Bookmark
So You Think You Want to Open a Brewery... | Serious Eats
https://drinks.seriouseats.com/2014/03/challenges-of-opening-a-brewery-job-advice-beer-industry-collin-mcdonnell-henhouse.html, posted Dec '19 by peter in business drink entrepreneurship toread
The joke is that brewing is 90% cleaning and 10% paperwork. Except that it's not a joke at all. It's just how brewery life is.
Bookmark
Setting up a signed private apt repository with HTTPS access
tomthegreat.com/2018/02/21/setting-up-a-signed-private-apt-repository-with-lan-access/, posted Nov '19 by peter in deployment howto linux security toread
This is a guide on setting up private apt repository that is accessible over a local network via HTTPS and is signed to avoid having to use –allow-unauthenticated to install packages.
...
For my use case I have two distributions of packages, they are production and test distributions. The packages in each distribution varies based on what I have approved to be used in a live/production environment versus a test environment. This is so that I can separate out packages that I am using for normal everyday use versus ones I am currently testing with and not ready to go live with. If you are only using one distribution modify the instructions accordingly.
Bookmark
Digested: The Secrets of Docker Secrets
digested.blogspot.com/2019/11/the-secrets-of-docker-secrets.html, posted Nov '19 by peter in automation continuousdelivery deployment docker howto toread
Most web apps need login information of some kind, and it is a bad idea to put them in your source code where it gets saved to a git repository that everyone can see. Usually these are handled by environment variables, but Docker has come up with what they call Docker secrets. The idea is deceptively simple in retrospect. While you figure it out it is arcane and difficult to parse what is going on.
Bookmark
Bipartisan Alliance: We identified the “walkability†of a city, how easy it is to get things done without a car, as a key fa
https://www.bipartisanalliance.com/2019/10/we-identified-walkability-of-city-how.html, posted Oct '19 by peter in politics science toread urbanism
Intergenerational upward economic mobility—the opportunity for children from poorer households to pull themselves up the economic ladder in adulthood—is a hallmark of a just society. In the United States, there are large regional differences in upward social mobility. The present research examined why it is easier to get ahead in some cities and harder in others. We identified the “walkability” of a city, how easy it is to get things done without a car, as a key factor in determining the upward social mobility of its residents.
Bookmark
RA: Inside Tokyo's audiophile venues
https://www.residentadvisor.net/features/2724, posted Sep '19 by peter in audio music todo tokyo toread travel
With a rich network of sound-obsessed cafés, bars and small clubs, Aaron Coultate explains why Tokyo might be the best place in the world to listen to music.
Bookmark
The Supposedly Pristine, Untouched Amazon Rainforest Was Actually Shaped By Humans | Science | Smithsonian
https://www.smithsonianmag.com/science-nature/pristine-untouched-amazonian-rainforest-was-actually-shaped-humans-180962378/, posted Jun '19 by peter in environment science toread
Like humans everywhere, Native Americans shaped their environments to suit them, through burning, pruning, tilling and other practices. And the Amazon is no different: Look closer, and you can see the deep impressions that humans have made on the world's largest tropical rainforest, scientists reported yesterday in the journal Science.
Bookmark
A Gentle Introduction to Erasure Codes
https://www.akalin.com/intro-erasure-codes, posted 2018 by peter in backup math reference toread
This article explains Reed-Solomon erasure codes and the problems they solve in gory detail, with the aim of providing enough background to understand how the PAR1 and PAR2 file formats work, the details of which will be covered in future articles.
I’m assuming that the reader is familiar with programming, but has not had much exposure to coding theory or linear algebra. Thus, I’ll review the basics and treat the results we need as a “black box”, stating them and moving on. However, I’ll give self-contained proofs of those results in a companion article.
So let’s start with the problem we’re trying to solve! Let’s say you have n files of roughly the same size, and you want to guard against m of them being lost or corrupted. To do so, you generate m parity files ahead of time, and if in the future you lose up to m of the data files, you can use an equal number of parity files to recover the lost data files.
Bookmark
We Should Teach Media Literacy in Elementary School - Scientific American Blog Network
https://blogs.scientificamerican.com/observations/we-should-teach-media-literacy-in-elementary-school/, posted 2018 by peter in cognition education media opinion toread
We need to have a lot of difficult conversations in order to resolve the issues we are facing as a society, and the only way these conversations will be productive and enduring is if we all can agree on the facts. Right now, with Americans believing more than 40 percent of the news they see is fake, we aren’t quite there as a society, but that doesn’t mean we can’t be. The internet is an amazing tool, but to use it most effectively we have to embrace its benefits while also understanding the ways in which it makes us vulnerable. If students are still learning dated practices such as cursive writing in school, shouldn’t they be learning how to navigate and consume the internet responsibly as well?
Bookmark
Educating for Democracy in a Partisan Age: Confronting the Challenges of Motivated Reasoning and Misinformation | Civic Engageme
www.civicsurvey.org/publications/263, posted 2018 by peter in cognition education media science toread
Much misinformation and many falsehoods related to politics circulate online. This paper investigates how youth judge the accuracy of truth claims tied to controversial public issues. In an experiment embedded within a nationally representative survey of youth ages 15-27 (N=2,101), we examined factors that influenced youth judgements regarding the accuracy of the content. Consistent with research on motivated reasoning, youth assessments depended on a) the alignment of the claim with their prior policy position and, to a lesser extent, on b) whether the post included an inaccurate statement. However, and most importantly, among those participants who reported the most media literacy learning experiences, there was a large, statistically significant difference in ratings of accuracy between those exposed to a post that employed misinformation and those who saw an evidence-based post. Implications for educators and policymakers are discussed.
Bookmark
Application-Layer DDoS Attack Protection with HAProxy - HAProxy Technologies
https://www.haproxy.com/blog/application-layer-ddos-attack-protection-with-haproxy/, posted 2018 by peter in howto networking performance toread
In this blog post, we’ll demonstrate how the HAProxy load balancer protects you from application-layer DDoS attacks that could, otherwise, render your web application dead in the water, unreachable by ordinary users. In particular, we’ll discuss HTTP floods. An HTTP flood operates at the application layer and entails being immersed with web requests, wherein the attacker hopes to overwhelm your application’s capacity to respond.
|< First < Previous 11–20 (439) Next > Last >|