Tag Archives: Spelling

Links: Oct 24th

Computer Science is no more about computers than astronomy is about telescopes
— Edsger Dijkstra

Let me start this post with two very powerful articles in The Economist:

  • Philosopher kings. Business leaders would benefit from studying great writers.
    This resonates a lot with me, and is easily transposed onto politics. I can’t get rid of despair how shallow and primitive our politicians are en mass; all the more lame sound our journalists referring to them as ‘elite’.
  • Wealth without workers, workers without wealth. The digital revolution is bringing sweeping change to labour markets in both rich and poor worlds.
    The overview of a silent revolution that is happening around us. Engaging parallels with two previous Industrial revolutions, opportunities, trends, and the role of IT knowledge in the future.

Technology

  • Bedford’s law (here in Russian), something I was unknowingly bumping into before when trying to fairly evenly split the list of hostname. First thought of splitting by first character was obviously naive as hostnames tend to follow some patterns. Then I decided to calculate some hash function on the hostname and pick the first figure. I thought that would be fairly evenly distributed, but to my surprise it wasn’t. Now I have an explanation — Benford’s law.
  • On rpm-based system you can use following commands to restore file’s permissions and ownerships:
  • To reserve a CPU core for some particular process and make the scheduler avoid placing other processes on that CPU you need to use cpusets. There is a generic tutorial here on shielding a CPU (Serge, thanks:), but it’s much more fun to use cset tool. Just look how cool it is in the examples on stackoverflow and in this tutorial.
  • Some handy information on editing with ed, an undeservedly underused tool these days
  • A standard way to implement Redis sharding and (!) make Redis utilise multiple cores: twemproxy.
  • Compact 100-line implementation of netcat in perl. Works perfectly in pair with ssh ProxyCommand.
  • HTTP/2 is coming: RFC2616 is dead.
  • In the light of recent security vulnerabilities, even more useful site with instructions on web-server encryption configuration: cipher.st
  • Say ‘Hello’ to hidepid= option in Linux; a way to hide processes from other users.
  • And as a titbit, shell niceties:
    • Progress bars and spinners: here and here, my favourite is this:
    • Best ever pidtree shell implementation (from superuser):

English