I really like Secure by
key idea is that there is a big overlap between secure code and good
software design. Code that is strict, clear and focused will be
easier to reason about, and will have fewer bugs. This in turn makes
it less vulnerable to attacks. This is easy to say, but Secure by
Design is full of techniques for how to actually do this. Here are
the ideas from the book that I liked the most.
It started with a colleague of mine mentioning that he’d started
using Vim bindings in his non-Vim editor, and he quite preferred
it. I thought I’d give it a try, and haven’t looked back. I find it
empowering being able to do quite complex things with a few
Decision Tree Classifier is a simple Machine Learning model that is
used in classification problems. It is one of the simplest Machine
Learning models used in classifications, yet done properly and with
good training data, it can be incredibly effective in solving some
Nevertheless, due to its versatility, the language possibly offers
some constructions that, if not used properly, can introduce
security problems, either by or by making code misinterpreted by the
programmer or a reviewer. In addition, as for every tool in the
compilation or software verification field, the tools used to
develop, compile and execute programs can expose certain features or
configurations that, if misused, may lead to vulnerabilities.
Thus, the object of this document is to compile hints and
recommendations to stay in a safe zone for secure applications
development while taking advantage of the range of possibilities
Rust language can offer.
RSS: The Original Federated Social Network Protocol
Which ever name you call it by, RSS is a standardized format for
listing the most recent updates for a website. The majority of
websites and blogs publish a feed of updates, either in RSS format
or its close cousin, the Atom Syndication Format (ATOM).
Of course Plurrrr has an RSS feed you can subscribe to as well.
How to teach your kids at home
Parents are all teachers now. A Quartz team made up of education
reporters, former teachers, and parents have compiled useful
resources to help parents navigate this transition. They are neither
comprehensive nor meant to replace the learning your kids’ schools
are trying to put in place. They are things to use to augment school
assignments and help fill the other hours in ways that that you, and
hopefully your kids, can feel good about.
Order arrived: Wi-Fi range extender and a book on Python
Today, in the early afternoon an order I placed at
bol.com arrived. Yesterday, I had set up a
Raspberry Pi 3 with a keyboard, monitor, and mouse but because of the
weak Wi-Fi signal in my office it couldn't connect to the Internet. A
range extender would solve this, so I ordered a TP Link AC1200 Wi-Fi
device was a piece of cake to set up, and so far I would recommend it.
Because Adam is very interested in programming I also ordered a book:
"Programmeren voor Kinderen"; the Dutch translation of Computer
Coding Python Projects for
by Carol Vorderman. I hope this excellent looking book, it has a hard
cover which is great, helps my children with both their Dutch and
DISTINCT ON: The confusing, unique and useful feature in Postgres
When I saw DISTINCT ON, I was like, there must not be anything new
about it, you know, just another similar kind of feature with a
different name. But I was wrong! It seems very powerful feature to
me at least!
With the new 2020 MacBook Air, Apple has pulled a Michael Corleone
and settled all family business. I’ve spent the last day testing
Apple’s $1,300 mid-range MacBook Air, with the quad-core Intel Core
i5 CPU, 512 GB storage, and 8 GB of RAM.
"Object relational mappers" (ORMs) exist to bridge the gap between
the programmers' friend (the object), and the database's primitive
(the relation). The reasons for these differing models are as much
cultural as functional: programmers like objects because they
encapsulate the state of a single thing in a running
program. Databases like relations because they better suit
whole-dataset constraints and efficient access patterns for the
I got a customer ticket the other day that said they weren’t worried
about response time because “New Relic is showing our average
response time to be sub 200ms”. Sounds good, right? Well, when it
comes to performance - you can’t use the average if you don’t know
the distribution. It’s usually best to use the median, which is also
perc50, though you’ll also want to look at your long tail of
responses. If you’re not following, then this post is for you.
Why does all() return True if the iterable is empty?
This is literally a 2,500 year old debate in philosophy. The
ancients thought “all unicorns are blue” should be false because
there are no unicorns, but modern logic says it is true because
there are no unicorns that aren’t blue. Python is just siding with
modern predicate logic, but your intuition is also quite common and
was the orthodox position until the last few hundred years.
Working from Home: An Honest Look at the Remote Work Lifestyle
For the first year and a half of my WFH journey, I was alone the
whole day. At the beginning, I felt awkward. If you feel like that
too, it’s completely normal. I stopped noticing that I’m alone only
when I was immersed in work. As you enter “the
you can forget about the whole world. Working from home can be a
very productive time. There are few interruptions. You can just go
with the flow.
In the early afternoon when checking on my Brachypelma smithi I
found the tarantula upside down; it was about to molt. Just after 7PM
I checked again and found the tarantula resting next to its shed