If you are a backend developer like me, logging is the window to
your application. Unlike in the frontend, there’s not much to see
except from some logging messages. Here are some of my personal
guidelines I use when I write logs.
A DomainKeys Identified Mail (DKIM) record is a piece of text that
you can add to your Domain Name System (DNS). The record is a
special key that gives email providers (such as Gmail or Outlook) a
way to verify if an email was created by the owner of a
domain. Email providers can check each email received against this
record to see if it is likely to be spam or forged.
Setting up DKIM will help reduce the chances of your emails being
categorized as spam, and help others build confidence that the
contents of your emails have come from you, without being tampered
Go is a common and well-suited tool for writing HTTP servers. This
post discusses the route a typical HTTP request takes through a Go
server, touching upon routers, middleware and other related issues
Seize the day: Training your brain to get stuff done
You stare at a pile of notes and your list of to-dos continues to
increase every day. The number of impending deadlines is
overwhelming so you attempt to sit down and work. However, your
brain would rather inspect that random mark on your wall than be
productive. You get a notification, open it, and suddenly you are
riding the procrastination train again. Sounds familiar? You are
Almost exactly one year ago I quit my job to create a Haskell
startup as a solo developer. I had about 20 ideas, but eventually
settled on the idea of dependency project health tracking with
This post describes the experience and evaluates Haskell and its
Inheritance is an object oriented feature which allows us to reuse
logic by defining parent classes that pass on certain behavior to
In this article, we’ll cover some examples of inheritance with
Python, the use of the super() function, and some practical
examples of inheritance through the use of mixins. The focus will be
more on understanding the complexities of multiple inheritance.
What security does a default OpenBSD installation offer?
In this text I will explain what makes OpenBSD secure by default
when you install it. Do not take this for a security analysis, but
more like a guide to help you understand what is done by OpenBSD to
have a secure environment. The purpose of this text is not to
compare OpenBSD to others OS but to say what you can honestly
expects from OpenBSD.
There are no security without a threat model, I always consider the
following cases: computer stolen at home by a thief, remote attacks
trying to exploit running services, exploit of user network clients.
In UNIX-based programming, we often talk about shells, terminals,
and the command line interfaces. Bash is probably the most
well-known, but there are other widely-used options as well, such as
Zsh or the Z shell. Read on to learn more about Zsh and some tips
and tricks to optimize your development.
It’s no secret that data cleaning is a large portion of the data
analysis process. When using pandas, there are multiple techniques
for cleaning text fields to prepare for further analysis. As data
sets grow large, it is important to find efficient methods that
perform in a reasonable time and are maintainable since the text
cleaning process evolves over time.
This article will show examples of cleaning text fields in a large
data file and illustrates tips for how to efficiently clean
unstructured text fields using Python and pandas.
In the morning I was pleasantly surprised by Rodrigo on Facebook. In a
comment he let me know that a species of short-tailed whipscorpion had
been named after me back in 2019!
Etymology: The specific name is a patronym, honoring John Bokma, a
naturalist and amateur arachnologist, who has discovered many new
species of arachnids in the surroundings of Xalapa, and guided the
authors to the type locality of this species.
The bridge mentioned is the Xalapa
which has a single pier that drops almost 90 meters to the floor of a
deep canyon. It is there where this species of short-tailed
whipscorpion can be found.
In a similar habitat, also a canyon, close to the town of Palmarejo;
Veracruz, which is also a short distance from Xalapa, I have found
short-tailed whipscorpions walking on the underside of large rocks
after rolling those over.
Since this specimen was photographed in a very similar habitat I guess
it's Nahual bokmai. Most likely it's impossible to tell this from
the photo alone, which was made with a Canon A640 in macro mode.
Short-tailed whip scorpions are very tiny, just a few mm, and look to
the untrained naked eye like ants; except they move in a different way.
The Appropriate Uses For
SQLite page says that
dynamic pages on the SQLite website typically do about 200 SQL
statements each. This has provoked criticism from readers. Examples:
"200 SQL statements is a ridiculously high number for a single page"
"For most sites, 200 queries is way, way, way too much."
"[This is] bad design"
Such criticism would be well-founded for a traditional client/server
database engine, such as MySQL, PostgreSQL, or SQL Server. In a
client/server database, each SQL statement requires a message
round-trip from the application to the database server and back to
the application. Doing over 200 round-trip messages, sequentially,
can be a serious performance drag. This is sometimes called the "N+1
Query Problem" or the "N+1 Select Problem" and it is an
Biologically Plausible Deep Learning (BPDL) is an active research
field at the intersection of Neuroscience and Machine Learning,
studying how we can train deep neural networks with a "learning
rule" that could conceivably be implemented in the brain.
The line of reasoning that typically motivates BPDL is as follows:
A Deep Neural Network (DNN) can learn to perform perception tasks
that biological brains are capable of (such as detecting and
If activation units and their weights are to DNNs as what neurons
and synapses are to biological brains, then what is backprop (the
primary method for training deep neural nets) analogous to?
If learning rules in brains are not implemented using backprop,
then how are they implemented? How can we achieve similar
performance to backprop-based update rules while still respecting
A nice overview of the ways in which backprop is not biologically
plausible can be found
along with various algorithms that propose fixes.
arguments than the expected number of parameters, i.e., one can pass
fewer or more arguments than the declared formal parameters. The
former case is called under-application and the latter is called
In the under-application case, the remaining parameters get assigned
the undefined value. In the over-application case, the remaining
arguments can be accessed by using the rest parameter and the
arguments property, or they are simply superfluous and they can be
ignored. Many Web/NodeJS frameworks nowadays use this JS feature to
accept optional parameters and create a more flexible API.
Until recently, V8 had a special machinery to deal with arguments
size mismatch: the arguments adaptor frame. Unfortunately, argument
adaption comes at a performance cost, but is commonly needed in
modern front-end and middleware frameworks. It turns out that, with
a clever trick, we can remove this extra frame, simplify the V8
codebase and get rid of almost the entire overhead.