Debugging Kubernetes PVCs
A guide to debugging corrupted data in Kubernetes Persistent Volume Claims by attaching them to a temporary debugging pod.
A guide to debugging corrupted data in Kubernetes Persistent Volume Claims by attaching them to a temporary debugging pod.
Explains Kafka listeners and advertised.listeners configuration for client connectivity in Docker and AWS environments.
Research on using semi-adversarial neural networks to generate gender-neutral face images, enhancing privacy while preserving biometric utility.
Explores using semi-adversarial neural networks to generate gender-neutral face images, enhancing privacy by hiding gender while preserving biometric utility.
Explains statistical methods for testing random number generators in R, focusing on hypothesis testing and probability bounds.
Summary of July 2018 updates to Azure AD Managed Service Identity, including new user-assigned identities and supported services.
Developer shares the story behind building feediary.com, a privacy-focused, ad-free RSS reader, to escape Twitter's algorithmic feed and information overload.
Argues for creating a formal specification for Bitcoin Cash to improve protocol clarity, client interoperability, and security across development teams.
Explores quoting, quasiquotation, and macros in R, comparing base-R and tidyverse approaches to metaprogramming.
Explains the role of shells in Wayland compositors using wlroots, detailing how surfaces become functional UI elements like windows and menus.
A developer's experience implementing HTTP long-polling in Go, focusing on server timeout handling and practical code examples.
A guide detailing the author's setup, equipment, and workflow for creating technical video tutorials for the TechSnips platform.
A technical deep-dive exploring the internal structure of .NET Core .dll files, including IL code and assembly references.
Explains Bitcoin's security as a spectrum, not binary, using analogies and discussing confirmations, threat models, and double-spend protection.
Critique of OP_RETURN-based token systems on Bitcoin Cash, arguing they undermine SPV wallet security and create flawed consensus models.
Announcing a full-day SQL workshop on optimizing data warehouses using Columnstore Indexes, from basics to advanced tuning, at SQLSaturday Madrid 2018.
Explains the Terraform list() function, its syntax, usage examples, and a key lesson about type consistency.
Announcing two full-day SQL Server workshops at SQLSaturday Lisbon 2018, featuring Query Store troubleshooting and performance tuning.
A critique of speakers who cancel free tech events, arguing they disrespect attendees' time and organizers' resources despite no ticket revenue.
Explains the Terraform keys() function, which extracts and sorts keys from a map, with practical examples.