in 2019!
Etymology: The specific name is a patronym, honoring John Bokma, a
naturalist and amateur arachnologist, who has discovered many new
species of arachnids in the surroundings of Xalapa, and guided the
authors to the type locality of this species.
The bridge mentioned is the Xalapa
which has a single pier that drops almost 90 meters to the floor of a
deep canyon. It is there where this species of short-tailed
whipscorpion can be found.
In a similar habitat, also a canyon, close to the town of Palmarejo;
Veracruz, which is also a short distance from Xalapa, I have found
short-tailed whipscorpions walking on the underside of large rocks
after rolling those over.
Since this specimen was photographed in a very similar habitat I guess
it's Nahual bokmai. Most likely it's impossible to tell this from
the photo alone, which was made with a Canon A640 in macro mode.
Short-tailed whip scorpions are very tiny, just a few mm, and look to
the untrained naked eye like ants; except they move in a different way.
The Appropriate Uses For
SQLite page says that
dynamic pages on the SQLite website typically do about 200 SQL
statements each. This has provoked criticism from readers. Examples:
"200 SQL statements is a ridiculously high number for a single page"
"For most sites, 200 queries is way, way, way too much."
"[This is] bad design"
Such criticism would be well-founded for a traditional client/server
database engine, such as MySQL, PostgreSQL, or SQL Server. In a
client/server database, each SQL statement requires a message
round-trip from the application to the database server and back to
the application. Doing over 200 round-trip messages, sequentially,
can be a serious performance drag. This is sometimes called the "N+1
Query Problem" or the "N+1 Select Problem" and it is an
Biologically Plausible Deep Learning (BPDL) is an active research
field at the intersection of Neuroscience and Machine Learning,
studying how we can train deep neural networks with a "learning
rule" that could conceivably be implemented in the brain.
The line of reasoning that typically motivates BPDL is as follows:
A Deep Neural Network (DNN) can learn to perform perception tasks
that biological brains are capable of (such as detecting and
If activation units and their weights are to DNNs as what neurons
and synapses are to biological brains, then what is backprop (the
primary method for training deep neural nets) analogous to?
If learning rules in brains are not implemented using backprop,
then how are they implemented? How can we achieve similar
performance to backprop-based update rules while still respecting
A nice overview of the ways in which backprop is not biologically
plausible can be found
along with various algorithms that propose fixes.